QUANTUM COMPUTING: REDEFINING THE FUTURE OF CYBERSECURITY LAWS AND REGULATIONS
Kalit so'zlar
Quantum computing, cybersecurity, quantum cryptography, quantum threats, cybersecurity laws, quantum-resilient encryption, Shor’s algorithm, legislative frameworks, regulatory standards, global cybersecurity policy..Annotasiya
Quantum computing, leveraging principles such as superposition and entanglement, introduces transformative capabilities with profound implications for cybersecurity. While promising to revolutionize industries, its potential to break widely used cryptographic protocols, such as RSA and ECC, presents an urgent challenge to existing cybersecurity frameworks. Current laws, designed for classical computing, are inadequate for addressing these emerging risks. This article examines the quantum threat landscape, the challenges in updating legislative frameworks, and the development of global regulatory strategies to ensure quantum-resilient security measures, emphasizing the critical need for proactive, collaborative policy reforms in the quantum era.
Manbalar
1. Gulyamov, S. (2023). Quantum law: navigating the legal challenges and opportunities in the age of quantum technologies. Uzbek Journal of Law and Digital Policy, 1(1).
2. Bernstein, D. J., Lange, T., & Campagna, M. (2017). Post-quantum cryptography: Current state and global efforts. Communications of the ACM, 60(2), 70-79. https://doi.org/10.1145/2844563
3. Diffie, W., & Hellman, M. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22(6), 644-654. https://doi.org/10.1109/TIT.1976.1055638
4. National Institute of Standards and Technology (NIST). (2022). Post-quantum cryptography standardization project. Retrieved from https://csrc.nist.gov/projects/post-quantum-cryptography
5. European Union Agency for Cybersecurity (ENISA). (2021). Quantum technologies in cybersecurity: A position paper. Retrieved from https://www.enisa.europa.eu/publications/quantum-cybersecurity
6. Shor, P. W. (1997). Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Journal on Computing, 26(5), 1484-1509. https://doi.org/10.1137/S0097539795293172
7. European Parliament and Council. (2021). Regulation (EU) 2021/887 on the European Cybersecurity Competence Centre and the Network of National Coordination Centres. Official Journal of the European Union, L 198/1.
8. United Nations. (2021). The role of quantum technologies in global cybersecurity frameworks. Report of the Secretary-General.
9. ISO/IEC. (2020). Information security management systems—Overview and vocabulary (ISO/IEC 27000:2020). Geneva: International Organization for Standardization.
10. Wang, H., Yu, L., & Zeng, B. (2020). The role of quantum key distribution in future cybersecurity systems. Nature Communications, 11, 2452. https://doi.org/10.1038/s41467-020-16218-5
11. U.S. Congress. (2023). Quantum Computing Cybersecurity Preparedness Act. Retrieved from https://www.congress.gov/bill/117th-congress/house-bill/7535
12. National Cyber Security Centre (NCSC). (2022). Preparing for the quantum threat: Guidance for organizations. Retrieved from https://www.ncsc.gov.uk/publication/preparing-for-the-quantum-threat