What Is the SHA-512 Hash of "example"?

The SHA-512 hash of "example" is 3bb12eda3c298db5de25597f54d924f2e17e78a26ad8953ed8218ee682f0bbbe9021e2f3009d152c911bf1f25ec683a902714166767afbd8e5bd0fb0124ecb8a. This is a 128-character hexadecimal string representing 512 bits. Even a single-character change to the input produces a completely different hash due to the avalanche effect.

About SHA-512

SHA-512 is the largest member of the SHA-2 family, producing a 512-bit (128-character hex) hash. It is actually faster than SHA-256 on 64-bit processors because it operates on 64-bit words. SHA-512 is used in high-security applications, SSH key fingerprints, and some cryptocurrency protocols. Like SHA-256, it has no known practical vulnerabilities.

How SHA-512 Computes This Hash

  1. Pad the message to a multiple of 1024 bits (append 1 bit, zeros, then 128-bit length)
  2. Initialize eight 64-bit state variables (h0-h7) from the fractional parts of the square roots of the first 8 primes
  3. Expand each 1024-bit block into 80 64-bit words using sigma functions
  4. Process through 80 rounds using Ch, Maj, and two sigma functions with round constants derived from cube roots of the first 80 primes
  5. After all blocks, concatenate h0-h7 to produce the 512-bit digest

Hash Details

Inputexample
AlgorithmSHA-512
Hash (hex)3bb12eda3c298db5de25597f54d924f2e17e78a26ad8953ed8218ee682f0bbbe9021e2f3009d152c911bf1f25ec683a902714166767afbd8e5bd0fb0124ecb8a
Character count128 hex characters
Bit length512 bits

Security note: While SHA-512 is secure for data integrity and checksums, never use plain SHA-512 for password hashing. Passwords should be hashed with bcrypt, Argon2, or scrypt, which include salting and key stretching.

Verify It Yourself

JavaScript (Node.js)

require('crypto').createHash('sha512').update('example').digest('hex');
// "3bb12eda3c298db5de25597f54d924f2e17e78a26ad8953ed8218ee682f0bbbe9021e2f3009d152c911bf1f25ec683a902714166767afbd8e5bd0fb0124ecb8a"

Python

import hashlib
hashlib.sha512(b'example').hexdigest()
# '3bb12eda3c298db5de25597f54d924f2e17e78a26ad8953ed8218ee682f0bbbe9021e2f3009d152c911bf1f25ec683a902714166767afbd8e5bd0fb0124ecb8a'

Bash

echo -n 'example' | sha512sum
# 3bb12eda3c298db5de25597f54d924f2e17e78a26ad8953ed8218ee682f0bbbe9021e2f3009d152c911bf1f25ec683a902714166767afbd8e5bd0fb0124ecb8a  -

Try It Yourself

Use our SHA-512 Hash Generator to hash any string instantly.

Frequently Asked Questions

Is SHA-512 safe to use in 2026?

SHA-512 remains cryptographically secure with no known practical attacks. It is safe for data integrity, digital signatures, and checksums. For password hashing, use bcrypt or Argon2 instead.

Can I reverse a SHA-512 hash?

No. SHA-512 is a one-way function. Common inputs like "example" can be found via rainbow tables, which is why you should never use plain SHA-512 for passwords -- use bcrypt or Argon2 instead.

What is the avalanche effect?

The avalanche effect means that a tiny change in the input (even one bit) causes roughly 50% of the output bits to change. This makes it impossible to predict the hash of a similar input from a known hash.

Built by Michael Lip. 100% client-side — no data leaves your browser.