TrueCrypt and VeraCrypt |
Top Previous Next |
Choosing an encryption algorithm and hash algorithm
When creating a container or image file, the user selects some encryption algorithm and hash algorithm, as well as PIM specifically for VeraCrypt encryption.
If you know the encryption algorithm or hashing algorithm for the selected container or image file, you should specify this data in the window, which will greatly speed up the decryption process.
PIM
PIM (Personal Iterations Multiplier) - a value that specifies the number of iterations used by the header key derivation following the formulas:
To encrypt the system partition, that doesn't use SHA-512 or Whirlpool (faster but less secure): iterations = PIM x 2048
To encrypt a non-system partition or system encryption that uses SHA-512 or Whirlpool (slower but more secure): iterations = 15000 + (PIM x 1000)
It is not mandatory to specify a PIM. If the PIM value is left at zero, the default value will be used:
To encrypt the system partition, that uses SHA-256: iterations = 200000 To encrypt the system partition, that uses RIPEMD-160: iterations = 327661
To encrypt a non-system partition and standard containers, that uses RIPEMD-160: iterations = 655331 To encrypt a non-system partition and standard containers, that uses SHA-256, SHA-512 or Whirlpool: iterations = 500000
PIM is used in VeraCrypt since version 1.12 |
Get more information about Elcomsoft Forensic Disk Decryptor
Get full version of Elcomsoft Forensic Disk Decryptor