Grover on PIPO

: The emergence of quantum computers is threatening the security of cryptography through various quantum algorithms. Among them, the Grover search algorithm is known to be efﬁcient in accelerating brute force attacks on block cipher algorithms. To utilize the Grover’s algorithm for brute force attacks, block ciphers must be implemented in quantum circuits. In this paper, we present optimized quantum circuits of the SPN (Substitution Permutation Network) structured lightweight block cipher, namely the PIPO block cipher. In particular, the compact design of quantum circuits for the 8-bit Sbox is investigated. These optimization techniques are used to implement other cryptographic operations as quantum circuits. Finally, we evaluate quantum resources of Grover search algorithm for the PIPO block cipher in ProejctQ, a quantum simulator provided by IBM.


Introduction
International IT (Information Technology) companies, such as Google and IBM, are investing in the development of quantum computers. Quantum computers use qubits with a superposition property that allows states of 0 and 1 at the same time with the certain probability. Through this property, n-qubit in superposition state can express 2 n cases and has the advantage of parallel processing. Quantum computers are expected to have strengths in fields of deep learning, chemistry, and simulation due to their parallel computing abilities. However, the computational power of quantum computers poses a huge threat to cryptography. Representative quantum algorithms threatening block cipher and public key cryptography are Grover's algorithm [1] and Shor's algorithm [2], respectively. Large-scale quantum computers using Shor's algorithm can solve factorization and discrete algebra problems within a polynomial time. If quantum computers with largescale qubits arrive, ECC (Elliptic Curve Cryptography) and RSA (Rivest-Shamir-Adleman), which are widely used in asymmetric key cryptography based on these mathematical problems, are no longer available. Currently, there are no large quantum computers that can break RSA and ECC, but companies are launching quantum computers that use more qubits than ever. NIST (National Institute of Standards and Technology) is working to standardize asymmetric key cryptography https://csrc.nist.gov/projects/post-quantum-cryptography (accessed on 13 May 2021) that can replace RSA and ECC in the preparation for attacks by large quantum computers.
The Grover search algorithm accelerates brute force attacks against symmetric key cryptography. The n-bit security level of symmetric key cryptography is reduced to the n/2-bit security level on quantum computers using the Grover's algorithm. For example, the key-recovery attack on full AES are based on biclique attack [3]. The attack is faster than the brute-force by a factor of about four. To recover an AES-128 key, this attack requires 2 126.2 operations. In Reference [4], the result has been further improved to 2 126.0 for AES-128. For the case of Grover search algorithm, the complexity is only 2 64 for AES-128. To operate the Grover's algorithm on quantum computers, target symmetric key cryptography must be implemented in a quantum circuit. For this reason, studies have been conducted to optimize and implement symmetric key ciphers into quantum circuits. Starting with the implementation of the most widely used symmetric key cipher, such as AES [5][6][7], this research area has recently expanded to lightweight block ciphers [8][9][10][11][12].
In quantum circuit implementations, qubits, quantum gates, and circuit depth are key factors of the optimization. There are trade-offs among three optimization factors, such as reducing the use of quantum gates instead of increasing the use of qubits. If quantum computers that can use a number of qubits, it will be beneficial to increase qubits and reduce the circuit depth or quantum gates. However, using a large number of qubits is currently impossible at the quantum computer development level. The most ideal case is to optimize both qubits and quantum gates.
In this paper, we implement the SPN structured lightweight PIPO block cipher [13] on quantum computers for the application of the Grover search algorithm. When implementing SPN structured block ciphers as quantum circuits, optimizing the substitution layer is the main issue [6,7,14,15]. The PIPO block cipher uses 8-bit Sbox with the unbalancedbridge structure. If the Sbox operation of PIPO block cipher is implemented in a quantum circuit straightforwardly, many qubits should be needed. However, we achieve the optimal number of qubits by remodeling the Sbox of PIPO block cipher. Furthermore, other PIPO operations are also optimized and optimal PIPO quantum circuits are obtained. Finally, based on the proposed PIPO quantum circuit, the cost of the attack for key search using the Grover's algorithm is estimated through the quantum simulator of the ProjectQ.

