I accidentally overwrote a whole LUKS1 header without any backup. Since I still have the password with which the header was created - is there any way that this information helps me to reduce the range of potential master keys?
I realize that the mapping from password to key still involves some randomization, so this range might still be pretty big. But assuming I am willing to put in a few years of brute-forcing effort - is there any hope?
Or is the master key completely detached from my password and the only solution to get back my data would be to brute-force a 256 bit key? (which I know is virtually impossible)