n
bits to about n/2
bits. For instance, SHA-256 would be equivalent to 128-bit security.While no hash function is currently known to be completely broken by quantum computers, the consensus is to prepare for quantum computing by using or migrating to hash functions with security assurances in quantum contexts. SHA-3, along with higher-bit versions of SHA-2, are commonly cited as being quantum-resistant, but the cryptographic community continues to monitor and adapt to new findings in quantum computing research.