After reviewing the benchmark results, the administrator decides to quadruple the amount of RAM that the Argon2 key-derivation step consumes, while leaving every other KDF parameter unchanged. Which additional cryptsetup option accomplishes this goal?
The Argon2 KDF used by LUKS2 supports three cost parameters: iterations (time), memory, and parallelism (threads). The cryptsetup option that directly controls the memory cost is --pbkdf-memory <number>, where the value (in kibibytes) sets the maximum amount of RAM Argon2 will reserve during key stretching. Increasing this value makes each password-guess more expensive in GPU/ASIC attacks.
--pbkdf-parallel changes thread count, not memory; increasing it without more RAM does little to slow brute-force searches. --pbkdf-force-iterations overrides the time-cost only and has no effect on memory usage. --keyslot-cipher selects the cipher used to encrypt keyslots and is unrelated to KDF parameters.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Argon2 and why is it used in cryptsetup?
Open an interactive chat with Bash
How does increasing `--pbkdf-memory` enhance security?
Open an interactive chat with Bash
What are the differences between the Argon2 key-derivation parameters: iterations, memory, and parallelism?
Open an interactive chat with Bash
CompTIA Linux+ XK0-006 (V8)
Security
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
IT & Cybersecurity Package Join Premium for Full Access