Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 607

Lattice-Based Cryptography

What is Lattice-Based Cryptography?

Lattice-Based CryptographyA family of post-quantum cryptographic schemes whose security reduces to the hardness of finding short vectors or solving linear equations with small errors over high-dimensional lattices.


Lattice-based cryptography builds public-key primitives on problems such as Shortest Vector Problem (SVP), Closest Vector Problem (CVP), Learning With Errors (LWE), and their ring/module variants (RLWE, MLWE). These problems are believed to resist both classical and quantum attacks, including Shor's algorithm. Lattices offer relatively small keys and signatures, fast operations, and proofs that reduce average-case security to worst-case hardness. Most of NIST's selected PQC standards are lattice-based: FIPS 203 (ML-KEM / Kyber), FIPS 204 (ML-DSA / Dilithium), and the upcoming FIPS 206 (FN-DSA / Falcon). They form the backbone of the post-quantum migration in TLS, VPNs, and PKI.

Examples

  1. 01

    Kyber and Dilithium use Module-LWE and Module-SIS over polynomial rings.

  2. 02

    Falcon uses NTRU lattices for compact signatures.

Frequently asked questions

What is Lattice-Based Cryptography?

A family of post-quantum cryptographic schemes whose security reduces to the hardness of finding short vectors or solving linear equations with small errors over high-dimensional lattices. It belongs to the Cryptography category of cybersecurity.

What does Lattice-Based Cryptography mean?

A family of post-quantum cryptographic schemes whose security reduces to the hardness of finding short vectors or solving linear equations with small errors over high-dimensional lattices.

How does Lattice-Based Cryptography work?

Lattice-based cryptography builds public-key primitives on problems such as Shortest Vector Problem (SVP), Closest Vector Problem (CVP), Learning With Errors (LWE), and their ring/module variants (RLWE, MLWE). These problems are believed to resist both classical and quantum attacks, including Shor's algorithm. Lattices offer relatively small keys and signatures, fast operations, and proofs that reduce average-case security to worst-case hardness. Most of NIST's selected PQC standards are lattice-based: FIPS 203 (ML-KEM / Kyber), FIPS 204 (ML-DSA / Dilithium), and the upcoming FIPS 206 (FN-DSA / Falcon). They form the backbone of the post-quantum migration in TLS, VPNs, and PKI.

How do you defend against Lattice-Based Cryptography?

Defences for Lattice-Based Cryptography typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Lattice-Based Cryptography?

Common alternative names include: Lattice cryptography, Post-quantum lattice schemes.

Related terms