•
The first optimized implementation of the PIPO block cipher in quantum circuits: This paper is the first work that implements and optimizes the PIPO block cipher in quantum gates. We efficiently implement the PIPO block cipher as a quantum circuit, which was optimized in terms of qubits, quantum gates, and circuit depth. • Compact design of substitution layer for quantum computers: When implementing SPN-structured block ciphers as quantum circuits, it is important to optimize the substitution layer. In this paper, we implemented the 8-bit wise substitution layer of the PIPO block cipher to the optimal number of qubits and quantum gates. • Quantum resource estimation of Grover search algorithm on PIPO block cipher: The quantum programming tool IBM ProjectQ [16] is utilized to implement the PIPO block cipher in quantum circuits. Based on this, we evaluate quantum resources for using the Grover search algorithm to the PIPO block cipher.

PIPO Block Cipher
In ICISC'20, a lightweight block cipher based on the innately bitslicing Sbox was firstly proposed [13]. The new Sbox has an unbalanced-bridge structure, which uses an 8-bit Sbox by combining 3-bit Sbox and 5-bit Sbox. They used these smaller Sboxes to design an efficient and secure Sbox. The approach also supports the bitslicing method in nature. The PIPO block cipher supports 64-bit plaintext and 128-bit (i.e., 13 rounds) or 256-bit keys (i.e., 17 rounds). The notations used in this paper are explained in Table 1. Each round consists of AddRoundkey, Substitution layer, and Permutation layer. Before starting rounds, the first 64-bit of the master key is used as the round key (i.e., whitening key) and are XORed to the plaintext. The encryption structure of the PIPO block cipher is shown in Figure 1.

AddRoundkey and Keyschedule of PIPO Block Cipher
In the AddRoundkey operation, the 64-bit round key (RK) generated from the master key (K) is XORed to the 64-bit block (B). The PIPO block cipher uses simple Keyschedule operation to generate round keys. In the 128-bit key version, round keys are generated as RK i = K i mod 2 ⊕ i(i = 0, 1, 2, ..., 13), and RK 0 is the whitening key. In the 256-bit key version, round keys are generated as RK i = K i mod 4 ⊕ i(i = 0, 1, 2, ..., 17), and RK 0 is the whitening key.

Substitution Layer of PIPO Block Cipher
The PIPO block cipher is designed to efficiently utilize the bitslicing method. The 64-bit block B is divided into an 8 × 8 array and the 8-bit Sbox is applied to each column, which is shown in Figure 2. In the bitsliced implementation, the bit of the Sbox (e.g., b 0 , b 8 , b 16 , b 24 , b 32 , b 40 , b 48 , b 56 ) can be replaced with bytes (i.e., B 0 , B 1 , B 2 , B 3 , B 4 , B 5 , B 6 , B 7 ). Therefore, the substitution layer for 64-bit block B can be performed at once. The PIPO block cipher uses the 8-bit Sbox with an unbalanced bridge structure consisting of a combination of 3-bit and 5-bit Sboxes, as shown in Figure 3. It is designed to implement the efficient bitslicing and consists of 11 or fewer linear operations. The differential uniformity of the Sbox is 16 or less and the non-linearity is 96 or more. The bitslicing implementation of the PIPO Sbox is shown in Algorithm 1.

Permutation Layer of PIPO Block Cipher
The PIPO block cipher performs bit rotations within a byte for the implementation efficiency. To achieve the full diffusion within the minimum number of rounds, the bit rotation is performed for seven rows (i.e., B 1−7 ) as shown in Equation (1). Through this, the PIPO block cipher can achieve the full diffusion within 2 rounds.

