Don't spend $10k on a bootcamp. Try our back-end career path first.
Back home

(Very) Basic Intro to Hash Functions (SHA-256, MD5, etc)

By Lane Wagner on Jan 1, 2020

Hash functions are used to securely store passwords, find duplicate records, quickly store and retrieve data, among other useful computational tasks. As a practical example, all user passwords on are hashed using Bcrypt to ensure that if an attacker were ever to gain access to our database our user’s passwords wouldn’t be compromised.

I want to focus on several important features of cryptographic hash functions, arguably the most important features:

Other hash function explainers

If you’re looking for an explanation of a different hash function, we may have you covered

A simple path to your career in back-end development

The pace of's JavaScript, Python and Go courses has been perfect for me. The diverse community in Discord is a blast, and other members are quick to help out with detailed answers and explanations.

- Daniel Gerep from Cassia, Brasil

Hash Functions Scramble Data Deterministically

Think of a Rubix cube.

completed rubix cube

I start with the cube unscrambled. If I start twisting randomly, by the end I will end up with something that does not resemble anything close to what I started with. Also, if I were to start over and do the exact same series of moves, I would be able to repeatedly get the exact same outcome. Even though the outcome may appear random, it isn’t at all. That is what deterministic means.

Determinism is important for securely storing a password. For instance, let’s pretend my password is “iLoveBitcoin”

I can use a hash function to scramble it:

iLoveBitcoin → “2f5sfsdfs5s1fsfsdf98ss4f84sfs6d5fs2d1fdf15”

Now, if anyone were to see the scrambled version, they wouldn’t know my original password! This is important because it means that as a website developer, I only need to store the hash (scrambled data) of my user’s password to be able to verify them. When the user signs up, I hash the password and store it in my database. When the user logs in, I just hash what they typed in and compare the two hashes. Because a given input always produces the same hash, this works every time.

If a website stores passwords in plain-text (not hashed) it is a huge breach of security. If someone were to hack that site’s database and find all the emails stored with plain-text passwords, they could then use those combinations and try them on other websites.

No Matter the Input, the Output is the Same Size

If I hash a single word the output will be a certain size (in the case of SHA-256, a particular hashing function, the size is 256 bits). If I hash a book, the output will be the same size.

This is another important feature because it can save us computing time. A classic example is using a hash as a key in a data map. A data map is a simple structure used in computer science to store data.

key value database


When a program stores data in a map, a key and value are given to the map. When a program wants to access the value, it can give the appropriate key to the map and receive the corresponding value. Data maps are good because they can find data instantly. The key is used as an address that the computer can find immediately, instead of taking hours searching through millions of records.

Because keys are like addresses, they can’t be too large. If I want to store books in a data map I can hash the contents of the book and use the hash as a key. As a programmer, I can simply use the hash to look up the contents of the book instead of trying to sort through thousands of records by title, author, etc.

Get a back-end job without spending $10k on a bootcamp

I was a field service engineer and I wanted to become a backend developer, but work and family limited my options. Since completing the back-end career path on, I now have a job offer in hand and I'm starting my career as a software developer!

- Özgür Yildirim from Germany

How Do They Work?

Here is the real challenge of writing this article. I’m going to keep it extremely simple and omit the actual implementation details while giving you a basic idea of what the computer actually does when it hashes some data.

Let’s walk through an example algorithm I’m making up on the fly for this demonstration, LANEHASH:


iLoveBitcoin→ 100010100000101111

100010100000101111 → 101000001011111000

101000001011111000 → 110011110 & 000001100

110011110 → 414

000001100→ 12

414 *12 = 4968

4968 ^ 2 = 24681024

24681024 →1011110001001101001000000

1011110001001101001000000 → 1011110001001101

1011110001001101 → “8sj209dsns02k2”

As you can see, if you start with the same word at the beginning, you will always get the same output at the end. However, if you even change one letter, the outcome will be drastically changed.


On the steps where I convert from English to binary, and from binary to English, I followed no pattern. Don’t let that confuse you. There are many different ways to convert binary data to English and back, I just didn’t want to get hung up on that in this article.

Learn back-end without spending $10,000+ on a bootcamp

Related Reading