That’s all conditional on P = NP, isn’t it? Also, which part do you consider weaker: digital signatures or hash functions?
Not necessarily. There may be a fast solution for some specific cases, related to the vulnerabilities in the protocol. And then there is the question of brute force computational power, due to having a dyson swarm around the Sun.
That’s all conditional on P = NP, isn’t it? Also, which part do you consider weaker: digital signatures or hash functions?
Not necessarily. There may be a fast solution for some specific cases, related to the vulnerabilities in the protocol. And then there is the question of brute force computational power, due to having a dyson swarm around the Sun.