By the way, how can you tell what the default number has been for UEFI system encryption? I don't know if it's been 200000 or 500000 for SHA-512 / Whirlpool / Streebog. It should be in the source code but I don't know where to find it inside.
Windows Event Viewer only shows minor notifications from VeraCrypt that do not seem to be related to the errors I encountered. I have no system-favorite volumes, and the Event Viewer's only information suggests that VeraCrypt is sending out notifications every time my system boots up without mounting any favorite volumes.
Oh, I didn't realize that MBR has those restrictions. Thanks for the help with this ticket!
Do you know if it's a linear change, like if I go from 500,000 to 1,000,000, will it be just about 2x as long, or will it be some kinda huge logarithmic time?
Newer versions of VeraCrypt do support HMAC-SHA-512 / Whirlpool / Streebog for system encryption, I just checked and all those options are there, at least for single-boot Windows. I don't know when these were added, but versions from about four years ago only had SHA-256 / RIPEMD-160, which seems like what the documentation is accurate for. (It needs to be updated)
Thank you very much!
Is there any chance that we could see SHA-3 support for VeraCrypt in the near future? Also, I think I found a small error in the documentation: https://www.veracrypt.fr/en/Header%20Key%20Derivation.html "For system partition encryption (boot encryption), 200000 iterations are used for the HMAC-SHA-256 derivation function and 327661 iterations are used for HMAC-RIPEMD-160." Shouldn't this include all "HMAC-SHA-512, HMAC-SHA-256 and HMAC-Whirlpool" for the 200000 section, rather than just HMAC-SHA-256?...
If I increase my number of iterations, will it slow down read/writing, or just the initial decryption process? I'm considering increasing my amount soon. Also, is there any way to quantify how much more entropy is added by increasing iterations? I've read a variety of different posts on this, but nobody seems to explain their reasoning behind any of their numbers.