TrueCrypt and VeraCrypt |
Top Previous Next |
Choosing encryption algorithm and hash algorithm
When creating a container or image file, the user may select an optional encryption algorithm and hash algorithm. For VeraCrypt encryption, the choice of a PIM affecting .
If you know the encryption algorithm or hashing algorithm for the selected container or image file, specify this data in the window, which will greatly speed up the decryption process.
PIM
PIM (Personal Iterations Multiplier) is a value that specifies the number of iterations used by the header key derivation according to the formulas.
To encrypt the system partition that doesn't use SHA-512 or Whirlpool (faster but less secure): iterations = PIM x 2048
To encrypt a non-system partition or system encryption that uses SHA-512 or Whirlpool (slower but more secure): iterations = 15000 + (PIM x 1000)
It is not mandatory to specify a PIM. If the PIM value is left at zero, the default value will be used:
To encrypt the system partition, that uses SHA-256: iterations = 200000 To encrypt the system partition, that uses RIPEMD-160: iterations = 327661
To encrypt a non-system partition and standard containers, that uses RIPEMD-160: iterations = 655331 To encrypt a non-system partition and standard containers, that uses SHA-256, SHA-512 or Whirlpool: iterations = 500000
PIM is used in VeraCrypt since version 1.12 |
Get more information about Elcomsoft Forensic Disk Decryptor
Get full version of Elcomsoft Forensic Disk Decryptor