This method for medium security conforms to the standards of the German BSI as described in the “BSI IT Baseline Protection Manual”. Data is overwritten with a random value and then with this values complement. This procedure is completed with new random values three times.