OP! It is not even about bitcoin, not to mention hacking it.
Actually, hack is the last label one ever could find appropriate for brute forcing hashed public keys. A lot of literature out there showing how dumb it would be attempting such an attack. And it is brute force, clueless naive brute force, forget about AI and QC, neither of the two would be of little help in this context.
Bitcoin RIPEMD-160 addresses, are immune to both AI or any hypothetical analytical or heuristic function and Quantum Computing has nothing to do with the whole story. Decades(/centuries?) later once QC could become both commercially available and developed enough, their only cracking application against bitcoin would be breaking exposed public keys in their transient state, which will be mitigated before we are even close, I suppose.
So, you are left with an exhaustive brute force attack against an astronomical search space which is impractical as you are already aware. Aren't you?
HASHING doesn't have anything to do with BITCOIN hacking, the hash is just used to condense the public-key to an public address that is short,
HASH is sha-256 on btc, ECDSA is the means that private/public keys are encrypted, k=d*P, where P is the prime for sec256k1, and d is the private key, k is the public key, which is hashed into hex(base16), and then into wif (base16), to be short
It's clear that people who tell people here that something can't be done, don't even know what they're talking about.
Hacking BTC means to try and find 'd' from k the public key, its irrelevant what hashing is as its a one-way operation
When we're hacking we're running predictive private key space, and we convert that to a public-key, and hash and then compare with bloom filters if that 'hashed address' has value in the bloom.
The means to which generate private-keys is done in blocks, the problem is k=d*P, but its in log form ( k=d+P) and we're solving for 'd', so d=k-P in log form,
Sometimes we do know the public-key, because early on bitcoin had the public-keys public in the block-chain, but now they're all 'hashed' that's ok, because we can hash our 'guess' to the public-key when we have a candidate for its private-key
If your 'hacking' and prefer to work with public-keys, then you work with the old legacy-satoshi coin, that's ok, because that is the GOOD STUFF anyhow
If your hacking on the post 2013 block-chain about when they removed the public-keys, that's ok, because you can run though predictive private-keys, and get their public-keys and look to see if that address has 'value'
One of the things with ML or SVM that is powerful is you can 'train' your ML to learn about associations of public-key with private-key, then you can use the prediction for a public-address to check for a region that the private-key may reside,
You can also use FFT to look for periodicity in the training of your machine when learning the association of public-address ( hashed ) with private-keys, there is cyclic redundancy, there always is, just keep it simple in the early learning, so you can see the patterns.