As you (should have) understood from all what I told you regarding FPGA, they do contain some backdoors too. We know what kind of backdoors they are, but this is the only thing we know. There are no details accessible to simple citizens like us. We know how to mitigate them on the assumptions we do regarding what they are, but there is no garantee that something more clever has been inserted, making all the mitigation technics I mentioned to you useless. Still, there is no magic, there is only science here. Cryptography is just a way of playing with time as your ally. Time is a very reliable ally as nobody can buy time. Time is time and this is all. Playing with time is safe, if you know exactly what you're doing. This is usually the case, but side channels can make the game harder. Indeed time is a good ally as long as side channel cannot buy time.
Discrete logic :
Discrete logic gates (74xxx) is a good option as long as you can reasonably ensure that they are not backdoored. Normally, nobody backdoors fundamental logic gates. But.... this is just normally. We don't live in a normal world any longer. The worst scenario I see here is people breaking into your home and changing a few 74xxx gates on your PCB for backdoored versions, in strategic places. This is a highly paranoid scenario. In this scenario, what is important is to be sure about your supply chain for those 74xxx components. And here there is a problem. You can never be sure. Even if you are, this is not solving the problem of people breaking into your home secretely to unsolver a few 74xxx components on your PCB and replace them with backdoored ones. But let's takcle problems one at a time. The supply chain issue can be mitigated by getting your 74xxx components from old used machines, unsoldering them for reuse them on your PCB. Still, this only solves the supply chain issue, it does not solve the problem of people breaking into your home to unsolder a few 74xxx on your PCB and replace them with backdoored ones.
So now the last problem to solve, is how to ensure such thing can happen. How to mitigate NSA TAO masters. And here the game is really harder. The first thing that comes to my mind, is to personalize every 74xxx on your PCB so that those wanting to replace them with fake backdoored ones can't do it without being noticed. But what does personalization means ? It means finding a way to make those packages unique, and be able to read/control something on the package of each IC to ensure it is really the one you soldered. To do this, many cryptographers would tell you to alter the package in a random way to that is become unique and not easily reproductible. There are many ways to customize IC packages so that they become unique. You can choose to put some glue on them, and through some glass powder on the glue while it is still not dry. Doing so, you create a fingerprint that is hardly reproductible. Doing so you prevent NSA TAO or equivalent to swap IC on your PCB. Still, you have to have an accurate way of scanning your PCB (taking like microscope photos of it) so that you can read easily and accurately the fingerprint you created with the glue. Proceeding this way, you can reasonabily be sure that if the fingerprint is altered, it means somebody tried to tamper with some of your IC's on your PCB.
Now, if you go to discrete transistors, it is exactly the same issue. You will have to find a reliable way to create a fingerprint that, if altered, would mean somebody tried or tampered with your transistors.
All this shit, and it's quite a load of work, if the consequence that we still don't have free integrated circuits.
The technics using CD/DVD OPU (Optical Pickup Units) to scan several parts (IC's) or whatever on your PCB is a reasonbily secure approach to check a self made fingerprint authenticity.
But hey, have you read the thesis on OPU's used as low cost microscopes ? It's cheap, but it's still some work to have all this fully operational.
The situation is to be considered almost desperate dear friends. At least one thing is fucking sure, it's that there is only the supply chain issue to solve, to acquire those components (74xxx discrete logic or transistors), the second problem is to fight any unwanted swapping (By NSA TAO or equivalent) of those unbackdoored chips on a PCB of a device you would have at your place.
It's not that solving all this is impossible, it's just work. Hard work to make it as simple, cheap, and reliable as possible.
I never said it was impossible, I just say it's hard work.