Papers
Topics
Authors
Recent
Search
2000 character limit reached

Module Learning With Errors (M-LWE)

Updated 13 April 2026
  • Module Learning With Errors (M-LWE) is a structured average-case hardness problem using module lattices, positioned between standard LWE and Ring-LWE to balance efficiency and security.
  • It leverages algebraic structure to enable fast arithmetic (e.g., via NTT) and provides security reductions from worst-case lattice problems like SIVP and GapSVP for parameterized module dimensions.
  • Advanced key reconciliation protocols using nested lattice quantization (e.g., with E8, BW16, and Leech lattices) achieve notable reductions in decryption failure rate and ciphertext expansion.

Module Learning With Errors (M-LWE) is a structured, average-case hardness assumption and problem family leveraging module lattices over rings, foundational to efficient post-quantum cryptography. Positioned between standard LWE and Ring-LWE in terms of algebraic structure and concrete security, M-LWE captures cryptosystems such as CRYSTALS-Kyber and forms the basis for modern key exchange, public-key encryption, and signature schemes. Security reductions, attack strategies, and advanced key reconciliation protocols in the module context define the cryptanalytic landscape and efficiency frontier.

1. Formal Definition and Algebraic Structure

Let q≥2q \ge 2 be an integer modulus and R=Z[X]/(Xn+1)R = \mathbb{Z}[X]/(X^n+1) (for nn a power of two), so Rq=R/qRR_q = R/qR is a ring of degree nn. The module rank kk (or dd in some conventions) indexes the free RR-module M=RkM = R^k, which acts as the ambient space for secrets and error vectors. Given error distribution χ\chi (e.g., centered binomial or discrete Gaussian over R=Z[X]/(Xn+1)R = \mathbb{Z}[X]/(X^n+1)0), an M-LWE sample is constructed by sampling:

  • secret R=Z[X]/(Xn+1)R = \mathbb{Z}[X]/(X^n+1)1,
  • error R=Z[X]/(Xn+1)R = \mathbb{Z}[X]/(X^n+1)2,
  • uniformly random R=Z[X]/(Xn+1)R = \mathbb{Z}[X]/(X^n+1)3,
  • then setting

R=Z[X]/(Xn+1)R = \mathbb{Z}[X]/(X^n+1)4

The decision M-LWE problem asks: given R=Z[X]/(Xn+1)R = \mathbb{Z}[X]/(X^n+1)5, distinguish distribution from uniform over R=Z[X]/(Xn+1)R = \mathbb{Z}[X]/(X^n+1)6. The search variant recovers R=Z[X]/(Xn+1)R = \mathbb{Z}[X]/(X^n+1)7 from many independent samples. In coefficient embedding, the total lattice dimension is R=Z[X]/(Xn+1)R = \mathbb{Z}[X]/(X^n+1)8.

M-LWE generalizes:

  • Standard LWE: R=Z[X]/(Xn+1)R = \mathbb{Z}[X]/(X^n+1)9, nn0.
  • Ring-LWE: nn1, nn2. The intermediate structure permits efficient arithmetic (NTT) and parametrizes security via nn3, nn4, nn5.

The formalism extends to more general rings nn6 for number fields nn7, with secrets nn8 and samples distributed in nn9, where Rq=R/qRR_q = R/qR0 is the trace dual and Rq=R/qRR_q = R/qR1 is the dual torus. This abstraction provides a unifying context for cyclotomic and non-cyclotomic modules (Al-Jabbari et al., 2024).

2. Hardness and Reductions to Worst-case Lattice Problems

Average-case hardness of M-LWE is underpinned by quantum reductions from worst-case lattice problems such as the Shortest Independent Vector Problem (SIVP) and Gap Shortest Vector Problem (GapSVP) on module lattices. For power-of-two cyclotomic Rq=R/qRR_q = R/qR2 of degree Rq=R/qRR_q = R/qR3, solving M-LWE for parameters Rq=R/qRR_q = R/qR4 is as hard as approximating (SIVP, GapSVP) on Rq=R/qRR_q = R/qR5-module lattices of rank Rq=R/qRR_q = R/qR6 and dimension Rq=R/qRR_q = R/qR7, up to polynomial approximation factors in the parameters (Al-Jabbari et al., 2024).

The security margin conferred by Rq=R/qRR_q = R/qR8 allows the cryptosystem designer to increase the total lattice dimension independently of the ring degree Rq=R/qRR_q = R/qR9, reducing algebraic attack surface compared to nn0 Ring-LWE, while keeping parameter sizes smaller than plain LWE for the same lattice dimension (Al-Jabbari et al., 2024).

3. Key Reconciliation via Lattice Quantization

Key reconciliation mechanisms (KRM) in M-LWE-based KEMs transform noisy shared M-LWE values into agreement on uniform shared keys. The reconciliation can be interpreted as quantizing the M-LWE sample according to a nested lattice codebook:

nn1

where nn2 is the nearest-neighbor quantizer. The typical operations are:

  • nn3, sent as helper vector nn4,
  • nn5.

For nn6 (Kyber), lattices such as nn7 (nn8), Barnes–Wall nn9 (kk0), and the Leech lattice kk1 (kk2) serve as elementary blocks, offering optimal packing and covering properties and efficient quantization (Liu et al., 2024). Application of these lattices minimizes decryption failure rate (DFR) and ciphertext expansion rate (CER) simultaneously.

