What Is the SHA-1 Hash of "qwerty"?

The SHA-1 hash of "qwerty" is b1b3773a05c0ed0176787a4f1574ff0075f7521e. This is a 40-character hexadecimal string representing 160 bits. Even a single-character change to the input produces a completely different hash due to the avalanche effect.

About SHA-1

SHA-1 (Secure Hash Algorithm 1) produces a 160-bit (40-character hex) hash. Developed by the NSA and published by NIST in 1995, SHA-1 was the standard for TLS certificates, Git commits, and file integrity. In 2017, Google demonstrated the first practical SHA-1 collision (SHAttered). SHA-1 is deprecated for security uses -- modern applications should use SHA-256 or SHA-3.

How SHA-1 Computes This Hash

  1. Pad the message to a multiple of 512 bits (append 1 bit, zeros, then 64-bit length)
  2. Initialize five 32-bit state variables (h0-h4) to fixed constants
  3. Expand each 512-bit block into 80 32-bit words using XOR and left rotation
  4. Process through 80 rounds using nonlinear functions (Ch, Parity, Maj)
  5. After all blocks, concatenate h0-h4 to produce the 160-bit digest

Hash Details

Inputqwerty
AlgorithmSHA-1
Hash (hex)b1b3773a05c0ed0176787a4f1574ff0075f7521e
Character count40 hex characters
Bit length160 bits

Security warning: SHA-1 is cryptographically broken. Do not use it for passwords, digital signatures, or any security-critical purpose. Use bcrypt, Argon2, or scrypt for password hashing, and SHA-256+ for data integrity.

Common password alert: "qwerty" appears in virtually every common password list and breach database. If this hash appears in your system, the associated account is trivially compromised via rainbow table lookup.

Verify It Yourself

JavaScript (Node.js)

require('crypto').createHash('sha1').update('qwerty').digest('hex');
// "b1b3773a05c0ed0176787a4f1574ff0075f7521e"

Python

import hashlib
hashlib.sha1(b'qwerty').hexdigest()
# 'b1b3773a05c0ed0176787a4f1574ff0075f7521e'

Bash

echo -n 'qwerty' | sha1sum
# b1b3773a05c0ed0176787a4f1574ff0075f7521e  -

Try It Yourself

Use our SHA-1 Hash Generator to hash any string instantly.

Frequently Asked Questions

Is SHA-1 safe to use in 2026?

SHA-1 is cryptographically broken and should not be used for security purposes. It is still acceptable for non-security checksums and cache keys.

Can I reverse a SHA-1 hash?

No. SHA-1 is a one-way function. Common inputs like "qwerty" can be found via rainbow tables, which is why you should never use plain SHA-1 for passwords -- use bcrypt or Argon2 instead.

What is the avalanche effect?

The avalanche effect means that a tiny change in the input (even one bit) causes roughly 50% of the output bits to change. This makes it impossible to predict the hash of a similar input from a known hash.

Built by Michael Lip. 100% client-side — no data leaves your browser.