What Is the SHA-512 Hash of "The quick brown fox jumps over the lazy dog"?
The SHA-512 hash of "The quick brown fox jumps over the lazy dog" is 07e547d9586f6a73f73fbac0435ed76951218fb7d0c8d788a309d785436bbb642e93a252a954f23912547d1e8a3b5ed6e1bfd7097821233fa0538f3db854fee6. This is a 128-character hexadecimal string representing 512 bits. Even a single-character change to the input produces a completely different hash due to the avalanche effect.
About SHA-512
SHA-512 is the largest member of the SHA-2 family, producing a 512-bit (128-character hex) hash. It is actually faster than SHA-256 on 64-bit processors because it operates on 64-bit words. SHA-512 is used in high-security applications, SSH key fingerprints, and some cryptocurrency protocols. Like SHA-256, it has no known practical vulnerabilities.
How SHA-512 Computes This Hash
- Pad the message to a multiple of 1024 bits (append 1 bit, zeros, then 128-bit length)
- Initialize eight 64-bit state variables (h0-h7) from the fractional parts of the square roots of the first 8 primes
- Expand each 1024-bit block into 80 64-bit words using sigma functions
- Process through 80 rounds using Ch, Maj, and two sigma functions with round constants derived from cube roots of the first 80 primes
- After all blocks, concatenate h0-h7 to produce the 512-bit digest
Hash Details
| Input | The quick brown fox jumps over the lazy dog |
| Algorithm | SHA-512 |
| Hash (hex) | 07e547d9586f6a73f73fbac0435ed76951218fb7d0c8d788a309d785436bbb642e93a252a954f23912547d1e8a3b5ed6e1bfd7097821233fa0538f3db854fee6 |
| Character count | 128 hex characters |
| Bit length | 512 bits |
Security note: While SHA-512 is secure for data integrity and checksums, never use plain SHA-512 for password hashing. Passwords should be hashed with bcrypt, Argon2, or scrypt, which include salting and key stretching.
Verify It Yourself
JavaScript (Node.js)
require('crypto').createHash('sha512').update('The quick brown fox jumps over the lazy dog').digest('hex');
// "07e547d9586f6a73f73fbac0435ed76951218fb7d0c8d788a309d785436bbb642e93a252a954f23912547d1e8a3b5ed6e1bfd7097821233fa0538f3db854fee6"
Python
import hashlib
hashlib.sha512(b'The quick brown fox jumps over the lazy dog').hexdigest()
# '07e547d9586f6a73f73fbac0435ed76951218fb7d0c8d788a309d785436bbb642e93a252a954f23912547d1e8a3b5ed6e1bfd7097821233fa0538f3db854fee6'
Bash
echo -n 'The quick brown fox jumps over the lazy dog' | sha512sum
# 07e547d9586f6a73f73fbac0435ed76951218fb7d0c8d788a309d785436bbb642e93a252a954f23912547d1e8a3b5ed6e1bfd7097821233fa0538f3db854fee6 -
Try It Yourself
Use our SHA-512 Hash Generator to hash any string instantly.
Frequently Asked Questions
Is SHA-512 safe to use in 2026?
SHA-512 remains cryptographically secure with no known practical attacks. It is safe for data integrity, digital signatures, and checksums. For password hashing, use bcrypt or Argon2 instead.
Can I reverse a SHA-512 hash?
No. SHA-512 is a one-way function. Common inputs like "The quick brown fox jumps over the lazy dog" can be found via rainbow tables, which is why you should never use plain SHA-512 for passwords -- use bcrypt or Argon2 instead.
What is the avalanche effect?
The avalanche effect means that a tiny change in the input (even one bit) causes roughly 50% of the output bits to change. This makes it impossible to predict the hash of a similar input from a known hash.