{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T18:03:51Z","timestamp":1773511431777,"version":"3.50.1"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2024,5,9]],"date-time":"2024-05-09T00:00:00Z","timestamp":1715212800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,5,9]],"date-time":"2024-05-09T00:00:00Z","timestamp":1715212800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"DOI":"10.1007\/s11128-024-04396-9","type":"journal-article","created":{"date-parts":[[2024,5,9]],"date-time":"2024-05-09T15:01:57Z","timestamp":1715266917000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Quantum implementation of SHA1 and MD5 and comparison with classical algorithms"],"prefix":"10.1007","volume":"23","author":[{"given":"Prodipto","family":"Das","sequence":"first","affiliation":[]},{"given":"Sumit","family":"Biswas","sequence":"additional","affiliation":[]},{"given":"Sandip","family":"Kanoo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,5,9]]},"reference":[{"key":"4396_CR1","volume-title":"Cryptography and Network Security\u2014Principles and Practice","author":"S William","year":"2002","unstructured":"William, S.: Cryptography and Network Security\u2014Principles and Practice, 7th edn. Pearson Education (2002)","edition":"7"},{"key":"4396_CR2","doi-asserted-by":"publisher","unstructured":"Ratna, A.A.P., Purnamasari, P., Shaugi, A., Salman, M.: Analysis and comparison of MD5 and SHA-1 algorithm implementation in simple-o authentication based security system, pp. 99\u2013104 (2013). https:\/\/doi.org\/10.1109\/QiR.2013.6632545","DOI":"10.1109\/QiR.2013.6632545"},{"key":"4396_CR3","doi-asserted-by":"publisher","unstructured":"Rivest, R.L.: The MD5 Message-Digest Algorithm. RFC Editor (1992). https:\/\/doi.org\/10.17487\/RFC1321. https:\/\/www.rfc-editor.org\/info\/rfc1321","DOI":"10.17487\/RFC1321"},{"key":"4396_CR4","doi-asserted-by":"publisher","first-page":"29","DOI":"10.5120\/12914-9884","volume":"74","author":"V Pandey","year":"2013","unstructured":"Pandey, V., Mishra, V.K.: Architecture based on MD5 and MD5-512 bit applications. Int. J. Comput. Appl. 74, 29\u201333 (2013). https:\/\/doi.org\/10.5120\/12914-9884","journal-title":"Int. J. Comput. Appl."},{"key":"4396_CR5","doi-asserted-by":"crossref","unstructured":"Handschuh, H.: In: Tilborg, H.C.A. (ed.) SHA Family\u2014Secure Hash Algorithm, pp. 565\u2013567. Springer, Boston (2005)","DOI":"10.1007\/0-387-23483-7_388"},{"key":"4396_CR6","doi-asserted-by":"publisher","unstructured":"Putri\u00a0Ratna, A.A., Dewi\u00a0Purnamasari, P., Shaugi, A., Salman, M.: Analysis and comparison of MD5 and SHA-1 algorithm implementation in simple authentication based security system. In: 2013 International Conference on QiR, pp. 99\u2013104 (2013). https:\/\/doi.org\/10.1109\/QiR.2013.6632545","DOI":"10.1109\/QiR.2013.6632545"},{"key":"4396_CR7","unstructured":"Schneier, B.: Schneier on Security: Cryptanalysis of SHA-1"},{"issue":"180","key":"4396_CR8","first-page":"15","volume":"17","author":"SH Standard","year":"1995","unstructured":"Standard, S.H.: Fips pub 180-1. Natl. Inst. Stand. Technol. 17(180), 15 (1995)","journal-title":"Natl. Inst. Stand. Technol."},{"issue":"7779","key":"4396_CR9","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1038\/s41586-019-1666-5","volume":"574","author":"F Arute","year":"2019","unstructured":"Arute, F., Arya, K., Babbush, R., Bacon, D., Bardin, J.C., Barends, R., Biswas, R., Boixo, S., Brandao, F.G., Buell, D.A.: Quantum supremacy using a programmable superconducting processor. Nature 574(7779), 505\u2013510 (2019)","journal-title":"Nature"},{"key":"4396_CR10","doi-asserted-by":"publisher","unstructured":"Marella, S.T., Parisa, H.S.K.: Introduction to quantum computing. In: Zhao, Y. (ed.) Quantum Computing and Communications, Chapter 5. IntechOpen, Rijeka (2020). https:\/\/doi.org\/10.5772\/intechopen.94103. https:\/\/doi.org\/10.5772\/intechopen.94103","DOI":"10.5772\/intechopen.94103"},{"issue":"6","key":"4396_CR11","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1007\/bf01886518","volume":"16","author":"RP Feynman","year":"1986","unstructured":"Feynman, R.P.: Quantum mechanical computers. Found. Phys. 16(6), 507\u2013531 (1986). https:\/\/doi.org\/10.1007\/bf01886518","journal-title":"Found. Phys."