I am not an expert in cryptography and therefore I would like to address this problem to people who have been working on this topic for a long time and thus verify the facts from several sources.
I use Winrar for file encryption because it is most suitable for me, it's fast and I'm already skillful with this program. I am using up-to-date version of Winrar which uses PBKDF2(HMAC-SHA256) AES-256 CBC algorithm.
BTW in this link https://connect.ed-diamond.com/MISC/misc-092/usage-de-la-cryptographie-par-les-formats-d-archives-zip-rar-et-7z they says that the number of PBKDF2 iterations is optional 2^15 (default) 2^24 (maximum), however I did not find any command to set this parameter https://documentation.help/WinRAR/, other sources say that the number of iterations varies depending on the version used. Extracting a WinRAR password?
For comparison, here is a link to a password cracking benchmark using a commercial tool. https://blog.elcomsoft.com/2021/04/breaking-rar5-and-7zip-passwords/
Can I 100% trust the PBKDF2(HMAC-SHA256) AES-256 CBC encryption algorithm for this purpose or not, and why?
Thanks
Here are some links I would recommend, it might be helpful:
https://www.rarlab.com/rarnew.htm
https://www.win-rar.com/faq0.html
https://www.win-rar.com/industry.html?&L=0
I would also recommend reading related information on Wikipedia:
WinRAR,PBKDF2,Advanced Encryption Standard,Block cipher mode of operation Cipher block chaining (CBC),Rainbow table,Linear cryptanalysis,Partitioning cryptanalysis,Differential cryptanalysis, Substitution permutation network, Chosen plaintext attack, Chosen ciphertext attack, Rijndael_S-box, S-box