Quantum Computer and Programming
Unlike classical logic gates, quantum gates used in quantum computers using qubits must be reversible. Quantum computers can perform the classical computing using several reversible quantum gates. Some of these examples are X gate, CNOT gate and Toffoli gate shown in Figure 4. The X gate is the same as the NOT operation in classical computers, which outputs the opposite value of the input qubit. The CNOT gate is the same as the XOR operation. In CNOT (X, Y), the input Y qubit becomes the result value X ⊕ Y, and the input X qubit maintains the X state as it is. The Toffoli gate is the same as the AND operation. In Toffoli (X, Y, Z), the the result value (X & Y) is stored in Z, and the input qubits X and Y remain unchanged. Unlike classical computers, quantum gates used in quantum computers are reversible. In the Sbox of PIPO block cipher, the OR operation is used. The OR operation can be replaced by a combination of X gates and one Toffoli gate. This is shown in Figure 5. To calculate the OR result of X and Y, X gates should be executed before performing the Toffoli gate. Then, the Toffoli gate is performed and the OR result is stored in Z. If input values (X and Y) are needed, the reverse operation should be performed. In quantum circuits, reverse operations are used to perform certain operations again and return them to their original states. It is easy to control bits in the classical programming, but controlling qubits in the quantum programming is more challenging. When implementing quantum circuits, it is important to minimize the use of qubits. Although quantum computers are in the process of increasing the number of qubits, supported qubits in existing quantum computers are limited. Hence, reducing the use of qubits required for quantum circuits is a key factor in the optimization. If qubits used during the operations are no longer needed, they can be reused. To do this, qubits to be reused should be initialized to zero. Unlike classical computers, it is non-trivial to initialize qubits to zero.
For example, in quantum computers, to reuse the qubit A (i.e., initialize to zero), the qubit B in the same state as A exists somewhere. The A qubit can be reused by XORing the qubit B to A with the CNOT gate (i.e., CNOT (B, A) − → A = A ⊕ B = 0). Otherwise, the qubit A will just become the garbage qubit. Similarly, it is hard to change the state of the existing qubit A to the same state as the qubit B when A and B are in different states. For this reason, the qubit A should be initialized to zero first, and then the qubit B should be XORed to the qubit A.

Grover's Algorithm
The Grover search algorithm accelerates the brute force attack. If n times were required for the brute force attack, it is reduced to √ n times by applying the Grover search algorithm. This quantum algorithm consists of an oracle that inverts the sign to return the answer, and a diffusion operator that increases the measurement probability of the returned answer. In the example where the answer of 2-qubit is 10, after the oracle and the diffusion operator are shown in Figure 6. Grover's search increases the probability of measuring the answer by repeating the oracle and diffusion operator. However, in the case of 2-qubit, the answer is found with 100% probability without repetition.
The Grover search algorithm can be applied to key search of block cipher, and the overall structure is shown in Figure 7. First, the n-qubit key to which the Hadamard gate is applied is in a superposition state. For the n-qubit key, all key values (i.e., the number of 2 n cases) exist as a probability at the same time. This is the main advantage of quantum computers. In oracle, an encryption quantum circuit is implemented, and the plaintext qubits are encrypted with key qubits in the superposition state. Therefore, in plaintext qubits, all possible ciphertexts encrypted with all possible keys exist as a probability. We find all the ciphertexts that match the known ciphertext. This can be found with X gates and Controlled-Z gates. Figure 8 is a simple example to help understand how the oracle finds the key when the 2-qubit plaintext P(p 1 , p 0 ) is encrypted with a 2-qubit key K(k 1 , k 0 ) and the known ciphertext C(c 1 , c 0 ) is 10. Among the generated ciphertexts, when the ciphertext C is 10, it becomes 11 due to the X gate and the Controlled-Z gate is activated. At this time, the key K qubits are entangled with the plaintext P qubits. Therefore, the sign of the key value (e.g., 10) used when generating ciphertext 10 is inverted. Finally, the reverse operation is performed on the previously performed operations. Because the Grover's search has to iterate oracle and diffusion operator. The ciphertext 11 must be returned to the generated ciphertext 10 by the reverse operation of the X gate, and the original plaintext must be returned through the reverse operation of encryption. As mentioned above, the diffusion operator amplifies the amplitude of the solution and operates on key qubits. The Grover search algorithm properly iterates the oracle and diffusion operator to increase the probability of the correct key value, and then finally measures it. The diffusion operator does not change much because a formalized method is used. Therefore, in the Grover's search algorithm, how to implement the oracle is important, and, in the case of key search for block cipher, it is most important to optimize the encryption quantum circuit implemented in the oracle.

Quantum Circuit Design for PIPO Block Cipher
Quantum resources required for key search using Grover's algorithm are determined by how optimized the target block cipher is in oracle. AddRoundkey, Keyschedule, Substitution, and Permutation used for the PIPO encryption are all implemented in quantum circuits. In our proposed PIPO quantum circuits, only qubits for plaintext and master key are allocated. In total, 192 qubits are used for the PIPO-64/128 encryption, and 320 qubits are used for the PIPO-64/256 encryption, respectively.

AddRoundKey of PIPO Block Cipher
In AddRoundkey, the 64-bit round key RK is XORed on the 64-bit block B. Since it is a simple structure using only XOR operation, AddRoundkey is designed only with CNOT gates. The quantum circuit for AddRoundkey is explained in Algorithm 2. In the notation CNOT (a, b), the operation target is b. For example, CNOT (a, b) indicates a = a and b = a ⊕ b. In Algorithm 2, the result of the XOR operation is stored in the qubit of block B. Quantum resources used in the Grover's search algorithm are determined by how oracle is implemented.