},{"key":"4396_CR12","doi-asserted-by":"publisher","first-page":"632","DOI":"10.1007\/3-540-10003-2_104","volume-title":"Automata, Languages and Programming","author":"T Toffoli","year":"1980","unstructured":"Toffoli, T.: Reversible computing. In: Bakker, J., Leeuwen, J. (eds.) Automata, Languages and Programming, pp. 632\u2013644. Springer, Berlin (1980)"},{"key":"4396_CR13","doi-asserted-by":"publisher","first-page":"21091","DOI":"10.1109\/ACCESS.2020.2968985","volume":"8","author":"TM Fernandez-Carames","year":"2020","unstructured":"Fernandez-Carames, T.M., Fraga-Lamas, P.: Towards post-quantum blockchain: a review on blockchain cryptography resistant to quantum computing attacks. IEEE Access 8, 21091\u201321116 (2020)","journal-title":"IEEE Access"},{"key":"4396_CR14","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/MITP.2016.77","volume":"18","author":"LO Mailloux","year":"2016","unstructured":"Mailloux, L.O., Lewis, C.D., Riggs, C., Grimaila, M.R.: Post-quantum cryptography: what advancements in quantum computing mean for it professionals. IT Prof. 18, 42\u201347 (2016)","journal-title":"IT Prof."},{"key":"4396_CR15","doi-asserted-by":"publisher","unstructured":"Zeydan, E., Turk, Y., Aksoy, B., Ozturk, S.B.: Recent advances in post-quantum cryptography for networks: a survey. In: 2022 Seventh International Conference on Mobile And Secure Services (MobiSecServ), pp. 1\u20138 (2022). https:\/\/doi.org\/10.1109\/MobiSecServ50855.2022.9727214","DOI":"10.1109\/MobiSecServ50855.2022.9727214"},{"key":"4396_CR16","doi-asserted-by":"publisher","first-page":"142413","DOI":"10.1109\/ACCESS.2020.3013250","volume":"8","author":"F Borges","year":"2020","unstructured":"Borges, F., Reis, P.R., Pereira, D.: A comparison of security and its performance for key agreements in post-quantum cryptography. IEEE Access 8, 142413\u2013142422 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3013250","journal-title":"IEEE Access"},{"key":"4396_CR17","doi-asserted-by":"publisher","unstructured":"Gueron, S.: Speeding up SHA-1, SHA-256 and SHA-512 on the 2nd generation intel\u00aecore\u00f6 processors. In: 2012 Ninth International Conference on Information Technology New Generations, pp. 824\u2013826 (2012). https:\/\/doi.org\/10.1109\/ITNG.2012.62","DOI":"10.1109\/ITNG.2012.62"},{"issue":"3","key":"4396_CR18","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1109\/11.715312","volume":"44","author":"J-H Park","year":"1998","unstructured":"Park, J.-H., Lim, S.-B.: Key distribution for secure VSAT satellite communications. IEEE Trans. Broadcast. 44(3), 274\u2013277 (1998). https:\/\/doi.org\/10.1109\/11.715312","journal-title":"IEEE Trans. Broadcast."},{"issue":"8","key":"4396_CR19","doi-asserted-by":"publisher","first-page":"1590","DOI":"10.1109\/TCSI.2005.851999","volume":"52","author":"IG Karafyllidis","year":"2005","unstructured":"Karafyllidis, I.G.: Quantum computer simulator based on the circuit model of quantum computation. IEEE Trans. Circuits Syst. I Regul. Pap. 52(8), 1590\u20131596 (2005). https:\/\/doi.org\/10.1109\/TCSI.2005.851999","journal-title":"IEEE Trans. Circuits Syst. I Regul. Pap."},{"issue":"2","key":"4396_CR20","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1109\/TE.2004.825215","volume":"47","author":"BC Grau","year":"2004","unstructured":"Grau, B.C.: How to teach basic quantum mechanics to computer scientists and electrical engineers. IEEE Trans. Educ. 47(2), 220\u2013226 (2004). https:\/\/doi.org\/10.1109\/TE.2004.825215","journal-title":"IEEE Trans. Educ."},{"issue":"8","key":"4396_CR21","doi-asserted-by":"publisher","first-page":"1755","DOI":"10.1109\/LPT.2005.851050","volume":"17","author":"OL Guerreau","year":"2005","unstructured":"Guerreau, O.L., Malassenet, F.J., McLaughlin, S.W., Merolla, J.-M.: Quantum key distribution without a single-photon source using a strong reference. IEEE Photonics Technol. Lett. 17(8), 1755\u20131757 (2005). https:\/\/doi.org\/10.1109\/LPT.2005.851050","journal-title":"IEEE Photonics Technol. Lett."