The NIST defines a vulnerability in RIM Blackberry encryption discovered last October.
Apparently, Blackberry's flavour of PBKDF2 was weak. They say:
The offline backup mechanism in Research In Motion (RIM) BlackBerry Desktop Software uses single-iteration PBKDF2, which makes it easier for local users to decrypt a .ipd file via a brute-force attack.
[Note: emphasis added.]
What does "single-iteration" mean?
Does it mean that the fourth PBKDF2 parameter was 1? (Considering the function
PBKDF2 (HMAC, password, salt, nbiterations, length)
.)
Or do we actually have to feed the result of PBKDF2 to itself, over and over again, a great number of times?