3/
🔓 How Does It Impact Crypto?
Most cryptocurrencies rely on:
• 🔐 Public Key Cryptography (e.g., Bitcoin uses ECDSA)
• 🧱 Hash Functions (e.g., SHA-256)
Quantum computers threaten both:
• 🧠 Shor’s Algorithm: Breaks ECDSA = wallet theft
• ⚡ Grover’s Algorithm: Weakens SHA-256 = faster mining