But I still think you haven't quite grasped the magnitude of the P/NP problem yet! Then again, if the impossible ever gets done, it'll be as always, by someone who didn't know it was impossible.
Also botnet - If you've got the crypto-bug - exploring which input bits effect which output bits (1, 2 or 3 at a time) might be interesting. This kind of differential analysis is what took down MD5 and cost me $10,000 (
http://en.wikipedia.org/wiki/MD5CRK)

Eg:
SHA256(000000...0000) = A
SHA256(000000...0001) = B
SHA256(000000...0011) = C
SHA256(000000...0010) = D
SHA256(000000...0110) = E
SHA256(000000...0111) = F
SHA256(000000...0101) = G
...
then
A^B = ?
A^C = ?
A^D = ?
...
B^C = ?
B^D = ?
...