Appendix B: How It Works

AT -

Mycelium Entropy uses one primary and two secondary sources of entropy. The raw sources are mixed and entropy is extracted using the SHA-512 cryptographic hash function. The results are rendered to a JPEG file, which is generated on demand. All sensitive information, such as keys and JPEG contents, is kept in volatile memory and is wiped out within seven seconds of the device’s removal from the USB port.

Have more questions? Submit a request

Comments