Skip to main content

Module mutation

Module mutation 

Source

Structs§

MutationChain
HYDRA mutation chain — each token mutation ratchets a SHA3-256 hash chain. This provides Post-Compromise Security (PCS): a stolen token becomes invalid once the legitimate holder advances the chain.

Functions§

certify_entropy
KOLMOGOROV entropy certification: verify that a byte slice is “sufficiently random” by checking that no 4-byte pattern repeats more than a statistical threshold. Real randomness test: run-length compression ratio must be > 0.85.