I think they are randomized to protect against certain techniques of guessing your (encrypted) data, or to protect against DoS attacks based on specially crafted data patterns that would trigger unlikely events at unusually high rates - which you cannot craft if you donβt know the parameters (just like salts for hash tables in some web backend scripting languages).
Will a hacker be able to crack the password when using the same chunker parameter for different repositories, especially same chunker parameter and same password for different repo?