volume 13 issue 3 pages 919-934

Quantum Implementation and Analysis of SHA-2 and SHA-3

Kyungbae Jang 1
Sejin Lim 1
Yujin Oh 1
Hyunjun Kim 1
Anubhab Baksi 2, 3
Sumanta Chakraborty 4
Hwa-Jeong Seo 1
Publication typeJournal Article
Publication date2025-07-01
scimago Q1
wos Q1
SJR1.284
CiteScore14.4
Impact factor5.4
ISSN21686750, 23764562
Abstract
Quantum computers have the potential to solve a number of hard problems that are believed to be almost impossible to solve by classical computers. This observation has sparked a surge of research to apply quantum algorithms against the cryptographic systems to evaluate its quantum resistance. In assessing the security strength of the cryptographic algorithms against the upcoming quantum threats, it is crucial to precisely estimate the quantum resource requirement (generally in terms of circuit depth and quantum bit count). The National Institute of Standards and Technology by the US government specified five quantum security levels so that the relative quantum strength of a given cipher can be compared to the standard ones. There have been some progress in the NIST-specified quantum security levels for the odd levels (i.e., 1, 3 and 5), following the work of Jaques et al. (Eurocrypt’20). However, levels 2 and 4, which correspond to the quantum collision finding attacks for the SHA-2 and SHA-3 hash functions, quantum attack complexities are arguably not well-studied. This is where our article fits in. In this article, we present novel techniques for optimizing the quantum circuit implementations for SHA-2 and SHA-3 algorithms in all the categories specified by NIST. After that, we evaluate the quantum circuits of target cryptographic hash functions for quantum collision search. Finally, we define the quantum attack complexity for levels 2 and 4, and comment on the security strength of the extended level. We present new concepts to optimize the quantum circuits at the component level and the architecture level.
Found 
Found 

Are you a researcher?

Create a profile to get free access to personal recommendations for colleagues and new articles.
Metrics
6
Share
Cite this
GOST |
Cite this
GOST Copy
Jang K. et al. Quantum Implementation and Analysis of SHA-2 and SHA-3 // IEEE Transactions on Emerging Topics in Computing. 2025. Vol. 13. No. 3. pp. 919-934.
GOST all authors (up to 50) Copy
Jang K., Lim S., Oh Y., Kim H., Baksi A., Chakraborty S., Seo H. Quantum Implementation and Analysis of SHA-2 and SHA-3 // IEEE Transactions on Emerging Topics in Computing. 2025. Vol. 13. No. 3. pp. 919-934.
RIS |
Cite this
RIS Copy
TY - JOUR
DO - 10.1109/tetc.2025.3546648
UR - https://ieeexplore.ieee.org/document/10918610/
TI - Quantum Implementation and Analysis of SHA-2 and SHA-3
T2 - IEEE Transactions on Emerging Topics in Computing
AU - Jang, Kyungbae
AU - Lim, Sejin
AU - Oh, Yujin
AU - Kim, Hyunjun
AU - Baksi, Anubhab
AU - Chakraborty, Sumanta
AU - Seo, Hwa-Jeong
PY - 2025
DA - 2025/07/01
PB - Institute of Electrical and Electronics Engineers (IEEE)
SP - 919-934
IS - 3
VL - 13
SN - 2168-6750
SN - 2376-4562
ER -
BibTex |
Cite this
BibTex (up to 50 authors) Copy
@article{2025_Jang,
author = {Kyungbae Jang and Sejin Lim and Yujin Oh and Hyunjun Kim and Anubhab Baksi and Sumanta Chakraborty and Hwa-Jeong Seo},
title = {Quantum Implementation and Analysis of SHA-2 and SHA-3},
journal = {IEEE Transactions on Emerging Topics in Computing},
year = {2025},
volume = {13},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
month = {jul},
url = {https://ieeexplore.ieee.org/document/10918610/},
number = {3},
pages = {919--934},
doi = {10.1109/tetc.2025.3546648}
}
MLA
Cite this
MLA Copy
Jang, Kyungbae, et al. “Quantum Implementation and Analysis of SHA-2 and SHA-3.” IEEE Transactions on Emerging Topics in Computing, vol. 13, no. 3, Jul. 2025, pp. 919-934. https://ieeexplore.ieee.org/document/10918610/.