ML-KEM-1024 | FIPS 203 | CSPN ANSSI Chiffrement souverain post-quantique
← All articles

FPGA vs ASIC: Which Hardware for Post-Quantum Encryption?

Post-quantum cryptography imposes considerably heavier computational demands than classical cryptography. The algorithms selected by NIST, such as ML-KEM and ML-DSA, rely on mathematical operations over Euclidean lattices that require massive polynomial multiplications, NTT (Number Theoretic Transform) computations, and large-dimension matrix manipulations. For critical networks where throughput cannot be sacrificed, hardware acceleration is not a luxury. It is a technical necessity. Two approaches dominate the landscape: ASIC and FPGA. The choice between them will determine an organization's ability to secure its infrastructure over time.

The ASIC Approach: Maximum Performance, Maximum Rigidity

An ASIC (Application-Specific Integrated Circuit) is a custom-designed integrated circuit built to perform a single function with optimal efficiency. In the field of encryption, ASICs deliver unmatched raw performance: maximum throughput, minimum latency, and reduced power consumption. An ASIC dedicated to AES-256, for example, can achieve throughputs of several hundred gigabits per second with negligible energy footprint.

But this performance comes with a structural cost. Designing an ASIC requires development cycles of 18 to 36 months and investments of several million euros for fabrication masks. Once etched into silicon, the circuit is frozen. If a vulnerability is discovered in the implemented algorithm, if the standard evolves, or if a side-channel attack is identified, there is only one option: physically replace the chip. For a network infrastructure deployed across hundreds of sites, this rigidity represents a major operational and financial risk.

The FPGA Approach: Reconfigurability in Service of Crypto-Agility

An FPGA (Field-Programmable Gate Array) is a programmable logic circuit whose internal architecture can be reconfigured after manufacturing. Unlike an ASIC, an FPGA is not permanently etched. Its logic can be updated, replaced, or enhanced through a simple bitstream reprogramming, without any physical intervention on the equipment. This fundamental property gives it a decisive advantage in the post-quantum context: crypto-agility.

Modern FPGAs, such as the latest-generation devices from leading manufacturers, deliver cryptographic performance more than sufficient for the most demanding network throughputs, while retaining the ability to switch from one algorithm to another in milliseconds. Time to market is also reduced: a new cryptographic core can be developed, tested, and deployed in months, compared to years for an ASIC.

Why PQC Specifically Favors FPGA

The post-quantum transition differs from all previous cryptographic transitions in its degree of uncertainty. The algorithms standardized by NIST in August 2024 represent a first generation. Active research continues to explore new mathematical families, and NIST itself has launched an additional selection process for digital signatures. The history of cryptography shows that initial standards are often revised, amended, or replaced as new discoveries emerge. Equipment whose cryptographic hardware cannot evolve is equipment condemned to premature obsolescence.

Furthermore, ANSSI explicitly recommends a hybrid approach combining a classical algorithm (AES, ECDH) with a post-quantum algorithm during the transition period. This combination doubles the cryptographic workload and demands implementation flexibility that only FPGA can natively provide. When security parameters evolve, when new NIST levels are defined, or when an attack is published, FPGA enables an immediate response without hardware replacement.

The Cryptosphere Approach: FPGA for Sovereignty and Agility

It is precisely this logic that guides the architecture of Cryptosphere encryptors. The PQC range is built on latest-generation FPGAs in an AllEyes Resilient architecture where the CPU is removed from the cryptographic path. The FPGA handles all encryption operations, key exchange, and integrity verification, without any plaintext data ever transiting through a general-purpose processor. This design eliminates all software attack surface at the cryptographic level, while preserving the ability to update algorithms remotely, in a secure and verifiable manner.

This architectural choice is part of a technological sovereignty strategy. Controlling the FPGA bitstream means fully controlling the cryptographic chain, without dependency on a third-party ASIC foundry, without black boxes, and without components frozen in silicon. For operators of vital importance and organizations subject to NIS2 and DORA requirements, this control is a strategic imperative as much as a technical one.

Hardware as the Foundation of Security

Whether one chooses ASIC or FPGA, one certainty stands: the cryptographic security of critical infrastructure can no longer rely solely on software. Side-channel attacks, vulnerabilities in general-purpose processors, and the growing complexity of post-quantum algorithms all demand hardware-rooted encryption. The FPGA versus ASIC debate is not a theoretical one. It is an architectural decision that will determine network resilience against tomorrow's threats. In a world where algorithms evolve faster than hardware lifecycles, reconfigurability is not an advantage. It is a requirement.

Have questions?

Cryptographic audit, proof of concept, or migration plan — we are here to discuss it.

Let's talk →