},{"key":"4396_CR22","doi-asserted-by":"publisher","unstructured":"Sharbaf, M.S.: Quantum cryptography: a new generation of information technology security system. In: 2009 Sixth International Conference on Information Technology: New Generations, pp. 1644\u20131648 (2009). https:\/\/doi.org\/10.1109\/ITNG.2009.173","DOI":"10.1109\/ITNG.2009.173"},{"key":"4396_CR23","unstructured":"Lanyon, B.P., Weinhold, T.J., Langford, N.K., Barbieri, M., Almeida, M.P., Gilchrist, A., James, D.F.V., White, A.G.: Photonic quantum computing: Shor\u2019s algorithm and the road to fault-tolerance. In: 2008 Conference on Lasers and Electro-Optics and 2008 Conference on Quantum Electronics and Laser Science, pp. 1\u20132 (2008)"},{"key":"4396_CR24","doi-asserted-by":"publisher","unstructured":"Igumnov, V.S., Lis, V.N.: Influence of quantum computers on classical cryptography. In: 2007 8th Siberian Russian Workshop and Tutorial on Electron Devices and Materials, pp. 220\u2013224 (2007). https:\/\/doi.org\/10.1109\/SIBEDM.2007.4292963","DOI":"10.1109\/SIBEDM.2007.4292963"},{"key":"4396_CR25","doi-asserted-by":"publisher","unstructured":"Lakshmi, P.S., Murali, G.: Comparison of classical and quantum cryptography using QKD simulator. In: 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS), pp. 3543\u20133547 (2017). https:\/\/doi.org\/10.1109\/ICECDS.2017.8390120","DOI":"10.1109\/ICECDS.2017.8390120"},{"key":"4396_CR26","doi-asserted-by":"publisher","unstructured":"Gottesman: Private key and public key quantum cryptography. In: 2002 Summaries of Papers Presented at the Quantum Electronics and Laser Science Conference, p. 189 (2002). https:\/\/doi.org\/10.1109\/QELS.2002.1031293","DOI":"10.1109\/QELS.2002.1031293"},{"key":"4396_CR27","doi-asserted-by":"publisher","unstructured":"Niemiec, M.: Quantum cryptography\u2014the analysis of security requirements. In: 2009 11th International Conference on Transparent Optical Networks, pp. 1\u20134 (2009). https:\/\/doi.org\/10.1109\/ICTON.2009.5185137","DOI":"10.1109\/ICTON.2009.5185137"},{"key":"4396_CR28","first-page":"456","volume-title":"Cryptography and Network Security","author":"A Kahate","year":"2020","unstructured":"Kahate, A.: Cryptography and Network Security, p. 456. McGraw-Hill, New York (2020)"},{"key":"4396_CR29","unstructured":"Kessler, G.C.: An overview of cryptography (2003)"},{"issue":"6\/7","key":"4396_CR30","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1007\/BF02650179","volume":"21","author":"RP Feynman","year":"1982","unstructured":"Feynman, R.P.: Simulating physics with computers. Int. J. Theor. Phys. 21(6\/7), 467\u2013488 (1982)","journal-title":"Int. J. Theor. Phys."},{"issue":"8, Part B","key":"4396_CR31","doi-asserted-by":"publisher","first-page":"6441","DOI":"10.1016\/j.jksuci.2022.01.012","volume":"34","author":"K Das","year":"2022","unstructured":"Das, K., Sadhu, A.: Experimental study on the quantum search algorithm over structured datasets using IBMQ experience. J. King Saud Univ. Comput. Inf. Sci. 34(8, Part B), 6441\u20136452 (2022). https:\/\/doi.org\/10.1016\/j.jksuci.2022.01.012","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"key":"4396_CR32","doi-asserted-by":"crossref","unstructured":"Nielsen, M.A., Chuang, I.: Quantum computation and quantum information. Am. J. Phys. 70(5) (2002)","DOI":"10.1119\/1.1463744"},{"key":"4396_CR33","doi-asserted-by":"publisher","DOI":"10.1002\/9780470181386","volume-title":"Quantum Computing Explained","author":"D McMahon","year":"2007","unstructured":"McMahon, D.: Quantum Computing Explained. Wiley (2007)"},{"key":"4396_CR34","doi-asserted-by":"publisher","first-page":"3457","DOI":"10.1103\/PhysRevA.52.3457","volume":"52","author":"A Barenco","year":"1995","unstructured":"Barenco, A., Bennett, C.H., Cleve, R., DiVincenzo, D.P., Margolus, N., Shor, P., Sleator, T., Smolin, J.A., Weinfurter, H.: Elementary gates for quantum computation. Phys. Rev. A 52, 3457\u20133467 (1995). https:\/\/doi.org\/10.1103\/PhysRevA.52.3457","journal-title":"Phys. Rev. A"},{"key":"4396_CR35","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1103\/PhysRevLett.67.661","volume":"67","author":"AK Ekert","year":"1991","unstructured":"Ekert, A.K.: Quantum cryptography based on Bell\u2019s theorem. Phys. Rev. Lett. 67, 661\u2013663 (1991). https:\/\/doi.org\/10.1103\/PhysRevLett.67.661","journal-title":"Phys. Rev. Lett."