Nice one. Enjoyed reading the post. Also I just asked a question to myself about cryptographic property like is it possible for any quantum computing strategy to crack the hashed version of the information as it can deal with such exponential problems however it is secure.
I'm not knowledgeable enough about quantum computing to be sure, but even if it does, I believe there are cryptographic hash functions that are not feasible for even quantum computers to crack.
Nice one. Enjoyed reading the post. Also I just asked a question to myself about cryptographic property like is it possible for any quantum computing strategy to crack the hashed version of the information as it can deal with such exponential problems however it is secure.
Waiting for part2.
I'm not knowledgeable enough about quantum computing to be sure, but even if it does, I believe there are cryptographic hash functions that are not feasible for even quantum computers to crack.