Context

GPG is used for encryption and authentication. It’s use case requires easily local access, but this may expose it to a large variety of attacks. The aim is to make software replication of private keys difficult by implementing the key in hardware.

Prototype 01

More research is required on how GPG works internally. If the algorithm can be easily synthesized on hardware, an FPGA-based approach may be ideal. The private key must be encrypted and stored securely to prevent easy exploitation with hardware access.