Imagine that the attacker has access to advanced technology, such as a quantum computer, and can break SHA-256 in minutes: