๐ ๏ธ Free Hashing Tools
Interactive tools for learning hash functions, HMAC, avalanche effects, and more
$ live hash calculator Open the command reference
Compute cryptographic digests locally. Use SHA-256/SHA-512 for integrity; avoid MD5/SHA-1 for security. Optionally compute an HMAC for message authentication.
$ collision demonstration Open the command reference
Explore hash collisions and understand why some algorithms are cryptographically broken. See how different inputs can produce the same hash output.
A collision occurs when two different inputs produce the same hash output. This is a fundamental weakness in cryptographic hash functions.
Collisions can be exploited to create fake documents, bypass security checks, or forge digital signatures. The goal is to make collisions computationally infeasible.
- ๐ด MD5: Broken - collisions found in 2004
- ๐ก SHA-1: Weak - collisions found in 2017
- ๐ข SHA-256: Secure - no collisions found
- โข Use the prefill buttons to try real collision examples
- โข Switch between algorithms to see security differences
- โข Try the known collision examples (MD5/SHA-1)
- โข Use the random collision finder to demonstrate birthday paradox
Quick Collision Analysis
$ avalanche effect (SHA-256) What is diffusion?
Demonstrates diffusion: a single-character change flips many output bits in a secure hash. Edit either side and observe the bit-difference grid and statistics.
$ visualization_lab --interactive=true --live-data=true Learn more
Advanced hash table visualization with real-world data integration. Observe the avalanche effect, experiment with operations, and analyze live blockchain data patterns.
$ HKDF (HMAC-based key derivation) Derivation guide
Derive subkeys from a master key using HKDF-Extract and HKDF-Expand with HMAC-SHA-256.
HKDF (HMAC-based Key Derivation Function) is a standardized method for deriving multiple cryptographic keys from a single master secret. It's used in TLS, VPNs, and secure messaging protocols.
- ๐ต Extract: Converts input keying material (IKM) to a pseudorandom key (PRK) using HMAC-SHA-256
- ๐ข Expand: Derives output keying material (OKM) from PRK using HMAC-SHA-256
- โข TLS Key Derivation: Standard TLS 1.2 key expansion process
- โข Encryption Keys: Deriving encryption keys from Diffie-Hellman shared secrets
- โข Authentication Keys: Creating authentication keys with random salts
- โข Session Keys: Generating longer session keys for extended sessions
- โข Prevents key reuse attacks through unique salts and context
- โข Ensures cryptographic separation between different key purposes
- โข Provides forward secrecy when used with ephemeral keys
- โข Standardized and well-vetted by the cryptographic community
$ Merkle Tree (SHA-256) - Advanced Cryptographic Tool Merkle Reference
Professional Merkle tree implementation for cryptographic verification, blockchain analysis, and inclusion proof validation.
- โข 8 transactions: Coinbase, Payment, Exchange, DeFi, NFT, Lightning, Mixing, Settlement
- โข Real hashes: SHA-256 transaction identifiers
- โข Inclusion proof: Verify any transaction exists in block
- โข Blockchain security: Merkle root links to previous block
- โข 6 transactions: Uniswap, USDC, NFT, DeFi, L2 Bridge, MEV
- โข Real hashes: 0x-prefixed transaction hashes
- โข Inclusion proof: Verify transaction in Ethereum state
- โข Smart contracts: Complex transaction verification
- โข 6 channels: Major exchange connections
- โข Channel states: Commitment transaction hashes
- โข Inclusion proof: Verify channel state in network
- โข Payment routing: Efficient path verification
- โข 8 documents: Whitepapers, protocols, research
- โข Content IDs: Qm-prefixed multihash identifiers
- โข Inclusion proof: Verify document in distributed storage
- โข Content addressing: Decentralized file verification
- โข 8 commits: Project setup, features, tests, docs
- โข Commit hashes: SHA-1 (40-character) identifiers
- โข Inclusion proof: Verify commit in repository history
- โข Version control: Immutable development timeline
- โข 6 certificates: Root CA, Intermediate, Domain certs
- โข Certificate hashes: SHA-256 fingerprint verification
- โข Inclusion proof: Verify cert in trust chain
- โข PKI security: Trust path validation
- โข Deterministic: Same input always produces same root
- โข Tamper-evident: Any change affects the entire path to root
- โข Efficient verification: O(log n) proof size for n leaves
- โข Cryptographic security: Based on SHA-256 collision resistance
- โข Blockchain: Bitcoin transaction verification
- โข Distributed systems: IPFS content addressing
- โข Cryptocurrency: Light client verification
- โข File systems: Integrity verification
$ blockchain_explorer --network=bitcoin --advanced=true Blockchain Basics
Advanced cryptographic blockchain explorer with real-time Bitcoin analysis, transaction verification, cryptographic proof validation, and blockchain mechanics exploration.
Network Configuration
Latest Block Analysis
Block Header Analysis
Cryptographic Hashes
Block Statistics
Advanced Block Analysis
Block Validation Status
Advanced Cryptographic Analysis
Hash Properties
Cryptographic Verification
Hash Distribution Analysis
Advanced Cryptographic Metrics
Bitcoin Address Analyzer
Address Information
Balance Information
Recent Transactions
Address Analytics
UTXO Analysis
Network Analysis
Advanced Transaction Analysis
Transaction Metrics
Input/Output Analysis
Advanced Blockchain Metrics
Network Statistics
Mining Information
Proof of Work
Merkle Tree Structure
Block Validation
Advanced Features
Advanced Cryptographic Tools
Hash Calculator
Address Generator
Generate Address: Creates just a new Bitcoin address (private key not shown)