All real crypto keys come from PRNGs (if they don't, you have bigger problems). If your PRNG sucks, you're in trouble. You aren't as secure as AES; you're as secure as your RNG.<p>Bernstein used a similar visualization to show diffusion in his stream cipher over multiple rounds:<p><a href="http://cr.yp.to/snuffle/diffusion.html" rel="nofollow">http://cr.yp.to/snuffle/diffusion.html</a>
Author, please check your site for hacks. ESET Security detects malware and blocks connection, and bogus JS is returned after the </html> tag.<p>Edit: it's loading scripts and iframes from harpear.ru, which is on a lot of known malware domain blacklists.
Wrote a similar script a while back to vizualize any binary data. <a href="http://www.velvetcache.org/2010/03/15/bin2img-data-visualization-with-php" rel="nofollow">http://www.velvetcache.org/2010/03/15/bin2img-data-visualiza...</a>