If you're talking about cracking the computation of private keys from public keys, you'd still have to add entropy to your private key and move your coins to a new address.
But I think the OP meant cracking mining, which is what uses sha256. The private key to public key function uses elliptic curves and sha256 (twice).