For instance, using kk3 (kk4) on Kyber parameters yields kk5, DFR kk6, compared to Kyber-768's kk7, DFR kk8, thus reducing communication cost by kk9 and DFR by a factor of dd0; use of dd1 and Leech lattices further improves DFR and CER, with up to dd2 CER reduction and dd3 DFR improvement (Liu et al., 2024).

Scheme dd4 CER DFR CER-reduction
Kyber-768 3329 34 dd5 —
KRM-dd6 3329 31 dd7 8.82%
KRM-dd8 3329 26.4 dd9 22.35%
KRM-LeechRR0 3329 21.6 RR1 36.47%

4. Parameter Selection and Efficiency Considerations

Selecting M-LWE parameters is driven by security, implementation efficiency, and protocol requirements:

  • Ring degree RR2: power of two, enabling NTT for efficient multiplication (e.g., RR3).
  • Modulus RR4: typically prime RR5 (Kyber) or power-of-two (e.g., RR6) to allow dither-free reconciliation and even faster arithmetic (Saliba et al., 2020, Liu et al., 2024).
  • Module rank RR7: set such that RR8 meets security targets.
  • Error distribution: centered binomial or discrete Gaussian, chosen to balance security and decryption failure probability.
  • Reconciliation lattice dimension RR9: determined by the choice of M=RkM = R^k0, M=RkM = R^k1, or Leech lattice (Liu et al., 2024).

Concrete instantiations can use M=RkM = R^k2, M=RkM = R^k3, M=RkM = R^k4, M=RkM = R^k5 and M=RkM = R^k6 reconciliation for M=RkM = R^k7 at 137–138 "best plausible" bits of post-quantum security, exceeding Kyber768's 128-bit security and M=RkM = R^k8 error (Saliba et al., 2020).

5. Cryptanalytic Attacks and Their Implications

Attacks on M-LWE include both lattice-based (BKZ) and novel robust regression strategies. NoMod, a recent attack, circumvents the challenge of modular wrap-arounds by treating modular reductions as statistical corruption, casting secret recovery as robust linear regression with Tukey's biweight loss (Bassotto et al., 2 Oct 2025). The core insight is to ignore explicit modeling of modular "wrap-arounds" (samples for which M=RkM = R^k9 wraps modulo χ\chi0) and instead leverage robust estimators to recover sparse secrets. Lattice preprocessing, algebraic amplification, and priority queue-driven short-vector extraction optimize the process.

NoMod recovers binary or sparse binomial secrets (e.g., Kyber's parameters χ\chi1) in subexponential time on commodity hardware, outperforming prior ML-based and transformer-based attacks. Practical countermeasures include using denser secrets, intentionally increasing wrap-around rates ("noise flooding"), and setting parameters requiring infeasibly large BKZ block sizes (Bassotto et al., 2 Oct 2025). The attack is most effective when the secret is sparse and its distribution is known.

(n,k) Secret type Hamming weight Time (16 cores)
(128,3) sparse CBD (χ\chi2) 3 (100%) 5 h
(256,2) sparse CBD (χ\chi3) 6 (100%) 40 h

6. Cryptographic Applications and Security Arguments

M-LWE underpins public-key encryption, KEM, and digital signature schemes. For KEMs (e.g., Kyber), the reconciliation key is shown to be uniform given public helper data, satisfying IND-CPA security under standard reductions; IND-CCA security follows from the Fujisaki–Okamoto transform. Efficiency and security claims hold for both prime and power-of-two modulus settings, and fast arithmetic (e.g., NTT) is preserved without the need for extra dithers or masks (Liu et al., 2024).

Digital signature constructions combine M-LWE and Module-SIS, attaining high security and negligible decoding failure by appropriate parameter scaling (e.g., large χ\chi4, moderate χ\chi5) (Al-Jabbari et al., 2024). The algebraic flexibility of the module setting enables fine-grained trade-offs between key size, bandwidth, and resistance to structured attacks.

7. Connections to Ring-LWE, Standard LWE, and Parameter Trade-offs

M-LWE interpolates between LWE and Ring-LWE:

  • Key/sample sizes are reduced over standard LWE via ring structure.
  • Algebraic structure in χ\chi6 enables more efficient arithmetic, yet increases vulnerability to ring-specific attacks; module rank χ\chi7 allows mitigation.
  • Security margin is tuned by joint choice of χ\chi8 to resist both generic and structure-exploiting algorithms.

These properties position M-LWE as the prevailing foundation for post-quantum cryptography, offering parametrizable efficiency and quantum-resistant security, provided implementation and parameterization avoid emergent algorithmic weaknesses (e.g., robust, distribution-aware regression attacks such as NoMod) (Bassotto et al., 2 Oct 2025, Liu et al., 2024, Al-Jabbari et al., 2024, Saliba et al., 2020).

Topic to Video (Beta)

No one has generated a video about this topic yet.

Whiteboard

No one has generated a whiteboard explanation for this topic yet.

Follow Topic

Get notified by email when new papers are published related to Module Learning With Errors (M-LWE).