nlinecomputers
Well-Known Member
- Reaction score
- 8,565
- Location
- Midland TX
With respect that isn't correct.Actually... it isn't.
The number pads the master password to create the encryption key.
Longer keys are harder to crack. This It doesn't change the amount of time a GPU has to take to try a key, it just makes the key longer so it's harder to crack to start with.
BUT, if your password is strong enough on its own, you're still dealing with centuries or longer to crack. KDF matters, but not as much as you'd think. And the person doing the cracking has to figure out what your KDF iteration count is, if they want to use a password to generate the key. So just having a number there... ANY number there, that isn't quite the same as everyone else is yet another password of sorts just by varying the entropy length.
PBKDF2 - Wikipedia
en.wikipedia.org
The iteration is the number of times that the hash is re-encrypted. The hash function is repeated 600,000 times for the new defaults. That takes time which is the point of the function. So a hacker has to guess a password, guess the salt, and then hash it the correct number of hash iterations to finally get your derived key. But a good GPU can run BILLIONS of such hashes so running a password and all the hash combinations just takes time.PBKDF2 applies a pseudorandom function, such as hash-based message authentication code (HMAC), to the input password or passphrase along with a salt value and repeats the process many times to produce a derived key, which can then be used as a cryptographic key in subsequent operations. The added computational work makes password cracking much more difficult, and is known as key stretching.