Keyschedule of PIPO Block Cipher
In Keyschedule, the master key K is divided into 64 bits (K = K 1 ||K 0 or K = K 3 ||K 2 ||K 1 ||K 0 ), and these are selected and XORed according to the round constant i to be used as round keys (RK i = K i mod 2 ⊕ i or RK i = K i mod 4 ⊕ i). The operation is XOR-ing the round constant i. Unlike AddRoundkey, we only used X gates, which is simpler than CNOT gates. Since the value of i is known before the operation, qubits of K are flipped by the X gate to positions where the bit of i is 1. In the Round 1 (i = 1), K 1 is used and i is 1. The X gate is performed on the least significant bit of K 1 .
We minimized the use of these X gates. In the case of PIPO-64/128, we perform the XOR operation of round constants as shown in Figure 9. K 0 is used for Round 1 and 3, and K 1 is used for Round 2 and 4. Therefore, K 0 is XORed with round constants 1 and 3 in order, and K 1 is XORed with 2 and 4 in order, because K 1 is XORed with 2 first, the bit of K 1 [1] is flipped due to the X gate. In the next Round 4, since 4 is XORed, the X gate is performed only in K 1 [2]. After being used as a key for Round 2, K 1 [1] should be returned to its original state by the reverse operation. However, there is a part where this reverse operation can be omitted. In the case of K 0 , constant 1 is XORed in Round 1, and an X gate is performed at K 0 [0]. In Round 3, since X gate is performed on both K 0 [1] and K 0 [0], the reverse operation is omitted after the Round 1, and X gate is additionally performed only on K 0 [1] in the Round 3. In PIPO-64/256, the maximum round constant is 17 and it works for the least significant 5-bit and the method is the same.

After round
After round

After round
After round

Quantum Circuit Design for 3-Qubit Sbox and 5-Qubit Sbox 1
In Algorithm 1, 5-bit Sbox 1 and 3-bit Sbox can be implemented using CNOT gates, Toffoli gates, and X gates. It can also be implemented without any additional qubits. These are shown in Algorithms 3 and 4. Algorithm 3 5-qubit Sbox 1 in quantum circuits. 1: 4: x 4 ← − X (x 4 ) //reverse 10: x 5 ← − X (x 5 ) //reverse 11: x 7 ← − CNOT (x 5 , x 7 ) 12: x 4 ← − Toffoli (x 5 , x 6 , x 4 ) 13: return X(x 7 , x 6 , x 5 , x 4 , x 3 ) Additionally, we optimized the 3-qubit Sbox as follows. In the OR quantum gate in Figure 5, X gates are used to prepare input values (X, Y), perform the reverse operation (X, Y), and compute the result (Z). We minimized the use of X gates in the 3-qubit Sbox. In the 3-bit Sbox of Algorithm 1, the OR operation is used twice. In this case, the part using X gates for the output of the first OR (i.e., reverse (x 2 , x 1 ) and result (x 0 )) and the part using X gates of the second OR (i.e., input (x 2 , x 0 ), result (x 1 )) overlap each other. Therefore, the X gates in the overlapping part can be omitted. Lastly, since the NOT operation is performed on x 2 in the 3-bit Sbox of Algorithm 1, x 2 of the reverse(x 2 , x 0 ) in the second OR can be omitted. X gates, which are omitted by overlapping each other, are marked with the same color.
In Algorithm 1, extend XOR is performed after 5-qubit and 3-qubit Sbox operations. The quantum circuit for extend XOR is simple and is shown in Equation (2).

