Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
The Microsoft Quantum resource estimator is available on the Microsoft Quantum website to estimate the resources needed for a future scaled quantum computer to break a particular encryption algorithm. This tool helps you to analyze the impact of quantum computing on the security of some classical encryption methods, and prepare for a quantum-safe future.
Note
To access the resource estimator on the Microsoft Quantum website, you only need a Microsoft account.
The resource estimator for quantum-safe planning takes a set of four target parameters as input. The following table shows the allowed values for each input parameter:
| Input parameter | Values |
|---|---|
| Classical encryption algorithm | Rivest–Shamir–Adleman (RSA) |
| Classical encryption algorithm | Elliptic Curve Cryptography (ECC) |
| Classical encryption algorithm | Advanced Encryption Standard (AES) |
| Key strength | Standard |
| Key strength | Enhanced |
| Key strength | Highest |
| Qubit type | Topological |
| Qubit type | Superconducting |
| Qubit error rate | Reasonable |
| Qubit error rate | Optimistic |
Use the resource estimator for quantum-safe planning
To use the resource estimator for quantum-safe planning, go to the Microsoft Quantum website.
Choose the arrows to switch between different selections of preset input parameters. See that the fields are populated for you.
Click Ask Copilot if you want to know more about the resource estimation data.
Click Download to download the plot of the resource estimation job.
You can also customize the parameters of the encryption algorithm. You need to select at least one option for each input parameter. You can select multiple combinations of parameters and compare their security against quantum computers.
The results are displayed in a plot that shows the number of qubits and the runtime that a quantum computer with the selected architecture would need to break the encryption algorithm. Hover over the points of the plot to see more information about the resource estimates.
At any point, you can ask Copilot a question about cryptography, resource estimation, or quantum computing.