Control System Data Integrity using ECC


Advanced Machinery Technology Symposium - 2018

Control System Data Integrity using a Variable-round Message Authentication Code with an Elliptic Curve Key Exchange Protocol

by Dr. Ken Fischer, PhD

Presented at the Advanced Machinery Technology Symposium (AMTS) hosted by the American Society of Naval Engineers (ASNE), held at Drexel University, March 28-29, 2018.

PDF


Doctor of Science - 2017

Control System Data Integrity using a Variable-round Message Authentication Code with an Elliptic Curve Key Exchange Protocol

by Kenneth Alan Fischer, December 2017

PDF

source code - browse, download


Intelligent Ships Symposium - 2017

Advancements in Control System Data Authentication and Verification

by Kenneth A. Fischer

Presented at the Intelligent Ships Symposium (ISS) XII hosted by the American Society of Naval Engineers (ASNE) Delaware Valley Section, held at the University of Pennsylvania's Annenberg Center, May 24-25, 2017.

PDF


Master of Science - 2014

Control System Data Authentication and Verification Using Elliptic Curve Digital Signature Algorithm

by Kenneth Alan Fischer, July 2014

PDF


Electric Machines Technology Symposium - 2014

Results and Code for a Software-based Implementation of ECDSA for Control System Data Authentication and Verification

by Kenneth A. Fischer

Presented at Electric Machines Technology Symposium (EMTS) hosted by the American Society of Naval Engineers (ASNE) Delaware Valley Section, held at Villanova University, May 28-29, 2014.

PDF


Intelligent Ships Symposium - 2013

Control System Data Authentication and Verification Using Elliptic Curve Digital Signature Algorithm

by Kenneth A. Fischer

Presented at the tenth Intelligent Ships Symposium (ISS) hosted by the American Society of Naval Engineers (ASNE) Delaware Valley Section, held at the University of Pennsylvania's Annenberg Center, May 22-23, 2013.

PDF


Independent Study Project - 2012

Control System Data Authentication and Verification Using Elliptic Curve Digital Signature Algorithm

by Kenneth Alan Fischer, July 2012

PDF, sig

Since gnupg does not yet handle ECC, the ECDSA signature on Ken's report was produced using Java and can be verified following the example in section 9 of the notes on ECDSA using java.security.Signature with certificates perry@misty.com.cert and perry@misty.com.CAcert:

% java CertVerify perry@misty.com KF_IS.pdf
Certificate Subject:
EMAILADDRESS=perry@misty.com, CN=Rick Perry, O=RP Consulting, L=Villanova, ST=PA, C=US
Checking certificate validity...
Certificate is valid.
Key type is EC
Checking certificate signature...
Certificate signature is verified.
Verifying KF_IS.pdf using perry@misty.com.cert
Signature is valid.
%