The default of using 10000 pbkdf2 rounds for the key derivation makes things very slow, and can be seen by the fact we reduce them to 1000 in tests already.
Perhaps we should just keep them at 1000 always or find a better derive function that is not as slow with comparable security.
The default of using 10000 pbkdf2 rounds for the key derivation makes things very slow, and can be seen by the fact we reduce them to 1000 in tests already.
Perhaps we should just keep them at 1000 always or find a better derive function that is not as slow with comparable security.