In my laptop I have two LUKS encrypted SSDs, one is system SSD (nvme0n1), where the Home folder is with ecryptfs encrypted, another one is Data SSD (nvme1n1), which is purely LUKS encrypted. Both SSDs have the same password. My OS is LMDE6. After some update, I couldn't enter my system, probably because of some failed initramfs update, it said all the time "cryptsetup failed, bad password or options". I've booted a live system and with the help of chroot I've added a new passphrase to the system SSD and could then enter my system again. 

Then I made a terrible mistake: since the system SSD has a new passphrase, I've changed the Data SSD passphrase accordingly via Gnome-Disks, when the Data SSD was mounted. But after the reboot, I couldn't access my Data SSD. It keeps saying all the time "Error unlocking /dev/nvme1n1: Failed to activate device: Incorrect passphrase". But I'm 100% sure that I enter the correct password. Unfortunately, I don't have a header backup of the Data SSD. What can I do now? The header seems to be intact, my guess is the keyslot got damaged during passphrase change via Gnome-Disks. I leave here some outputs of the Data SSD (nvme1n1). Output of lsblk: 

[![lsblk][1]][1]
 
 
and output of blkid: 
[![blkid][2]][2]

and output of cryptsetup luksDump /dev/nvme1n1: 

`LUKS header information`

`Version: 	2`

`Epoch: 	5`

`Metadata area: 	16384 [bytes]`

`Keyslots area: 	16744448 [bytes]`

`UUID: 	cbdd1cfe-91d3-4771-a8ef-f4db3febacb0`

`Label: 	(no label)`

`Subsystem: 	(no subsystem)`

`Flags: 	(no flags)`

`Data segments:`

 `0: crypt`

	`offset: 16777216 [bytes]`
	`length: (whole device)`
	`cipher: aes-xts-plain64`
	`sector: 512 [bytes]`

`Keyslots:`

 `0: luks2`

	`Key: 512 bits`
	`Priority: normal`
	`Cipher: aes-xts-plain64`
	`Cipher key: 512 bits`
	`PBKDF: argon2id`
	`Time cost: 8`
	`Memory: 1048576`
	`Threads: 4`

	`Salt: 8e 31 db 5e c1 36 79 f4 13 5d 8e aa 8b cd 75 f5 
	 52 ed ac 81 7b cd 27 e9 f4 da 05 97 4b da 7d 00` 
	AF stripes: 4000
	AF hash: sha256
	Area offset:290816 [bytes]
	Area length:258048 [bytes]
	Digest ID: 0
`Tokens:`

`Digests:`

 `0: pbkdf2`

	`Hash: sha256
	Iterations: 166970
	Salt: 6f aa 5d 52 7d aa 51 65 2b f4 19 89 b6 dc 3c 63 
	 d0 c5 a0 92 a8 5f 8f 92 37 4a f4 b3 a2 f9 2c c7 
	Digest: d6 1a 7f 0c 5c d3 1e 1e d2 97 b8 65 64 13 46 43 
	 10 d8 f5 94 44 a8 ae b2 eb cb 6a 9f 4a c0 45 df` 


 [1]: https://i.sstatic.net/yzEF2j0w.png
 [2]: https://i.sstatic.net/fzWEQze6.png