I don't know why you think number theory can actually shine any light on this.
Taking the fractional part of a floating point number and multiplying it by 2**32 essentially gets you a nice garbage integer.
Because square/cube roots are believed to be normal numbers in base 2
http://mathworld.wolfram.com/NormalNumber.html (Their digit distribution certainly is random for the relevant part anyways), their decimal expansion is essentially a string of
random (the important part) garbage. It has no interesting number theoretic properties left.
More importantly, the round constants are mixed through essentially bitwise operations, the number theory surrounding primes would have very little of interest to tell you, since it does not deal with the representations of numbers, while hash algorithms are essentially only bit twiddling, which mostly don't care about the numeric values used (only their binary representation).
Only because if there were anything "up the sleeve" of the first N-bits of truncations of the cube roots of primes, number theory is what would lead to the description. That is, if these truncations have properties at all.
The fact that the numbers are normal is good but does no exclude the possibility that finite truncations of such numbers have predictable properties. The whole spirit of my post is to try to pose the relevant questions...which I think now are probably pointed right at these truncations, and whether or not they have any slippery properties under the transformations specified by SHA-2.