Tails - Weak cryptographic parameters in LUKS1 https://tails.boum.org/security/argon2id/index.en.html #cryptsetup #parameter #dm-crypt #argon2id #weakness #crypto #pbkdf2 #tails #luks #kdf
#cryptsetup #parameter #dm #argon2id #weakness #crypto #pbkdf2 #tails #luks #kdf
Do anyone can tell me if this rencryption (digest) of cryptsetup is facutally secure to bruteforce attack and acttually don't take 4 year to open the device (modern cpu Ryzen 2700X) ?
cryptsetup luksChangeKey --pbkdf argon2id --hash sha512 --iter-time X --pbkdf-memory Y --pbkdf-parallel Z <device>
cryptsetup-reencrypt --pbkdf=argon2id --hash=sha512 --iter-time=X2 --pbkdf-memory=Y2 --pbkdf-parallel=Z2 <device>
I search a proper X X2 Y Y2 Z and Z2, knowing the cpu are from Ryzen 5 3XXXH, and Intel Gen 11 (laptop)
I ask because i know these settings for pbkdf2 but not for argon2id.
#security #encryption #argon2 #argon2id
#Bitwarden released #Argon2id encryption support
2 years behind KeePass.
https://github.com/bitwarden/clients/releases/tag/web-v2023.2.0