They are crackable as long as they are based on either the integer factorization or the discrete logarithm problem, in which case they can be cracked by Shor's algorithm in complexity class BQP.
Your second paragraph concerns symmetric encryption, which is true. However, Grover's algorithm can effectively cut the key size in half by offering a mechanism to search unsorted databases in faster than linear time.
I had no clue about that what so ever, thanks for the explaining! I'm going to do some research about that, but can you tell me which algorithms are currently being used that use Integer Factorization or Discrete Logarithm? ( I should find some of them sooner or later, but this kind of information is usually pretty hard and requires a lot of knowledge to understand it, which I lack)
EDIT::
Ok I've read a little bit more about this, and what you're saying is based on Quantic Computing , which as far as I've seen (and as been publicly released) is very far from being able to crack hash's.
Even Quantic isn't as simple as "Start!... Cracked!".
I have seen cracking RSA 4096 with a microphone, which is pretty awesome, but requires a very specific set, a bunch of software that I believe it's not available and physical access to the machine.