VeraCrypt
aboutsummaryrefslogtreecommitdiff
path: root/doc/html/Personal Iterations Multiplier (PIM).html
diff options
context:
space:
mode:
authorMounir IDRASSI <mounir.idrassi@idrix.fr>2022-03-27 16:33:40 +0200
committerMounir IDRASSI <mounir.idrassi@idrix.fr>2022-03-27 16:34:42 +0200
commita077eb94ef66dfdec545d176a34dc1e0e47e5da2 (patch)
tree2c3853ca79fff654f12f7d40ec1758c7a000b5f3 /doc/html/Personal Iterations Multiplier (PIM).html
parent540fb52acac15be194b5d6849ecf7e9ce5143096 (diff)
downloadVeraCrypt-a077eb94ef66dfdec545d176a34dc1e0e47e5da2.tar.gz
VeraCrypt-a077eb94ef66dfdec545d176a34dc1e0e47e5da2.zip
Documentation: clearer description of how number of iterations are calculated
Diffstat (limited to 'doc/html/Personal Iterations Multiplier (PIM).html')
-rw-r--r--doc/html/Personal Iterations Multiplier (PIM).html4
1 files changed, 3 insertions, 1 deletions
diff --git a/doc/html/Personal Iterations Multiplier (PIM).html b/doc/html/Personal Iterations Multiplier (PIM).html
index 5271ced2..02921072 100644
--- a/doc/html/Personal Iterations Multiplier (PIM).html
+++ b/doc/html/Personal Iterations Multiplier (PIM).html
@@ -44,7 +44,9 @@
Header Key Derivation</a>).</p>
<p>When a PIM value is specified, the number of iterations is calculated as follows:</p>
<ul>
-<li>For system encryption that doesn't use SHA-512 or Whirlpool: Iterations = <strong>PIM x 2048</strong> </li><li>For system encryption that uses SHA-512 or Whirlpool, non-system encryption and file containers: Iterations = <strong>15000 &#43; (PIM x 1000)</strong>
+<li>For system encryption that doesn't use SHA-512 or Whirlpool: Iterations = <strong>PIM x 2048</strong>
+</li><li>For system encryption that uses SHA-512 or Whirlpool: Iterations = <strong>15000 &#43; (PIM x 1000)</strong>
+</li><li>For non-system encryption and file containers: Iterations = <strong>15000 &#43; (PIM x 1000)</strong>
</li></ul>
<p>Prior to version 1.12, the security of a VeraCrypt volume was only based on the password strength because VeraCrypt was using a fixed number of iterations.<br>
With the introduction of PIM, VeraCrypt has a 2-dimensional security space for volumes based on the couple (Password, PIM). This provides more flexibility for adjusting the desired security level while also controlling the performance of the mount/boot operation.</p>