ABSTRACT

The hash functions have been at the center of the data security algorithms for the last two decades. However, with the emergence of quantum computing, conventional methods of data security are under review and scrutiny. At this juncture, the concept of quantum hash function comes to the rescue with its immensely important uses in the field of post quantum data security, especially in quantum key distribution. In this chapter we will present the theory behind quantum hash functions, followed by its uses for post quantum cryptography models, particularly for image data. The algorithms using quantum hash function are also discussed, along with their individual performance.