Interactive Hashing Demo

See hash functions in action and explore the avalanche effect

Educational Notice

This demo uses simplified hash implementations for educational purposes. For real-world applications, use established cryptographic libraries with proper implementations of SHA-256, SHA-3, etc.

Input Text

Input length: 11 characters

Hash Results

Simple Hash
Basic demonstration hash (32-bit)
8 characters
Computing...
DJB2 Hash
Classic string hash algorithm
8 characters
Computing...
FNV Hash
Fowler-Noll-Vo hash function
8 characters
Computing...
MD5-like
Simulated MD5 output (demo only)
32 characters
Computing...
SHA-256-like
Simulated SHA-256 output (demo only)
64 characters
Computing...

Avalanche Effect Demonstration

Compare how small changes in input create dramatically different outputs:

Input 1: "Hello World"
Input 2: "Hello world" (lowercase 'w')
Notice:

Changing just one letter (W → w) completely changes the entire hash output. This is the avalanche effect - a fundamental property of good hash functions.

Hash Function Properties

Properties Demonstrated
  • Deterministic: Same input = same output
  • Fixed Size: Output length constant
  • Avalanche Effect: Small change = big difference
  • Fast Computation: Quick to calculate
Real Implementation Notes

Security Note: This demo shows educational hash functions. Production systems should use:

  • SHA-256, SHA-3 for general hashing
  • bcrypt, scrypt, Argon2 for passwords
  • HMAC for message authentication
  • Established cryptographic libraries
Go Back

Return to the main lesson to review concepts.

Hash Algorithms Lesson
Test Knowledge

Take a quiz to test your understanding.

Take Quiz
Next Topic

Learn about related cryptographic concepts.

Symmetric Crypto