πŸš€
v13vv/GitBook
πŸš€
v13vv/GitBook
  • 🌌About this blog
  • The Author
    • v13vv
  • 2025
    • TryHackMe
    • HackTheBox
    • TheCyberMentor
    • PNPT
    • CPTS
    • AZ-500
  • 2024
    • CTFs
      • idekCTF 2024
        • misc/NM~~PZ~~ - easy
      • 🐭Bandit - OverTheWire
        • Bandit 0
        • Bandit 1 ( level 0->1 )
        • Bandit 2 ( level 1->2 )
        • Bandit 3 ( level 2->3 )
        • Bandit 4 ( level 3->4 )
        • Bandit 5 ( level 4->5 )
      • 🐯Natas - OverTheWire
        • Natas 0
        • Natas 1 ( level 0->1 )
        • Natas 2 ( level 1->2 )
        • Natas 3 ( level 2->3 )
    • Security+ Labs
      • ⛑️CompTIA Security+ - 101Labs.net
        • Lab 41 – Getting a reverse shell on a server through a file upload
        • Lab 42 – Manual privilege escalation using python
    • WEB SECURITY
      • 🍊Web Security Academy - PortSwigger
        • Burp Suite Setup on Kali Linux
        • Lab: SQL injection vulnerability in WHERE clause allowing retrieval of hidden data
        • Lab: SQL injection vulnerability allowing login bypass
        • Lab: Reflected XSS into HTML context with nothing encoded
    • NETWORKING
      • 🌊Wireshark Labs - Jim Kurose Homepage
        • Getting Started
    • POST-QUANTUM CRYPTOGRAPHY
      • A Study of Algorithms Development for Post-Quantum Cryptography
        • NIST Post-Quantum Cryptography Standardization
          • Call for Proposals in Security Aspect
          • Status Report on the Third Round of the NIST Post-Quantum Cryptography Standardization Process
          • KEM / Digital Signature
            • Kyber
              • What is Kyber ?
                • Module Learning With Errors (M-LWE)
              • Kyber Cryptanalysis
                • Timing Attack
Powered by GitBook
On this page
  1. 2024
  2. POST-QUANTUM CRYPTOGRAPHY
  3. A Study of Algorithms Development for Post-Quantum Cryptography
  4. NIST Post-Quantum Cryptography Standardization
  5. KEM / Digital Signature
  6. Kyber
  7. What is Kyber ?

Module Learning With Errors (M-LWE)

I asked ChatGPT to generate easy understanding points about M-LWE.

Imagine you have a secret number that you want to keep hidden. To protect this number, you add a little bit of noise (error) to it. Now, if someone else sees the noisy number, it’s hard for them to figure out the original secret number because of the added noise.

In cryptography, this idea is used in the Module Learning With Errors (M-LWE) problem. Here's how it works in a simple way:

Basics of M-LWE:

  • Secret Number (Secret Vector): Imagine you have a secret number, but in M-LWE, it's usually a whole set of numbers (a vector). This secret is what you want to keep hidden.

  • Noise (Error): You add a small, random number to the secret. This makes the secret look a bit different, so it's not obvious to others.

  • Challenge: Given the noisy number (with the secret hidden inside it), can someone figure out the original secret?

Why It's Hard:

The noise makes it really hard to reverse-engineer and find the secret, especially when this is done over complex structures like vectors in mathematical spaces (like modules over rings in number theory). The hardness of this problem is the backbone of many secure cryptographic systems because it's difficult for even powerful computers to crack the code.

Example to Understand:

Imagine you have a secret recipe (the secret vector), but before you share it, you deliberately make tiny mistakes in the recipe (this is your noise or error). Now, if someone tries to recreate the exact recipe from the one you shared, they will struggle because they don’t know which parts are correct and which are errors.

Practical and Theoretical Differences:

In real-world cryptography (practical schemes), the secret and noise are chosen in ways that make the systems efficient to use. However, in theoretical studies, these are often chosen differently to guarantee that breaking the system is truly hard (standard M-LWE). The recent research is working on making sure that the practical versions are just as secure as the theoretical ones.

Overall, M-LWE is crucial in making sure that the systems we use to secure our data are robust and hard to break, even with advanced techniques.

PreviousWhat is Kyber ?NextKyber Cryptanalysis

Last updated 9 months ago