Can we use an ASIC to break a modern encryption algorithm, and how ...