0

I'm currently using KeePass 2 and syncing them via dropbox. I have a few KeePass files (one for websites, one to store software licenses, etc...)

Every time I need a new KeePass file, I just create a copy of the kbdx file, open it, remove all existing entries, change the key transformation rounds to another pseudo-random value.

I do not change the master password and I understand the risk of doing that. I imagine that the salt used for the encryption of the kbdx file is the same for every of my kbdx files since it's probably generated upon creation of the kbdx file.

By using the same master password and salt in every kbdx and just changing the transformation rounds, I believe that it guarantees myself at least the same security than having everything in a single kbdx file.

Am I wrong in believing that? Is my practice actually a security risk by lessening the amount of effort to crack a kbdx file?

2
  • Probably you should have asked in security.stackexchange.com instead.
    – U. Windl
    Commented May 11, 2023 at 12:28
  • @U.Windl Probably didn't exist 10+ years ago.
    – BlakBat
    Commented May 31, 2023 at 8:09

2 Answers 2

0

It's the same.

What is not "safe" is the fact that you have a single master password for all your databases, but you probably get that idea yourself.

How you configure and organize your keepass db is your call and it should not affect the basic security settings.

1
  • I was thinking more along the lines of having (probably) the same salt used, I'll edit the question.
    – BlakBat
    Commented Sep 4, 2012 at 13:50
0

To my understanding changing the rounds for the KDF (Key Derivation Funktion) causes a new encryption key to be used. And probably the salt changes, too. However you still have the same master password.

"If you lost one, you lost all" (meaning: If someone gets or gets your password, all your files are in danger equally).

The only thing you achieved is that no-one can say whether your are using the same master password for all your files, unless that person is able to decrypt one of them.

You must log in to answer this question.

Not the answer you're looking for? Browse other questions tagged .