},{"key":"4396_CR36","volume-title":"Quantum Computing","author":"J Gruska","year":"1999","unstructured":"Gruska, J.: Quantum Computing, vol. 2005. McGraw-Hill (1999)"},{"key":"4396_CR37","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1103\/RevModPhys.74.145","volume":"74","author":"N Gisin","year":"2002","unstructured":"Gisin, N., Ribordy, G., Tittel, W., Zbinden, H.: Quantum cryptography. Rev. Mod. Phys. 74, 145\u2013195 (2002). https:\/\/doi.org\/10.1103\/RevModPhys.74.145","journal-title":"Rev. Mod. Phys."},{"issue":"4","key":"4396_CR38","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1016\/j.physrep.2008.09.003","volume":"469","author":"H H\u00e4ffner","year":"2008","unstructured":"H\u00e4ffner, H., Roos, C.F., Blatt, R.: Quantum computing with trapped ions. Phys. Rep. 469(4), 155\u2013203 (2008). https:\/\/doi.org\/10.1016\/j.physrep.2008.09.003","journal-title":"Phys. Rep."},{"key":"4396_CR39","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/B978-0-12-800953-6.00005-0","volume-title":"Quantum Machine Learning","author":"P Wittek","year":"2014","unstructured":"Wittek, P.: 5\u2014unsupervised learning. In: Wittek, P. (ed.) Quantum Machine Learning, pp. 57\u201362. Academic Press, Boston (2014). https:\/\/doi.org\/10.1016\/B978-0-12-800953-6.00005-0"},{"key":"4396_CR40","unstructured":"Lee, W.-K., Jang, K., Song, G., Kim, H., Hwang, S.O., Seo, H.: Efficient Implementation of Lightweight Hash Functions on GPU and Quantum Computers for IoT Applications. Cryptology ePrint Archive, Paper 2021\/1024. https:\/\/eprint.iacr.org\/2021\/1024 (2021). https:\/\/eprint.iacr.org\/2021\/1024"},{"key":"4396_CR41","doi-asserted-by":"publisher","unstructured":"Grover, L.K.: A fast quantum mechanical algorithm for database search. In: Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing. STOC \u201996, pp. 212\u2013219. Association for Computing Machinery, New York, NY, USA (1996). https:\/\/doi.org\/10.1145\/237814.237866. https:\/\/doi.org\/10.1145\/237814.237866","DOI":"10.1145\/237814.237866"},{"issue":"5","key":"4396_CR42","doi-asserted-by":"publisher","first-page":"1484","DOI":"10.1137\/s0097539795293172","volume":"26","author":"PW Shor","year":"1997","unstructured":"Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26(5), 1484\u20131509 (1997). https:\/\/doi.org\/10.1137\/s0097539795293172","journal-title":"SIAM J. Comput."},{"key":"4396_CR43","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1007\/978-3-031-48879-5_7","volume-title":"Computational Intelligence in Communications and Business Analytics","author":"S Biswas","year":"2024","unstructured":"Biswas, S., Das, P.: Analysis of quantum cryptology and the RSA algorithms defense against attacks using Shor\u2019s algorithm in a post quantum environment. In: Dasgupta, K., Mukhopadhyay, S., Mandal, J.K., Dutta, P. (eds.) Computational Intelligence in Communications and Business Analytics, pp. 72\u201387. Springer, Cham (2024)"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-024-04396-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11128-024-04396-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-024-04396-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,28]],"date-time":"2024-05-28T18:47:54Z","timestamp":1716922074000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11128-024-04396-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,9]]},"references-count":43,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2024,5]]}},"alternative-id":["4396"],"URL":"https:\/\/doi.org\/10.1007\/s11128-024-04396-9","relation":{},"ISSN":["1573-1332"],"issn-type":[{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,5,9]]},"assertion":[{"value":"20 November 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 April 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 May 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that there is no conflict of interest involved in the research work.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"176"}}