The higher the number of iterations, the more processing power you need to generate a key (so… it takes longer). This setting controls how often you repeat this cycle to generate the resulting encryption key. After many cycles, the key that resulted from this process is used to encrypt your database. Then you take said key and derive another one from it. The database is not encrypted with your password, but with a key that gets derived from your password.
0 Comments
Leave a Reply. |