“The goal of a good hash function is to make it extremely difficult for attackers to find ways of generating inputs that hash to the same value…” Quantum computing is certainly a veritable threat to encryption. But what about its sister cryptographic apparatus, the hash? Arguably as important as encryption, the hash provides vital services to verifying data integrity. How much of a threat is quantum computing to this function?

This report is found at Medium…