Skip to content

Latest commit

 

History

History
48 lines (36 loc) · 3.79 KB

resource-estimator-quantum-safe-planning.md

File metadata and controls

48 lines (36 loc) · 3.79 KB
author description ms.date ms.author ms.service ms.subservice ms.topic no-loc title uid
SoniaLopezBravo
Learn how to use the Resource Estimator to estimate the resources needed for a future scaled quantum computer to break a particular encryption algorithm.
09/10/2024
sonialopez
azure-quantum
qdk
how-to
Q#
$$v
target
targets
Resource Estimator for Analyzing Cryptography
microsoft.quantum.resource-estimator-cryptography

Analyze cryptographic protocols with the Resource Estimator

The Azure Quantum Resource Estimator is available on the Azure Quantum website (quantum.microsoft.com) to estimate the resources needed for a future scaled quantum computer to break a particular encryption algorithm. This tool helps you to analyze the impact of quantum computing on the security of some classical encryption methods, and prepare for a quantum-safe future.

Note

To access the Resource Estimator on the Azure Quantum website you only need a Microsoft account.

The Resource Estimator for quantum-safe planning takes a set of four target parameters as input:

  • Classical encryption algorithm, which are Rivest-Shamir-Adleman (RSA), Elliptic Curve Cryptography (ECC), and Advanced Encryption Standard (AES).
  • Key strength, which are standard, enhanced, and highest.
  • Qubit type, which are topological and superconducting.
  • Qubit error rate, which are reasonable and optimistic.

Use the Resource Estimator for quantum-safe planning

To use the Resource Estimator for quantum-safe planning, go to Azure Quantum website.

  1. Click on the arrows to switch between different selections of preset input parameters. See that the fields are populated for you.

  2. Click Ask Copilot if you want to know more about the resource estimation data.

  3. Click Download to download the plot of the resource estimation job.

  4. You can also customize the parameters of the encryption algorithm. You need to select at least one option for each input parameter. You can select multiple combinations of parameters and compare their security against quantum computers.

  5. The results are displayed in a plot that shows the number of qubits and the runtime that a quantum computer with the selected architecture would need to break the encryption algorithm. Hover over the points of the plot to see more information about the resource estimates.

  6. At any point, you can ask Copilot a question about cryptography, resource estimation, or quantum computing.

    :::image type="content" source="media/quantum-cryptography-qcom.png" alt-text="Screenshot of the quantum cryptography experience in Azure Quantum website. The picture displays the input parameters that constitute the encryption algorithm and the resulting plot of the resource estimation job.":::

Next steps

  • Understand the results of the Resource Estimator
  • Different ways to run the Resource Estimator
  • Customize resource estimates to machine characteristics
  • Tutorial: Estimate the resources of a quantum chemistry problem