QUANTUM SUPREMACY AND THE CRISIS OF KINETIC EQUIVALENCE: REASSESSING “ARMED ATTACK” UNDER THE UN CHARTER

Islombek Abdikhakimov *
Head of Artificial Intelligence and Legal Tech Laboratory

Abstract

The imminent arrival of Cryptographically Relevant Quantum Computers (CRQCs) threatens to render the traditional "kinetic equivalence" framework for cyber warfare obsolete. International law, specifically the jus ad bellum regime enshrined in the UN Charter, has historically relied on physical damage and injury as the primary thresholds for defining an "armed attack" under Article 51. This article argues that the unique capabilities of quantum computing—specifically the ability to retroactively decrypt sensitive state data and instantaneously neutralize critical infrastructure without physical destruction—expose a dangerous lacuna in the current legal definition of the use of force. By analyzing the "Harvest Now, Decrypt Later" (HNDL) strategy through the lens of state responsibility and the law of armed conflict, this study posits that quantum-enabled operations constitute a form of "systemic violence" that may cripple a state's functionality without firing a shot. The article concludes that the international community must move beyond the Schmitt analysis of "scale and effects" to a functionalist interpretation of Article 51, where the irreversible compromise of sovereign cryptographic integrity is recognized as a casus belli.

Keywords

Kinetic Equivalence Armed Attack UN Charter Quantum Supremacy HNDL Cyber Warfare Article 51 Critical Infrastructure

References

Chen, H., Coco, A., Rotondo, A., & Ying, Y. (2025). The Attribution of Cyber Operations to States in International Law. Geneva Centre for Security Policy (GCSP). Erol, V. (2025). The Strategic Imperative of Quantum Readiness: A Comprehensive Review of Post-Quantum Cryptography. Preprints.org. Harkavy, R. (2025). The quantum reckoning: law's next frontier. International Comparative Legal Guides. Jena, J. (2025). The Quantum Security Deadline: Building Crypto-Agility Against 'Harvest Now, Decrypt Later' Threats. European Journal of Computer Science and Information Technology, 13(52), 35-52. Journal of Business, IT, and Social Science. (2017). Cybersecurity and International Law: Defining State Responsibility for Cross-Border Cyberattacks. Journal of Business, IT, and Social Science. Kastelic, A. (2019). Inducing compliance with international law in cyberspace – State responsibility, countermeasures and the obligations of due diligence. White Rose eTheses Online. Payne, T. (2016). Teaching Old Law New Tricks: Applying and Adapting State Responsibility to Cyber Operations. Lewis & Clark Law Review, 20(2), 683-715. Pomson, O. (2023). 'Objects'? The Legal Status of Computer Data under International Humanitarian Law. Journal of Conflict and Security Law, 28(2). Rajagopalan, R. P. (Ed.). (2022). Future Warfare and Technology: Issues and Strategies. Observer Research Foundation and Global Policy Journal. Zafar, A. (2025). Quantum Computing in Finance: Regulatory Readiness, Legal Gaps, and the Future of Secure Tech Innovation. European Journal of Risk Regulation, 1–20.
Published January 28, 2026
Views 10
Downloads 1
cloud_download Download PDF