VeraCrypt is now revamped TrueCrypt
If you're looking for an alternative to TrueCrypt, you could do worse than
VeraCrypt, which
adds iterations and corrects weaknesses in TrueCrypt's API,
drivers and parameter checking. According to the article, "In technical
terms, when a system partition is encrypted, TrueCrypt uses
PBKDF2-RIPEMD160 with 1,000 iterations. For standard containers and
other (i.e. non system) partitions, TrueCrypt uses at most 2,000
iterations. What Idrassi did was beef up the transformation process.
VeraCrypt uses 327,661 iterations of the PBKDF2-RIPEMD160 algorithm for
system partitions, and for standard containers and other partitions it
uses 655,331 iterations of RIPEMD160 and 500,000 iterations of SHA-2 and
Whirlpool, he said. While this makes VeraCrypt slightly slower at
opening encrypted partitions, it makes the software a minimum of 10 and a
maximum of about 300 times harder to brute force.
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.