Quantum Circuit Design for 5-Qubit Sbox 2
As mentioned above, the inefficient part when implementing PIPO Sbox as a quantum circuit is the 5-bit Sbox 2 . In Figure 3, 3-bit of Sbox 2 's output (5-bit) is XORed to the output of 3-bit Sbox, and the remaining 2-bit is the final result value. However, the input 3-bit of Sbox 2 is also the final result. Therefore, in the quantum circuit, before 3-qubit is entered into Sbox 2 , 3 temp qubits to store input 3-qubit must be newly allocated. If only an additional 3 qubits are required to complete the PIPO encryption, this is working properly. However, every time the Sbox runs, it needs to allocate 3 qubits. For example, after allocating 3 additional temp qubits, we store the input 3-qubit in the temp qubits and use the temp qubits as the input for Sbox 2 . Then, the output 2-qubit of Sbox 2 is used as the result value, but the remaining 3 qubits are XORed and are no longer needed. Unfortunately, as shown in Section 2.2, these 3 qubits cannot be initialized to zero. They become garbage qubits. We need to allocate 3 qubits for every Sbox.
However, we implemented the PIPO Sbox quantum circuit without additional qubits by using two new Sboxes (i.e., Sbox new1 , Sbox new2 ) with the modified operation of Sbox 2 and the reverse operation. Equation (3) is the operation of Sbox 2 in Algorithm 1. t 0 (x 7 ), t 1 (x 3 ), and t 2 (x 4 ) are 3 bits that must be XORed to the 3-bit Sbox output. Sbox new1 generates only 3-qubit to be XORed to the output of 3-qubit Sbox. Operations marked in red have no effect on t 0 , t 1 , and t 2 . Therefore, the proposed Sbox new1 is optimized by excluding the red operations. This is shown in Algorithm 5.
Algorithm 5 Sbox new1 in quantum circuits. 1: 3: After generating 3 qubits from Sbox new1 , XOR operation is performed to the output of 3-qubit Sbox (i.e., x 0 , x 1 , x 2 ), and then reverse operation of Sbox new1 is performed. This is because x 7 , x 4 , and x 3 must be returned to values before Sbox new1 to be the final values. After performing the reverse operation, Sbox new2 is executed.
Sbox new2 receives 5-qubit, and 2 qubits become final result values, but 3 qubits maintain their values as they are entered. Fortunately, this is possible because if we change operations of PIPO Sbox 2 , we can generate the final result 2-bit, but it keeps the other 3-bit unchanged. Excluding the blue-marked operations of Equation (3), it is possible to generate 2-bit (x 5 , x 6 ) while maintaining 3-bit (x 7 , x 4 , x 3 ). In the proposed Sbox new2 , the OR operation is used twice like a 3-qubit Sbox. The overlapping part (i.e., same color) is omitted to optimize. This is shown in Algorithm 6.
In Algorithm 1, bit swap operations are performed. This can be done with quantum swap gates. The quantum swap gate changes values of two target qubits to each other [17]. The implementation of quantum swap gates for swaps in Algorithm 1 is shown in Equation (4). The use of these four swap gates does not need to be measured in quantum resources by relabeling the qubits. This is described in detail in Section 3.5.

Quantum Circuit Design for PIPO Sbox
The proposed PIPO Sbox quantum circuit consists of four steps, as shown in Figure 10. In Step 1, the input 8-qubit is divided into 5-qubit and 3-qubit, and each Sbox is executed. Then, XOR the output of the 3-qubit Sbox to the 5-qubit Sbox output. In Step 2, Sbox new1 is executed and the output 3-qubit is XORed to the right 3-qubit line. As mentioned above, Sbox new1 is optimized to generate only this 3-qubit. In Step 3, the reverse operation of Sbox new1 is performed. Then, Sbox new1 (reverse) output returns to the state before it is entered into Sbox new1 . In Step 4, Sbox new2 is executed, which generates a final result value of 2-qubit and maintains the input value of 3-qubit.
We designed Sbox new1 and Sbox new2 by dividing the roles of 5-bit Sbox 2 and utilized reverse operation. As a result, we implemented an efficient quantum PIPO Sbox without qubits for the temp storage.

Permutation of PIPO Block Cipher
Quantum resources are not used for the Permutation layer. In the Permutation layer, only rotation operations that change the position of qubits are used. This can be done with swap gates, but it can also be replaced by relabeling the qubits [18] without swap gates. Therefore, the use of swap gates does not have to be measured as quantum resources. This approach also applies to swap gates used in Sbox. Relabeling qubits for PIPO Permutation is detailed in Algorithm 7.

