TrueCrypt and VeraCrypt

Top  Previous  Next

Choosing an encryption algorithm and hash algorithm

 

When creating a container or image file, the user selects some encryption algorithm and hash algorithm, as well as PIM specifically for VeraCrypt encryption.

 

If you know the encryption algorithm or hashing algorithm for the selected container or image file, you should specify this data in the window, which will greatly speed up the decryption process.

 

EFDD VeraCrypt

 

PIM

 

PIM (Personal Iterations Multiplier) - a value that specifies the number of iterations used by the header key derivation following the formulas:

 

To encrypt the system partition, that doesn't use SHA-512 or Whirlpool (faster but less secure): iterations = PIM x 2048

 

To encrypt a non-system partition or system encryption that uses SHA-512 or Whirlpool  (slower but more secure): iterations = 15000 + (PIM x 1000)

 

It is not mandatory to specify a PIM. If the PIM value is left at zero, the default value will be used:

 

To encrypt the system partition, that uses SHA-256: iterations = 200000

To encrypt the system partition, that uses RIPEMD-160: iterations =  327661

 

To encrypt a non-system partition and standard containers, that uses RIPEMD-160: iterations = 655331

To encrypt a non-system partition and standard containers, that uses SHA-256, SHA-512 or Whirlpool: iterations = 500000

 

PIM is used in VeraCrypt since version 1.12


 Get more information about Elcomsoft Forensic Disk Decryptor
 Get full version of Elcomsoft Forensic Disk Decryptor