Interactive Hashing Demo
See hash functions in action and explore the avalanche effect
Educational Notice
This demo uses simplified hash implementations for educational purposes. For real-world applications, use established cryptographic libraries with proper implementations of SHA-256, SHA-3, etc.
Input Text
Input length: 11 characters
Hash Results
Simple Hash
Basic demonstration hash (32-bit)Computing...
DJB2 Hash
Classic string hash algorithmComputing...
FNV Hash
Fowler-Noll-Vo hash functionComputing...
MD5-like
Simulated MD5 output (demo only)Computing...
SHA-256-like
Simulated SHA-256 output (demo only)Computing...
Avalanche Effect Demonstration
Compare how small changes in input create dramatically different outputs:
Input 1: "Hello World"
Input 2: "Hello world" (lowercase 'w')
Notice:
Changing just one letter (W → w) completely changes the entire hash output. This is the avalanche effect - a fundamental property of good hash functions.
Hash Function Properties
Properties Demonstrated
- Deterministic: Same input = same output
- Fixed Size: Output length constant
- Avalanche Effect: Small change = big difference
- Fast Computation: Quick to calculate
Real Implementation Notes
Security Note: This demo shows educational hash functions. Production systems should use:
- SHA-256, SHA-3 for general hashing
- bcrypt, scrypt, Argon2 for passwords
- HMAC for message authentication
- Established cryptographic libraries
Go Back
Return to the main lesson to review concepts.
Hash Algorithms LessonTest Knowledge
Take a quiz to test your understanding.
Take QuizNext Topic
Learn about related cryptographic concepts.
Symmetric Crypto