What Is the SHA-1 Hash of "example"?

The SHA-1 hash of "example" is c3499c2729730a7f807efb8676a92dcb6f8a3f8f. This is a 40-character hexadecimal string representing 160 bits. Even a single-character change to the input produces a completely different hash due to the avalanche effect.

About SHA-1

SHA-1 (Secure Hash Algorithm 1) produces a 160-bit (40-character hex) hash. Developed by the NSA and published by NIST in 1995, SHA-1 was the standard for TLS certificates, Git commits, and file integrity. In 2017, Google demonstrated the first practical SHA-1 collision (SHAttered). SHA-1 is deprecated for security uses -- modern applications should use SHA-256 or SHA-3.

How SHA-1 Computes This Hash

  1. Pad the message to a multiple of 512 bits (append 1 bit, zeros, then 64-bit length)
  2. Initialize five 32-bit state variables (h0-h4) to fixed constants
  3. Expand each 512-bit block into 80 32-bit words using XOR and left rotation
  4. Process through 80 rounds using nonlinear functions (Ch, Parity, Maj)
  5. After all blocks, concatenate h0-h4 to produce the 160-bit digest

Hash Details

Inputexample
AlgorithmSHA-1
Hash (hex)c3499c2729730a7f807efb8676a92dcb6f8a3f8f
Character count40 hex characters
Bit length160 bits

Security warning: SHA-1 is cryptographically broken. Do not use it for passwords, digital signatures, or any security-critical purpose. Use bcrypt, Argon2, or scrypt for password hashing, and SHA-256+ for data integrity.

Verify It Yourself

JavaScript (Node.js)

require('crypto').createHash('sha1').update('example').digest('hex');
// "c3499c2729730a7f807efb8676a92dcb6f8a3f8f"

Python

import hashlib
hashlib.sha1(b'example').hexdigest()
# 'c3499c2729730a7f807efb8676a92dcb6f8a3f8f'

Bash

echo -n 'example' | sha1sum
# c3499c2729730a7f807efb8676a92dcb6f8a3f8f  -

Try It Yourself

Use our SHA-1 Hash Generator to hash any string instantly.

Frequently Asked Questions

Is SHA-1 safe to use in 2026?

SHA-1 is cryptographically broken and should not be used for security purposes. It is still acceptable for non-security checksums and cache keys.

Can I reverse a SHA-1 hash?

No. SHA-1 is a one-way function. Common inputs like "example" can be found via rainbow tables, which is why you should never use plain SHA-1 for passwords -- use bcrypt or Argon2 instead.

What is the avalanche effect?

The avalanche effect means that a tiny change in the input (even one bit) causes roughly 50% of the output bits to change. This makes it impossible to predict the hash of a similar input from a known hash.

Built by Michael Lip. 100% client-side — no data leaves your browser.