From a077eb94ef66dfdec545d176a34dc1e0e47e5da2 Mon Sep 17 00:00:00 2001
From: Mounir IDRASSI
Date: Sun, 27 Mar 2022 16:33:40 +0200
Subject: Documentation: clearer description of how number of iterations are
calculated
---
doc/html/Personal Iterations Multiplier (PIM).html | 4 +++-
1 file changed, 3 insertions(+), 1 deletion(-)
(limited to 'doc/html/Personal Iterations Multiplier (PIM).html')
diff --git a/doc/html/Personal Iterations Multiplier (PIM).html b/doc/html/Personal Iterations Multiplier (PIM).html
index 5271ced2..02921072 100644
--- a/doc/html/Personal Iterations Multiplier (PIM).html
+++ b/doc/html/Personal Iterations Multiplier (PIM).html
@@ -44,7 +44,9 @@
Header Key Derivation).
When a PIM value is specified, the number of iterations is calculated as follows:
-- For system encryption that doesn't use SHA-512 or Whirlpool: Iterations = PIM x 2048
- For system encryption that uses SHA-512 or Whirlpool, non-system encryption and file containers: Iterations = 15000 + (PIM x 1000)
+
- For system encryption that doesn't use SHA-512 or Whirlpool: Iterations = PIM x 2048
+
- For system encryption that uses SHA-512 or Whirlpool: Iterations = 15000 + (PIM x 1000)
+
- For non-system encryption and file containers: Iterations = 15000 + (PIM x 1000)
Prior to version 1.12, the security of a VeraCrypt volume was only based on the password strength because VeraCrypt was using a fixed number of iterations.
With the introduction of PIM, VeraCrypt has a 2-dimensional security space for volumes based on the couple (Password, PIM). This provides more flexibility for adjusting the desired security level while also controlling the performance of the mount/boot operation.
--
cgit v1.2.3