Evaluation
We implemented the PIPO block cipher in quantum circuits using the IBM ProjectQ, a quantum programming tool provided by IBM. The ProjectQ provides a variety of compilers such as Classical-Simulator, Resource-Counter, and Circuit-Drawer. We used the Classical-Simulator to verify that the PIPO block cipher in the quantum circuit was implemented correctly and the Resource-Counter to analyze the quantum resources and circuit depth required for the PIPO quantum circuit. Based on this, quantum resources required for proposed PIPO quantum circuits and those required for other block cipher quantum circuits were compared, as shown in Table 2. We focused on minimizing qubits and achieved the optimal number of qubits by allocating qubits for the plaintext and master key only. The circuit depth is related to execution time [19], and the circuit depth of PIPO block cipher is very low. This is possible because many of quantum gates of the PIPO quantum circuit are performed in parallel. In the proposed PIPO quantum circuit, most of the resources are used for Sbox. When implementing the block cipher of the SPN structure as a quantum circuit, it is important to optimize the Sbox operation, and this was achieved through the proposed Sbox implementation. In addition, all other operations of PIPO were optimized as much as possible.
Compared with block ciphers using the same plaintext size (i.e., 64-bit) and key size (i.e., 128-bit), the PIPO block cipher achieves an optimal number of qubits, and it has the lowest circuit depth and quantum gate complexity. Table 2 does not show circuit depths of SPECK, CHAM, and HIGHT, but they are higher than SPECK.
By analyzing the quantum circuits and resources of Anand et al. [8], Jang et al. [11], the hardware-optimized block cipher (i.e., SIMON) was better optimized in quantum computers than in the software-optimized block cipher (i.e., SPECK). In Reference [12], the authors obtained optimal quantum resources by implementing a hardware-optimized operation of the GIFT Sbox operation as a quantum circuit. Through this, we confirmed that operations optimized for hardware are also optimized for quantum computers.

Resource Estimation for Using the Grover Search Algorithm to PIPO
For the block cipher of the n-bit security level, a maximum of 2 n queries are required to recover the key by the classical brute force attack. However, in a quantum brute force attack using the Grover's algorithm, the key can be recovered with only a maximum of 2 n 2 queries.
The Grover search algorithm iterates over the oracle and diffusion operator. When applying the Grover search algorithm to the key search of the block cipher, the quantum circuit of the block cipher is implemented in the oracle and finds the key. Since the diffusion operator only increases the amplitude of the answer returned by the oracle, the required quantum resources are determined according to how the oracle is implemented.
In Reference [20], a block cipher key search using the Grover search algorithm requires r pairs of known plaintext and ciphertext (r = keysize blocksize ). That is, the PIPO-64/128 quantum circuit should be operated two times, and the PIPO-64/256 quantum circuit should be operated four times. In addition, the oracle of the Grover search algorithm needs the reverse operation. Therefore, it requires four times resources used in the PIPO-64/128 quantum circuit and eight times resources used in the PIPO-64/256 quantum circuit. We assume that the plaintext-ciphertext pairs was operated in parallel [20], which requires 2 × key size ×(r − 1) additional CNOT gates including reverse operation [5]. Finally, quantum resources required for the oracle of the Grover search algorithm are as follows.
Qubits ← − Qubits required for quantum circuit · r + 1 Toffoli gates ← − Toffoli gates required for quantum circuit · 2 · r CNOT gates ← − CNOT gates required for quantum circuit · 2 · r + 2 · key size · (r − 1) X gates ← − X gates required for quantum circuit · 2 · r (5) Through this, quantum resources for applying PIPO block cipher and other ciphers to the oracle of the Grover search algorithm are shown in Table 3.

Conclusions
We implemented and optimized the SPN structured block cipher (i.e., PIPO) as a quantum circuit. Optimal qubits, quantum gates, and circuit depth are achieved, and the proposed PIPO quantum circuit is the most compact compared to research results of other block ciphers. When using the Grover search algorithm to the key search of the block cipher, the block cipher quantum circuit is implemented in the oracle. Therefore, a compact Grover search algorithm can be applied to the key search for PIPO block cipher through the proposed quantum circuit. Additionally, the proposed method, which optimizes various cryptographic operations as quantum circuits, can be an interesting point in the upcoming quantum computer era. In the future, we plan to implement another variety of lightweight block ciphers in quantum circuits, including candidate from the NIST lightweight cryptography standardization https://csrc.nist.gov/projects/ lightweight-cryptography (accessed on 13 May 2021). As in the case of PIPO Sbox, we expected that some operations that are not cost-critical in classical computers may be expensive when implemented in quantum computers. Moreover, these features found in implementing various block ciphers will be an interesting direction to pursue. By utilizing these features, if a new block cipher that requires a lot of quantum resources for implementation were developed, it could become a quantum resistant block cipher.