What Is the SHA-512 Hash of "example"?
The SHA-512 hash of "example" is 3bb12eda3c298db5de25597f54d924f2e17e78a26ad8953ed8218ee682f0bbbe9021e2f3009d152c911bf1f25ec683a902714166767afbd8e5bd0fb0124ecb8a. This is a 128-character hexadecimal string representing 512 bits. Even a single-character change to the input produces a completely different hash due to the avalanche effect.
About SHA-512
SHA-512 is the largest member of the SHA-2 family, producing a 512-bit (128-character hex) hash. It is actually faster than SHA-256 on 64-bit processors because it operates on 64-bit words. SHA-512 is used in high-security applications, SSH key fingerprints, and some cryptocurrency protocols. Like SHA-256, it has no known practical vulnerabilities.
How SHA-512 Computes This Hash
- Pad the message to a multiple of 1024 bits (append 1 bit, zeros, then 128-bit length)
- Initialize eight 64-bit state variables (h0-h7) from the fractional parts of the square roots of the first 8 primes
- Expand each 1024-bit block into 80 64-bit words using sigma functions
- Process through 80 rounds using Ch, Maj, and two sigma functions with round constants derived from cube roots of the first 80 primes
- After all blocks, concatenate h0-h7 to produce the 512-bit digest
Hash Details
| Input | example |
| Algorithm | SHA-512 |
| Hash (hex) | 3bb12eda3c298db5de25597f54d924f2e17e78a26ad8953ed8218ee682f0bbbe9021e2f3009d152c911bf1f25ec683a902714166767afbd8e5bd0fb0124ecb8a |
| Character count | 128 hex characters |
| Bit length | 512 bits |
Security note: While SHA-512 is secure for data integrity and checksums, never use plain SHA-512 for password hashing. Passwords should be hashed with bcrypt, Argon2, or scrypt, which include salting and key stretching.
Verify It Yourself
JavaScript (Node.js)
require('crypto').createHash('sha512').update('example').digest('hex');
// "3bb12eda3c298db5de25597f54d924f2e17e78a26ad8953ed8218ee682f0bbbe9021e2f3009d152c911bf1f25ec683a902714166767afbd8e5bd0fb0124ecb8a"
Python
import hashlib
hashlib.sha512(b'example').hexdigest()
# '3bb12eda3c298db5de25597f54d924f2e17e78a26ad8953ed8218ee682f0bbbe9021e2f3009d152c911bf1f25ec683a902714166767afbd8e5bd0fb0124ecb8a'
Bash
echo -n 'example' | sha512sum
# 3bb12eda3c298db5de25597f54d924f2e17e78a26ad8953ed8218ee682f0bbbe9021e2f3009d152c911bf1f25ec683a902714166767afbd8e5bd0fb0124ecb8a -
Try It Yourself
Use our SHA-512 Hash Generator to hash any string instantly.
Frequently Asked Questions
Is SHA-512 safe to use in 2026?
SHA-512 remains cryptographically secure with no known practical attacks. It is safe for data integrity, digital signatures, and checksums. For password hashing, use bcrypt or Argon2 instead.
Can I reverse a SHA-512 hash?
No. SHA-512 is a one-way function. Common inputs like "example" can be found via rainbow tables, which is why you should never use plain SHA-512 for passwords -- use bcrypt or Argon2 instead.
What is the avalanche effect?
The avalanche effect means that a tiny change in the input (even one bit) causes roughly 50% of the output bits to change. This makes it impossible to predict the hash of a similar input from a known hash.