• Title/Summary/Keyword: Code 128

Search Result 122, Processing Time 0.035 seconds

Study on Security Weakness of Barcode Devices (바코드를 이용하는 기기에서의 보안적 취약점 탐구)

  • Park, Beom-joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.457-461
    • /
    • 2017
  • Barcode is widely being used in many places such as supermarket, cafeteria, library, etc. ISBN, Code 128, Code 39 are mainly used in barcode. Among them, Code 128 which is based on ASCII Code can transfer control letters that range from ASCII Code 0 to ASCII 32. Control letters intrinsically imply letters that are used to deliver information to peripheral devices such as a printer or communication joint, however, they play quite different roles if they are inputted on Windows. Generally, barcode devices doesn't verify input data, thus it enables people to tag any barcode that has specific control letters and execute the commands. Besides, most barcode recognition programs are using a database and they have more security weakness compared to other programs. On the basis of those reasons, I give an opinion that SQL Injection can attack barcode recognition programs through this study.

  • PDF

Pkc128 block cipher algorithm (Pkc128 블록 암호 알고리즘)

  • Kim, Gil-Ho;Cho, Gyeong-Yeon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.10b
    • /
    • pp.823-830
    • /
    • 2001
  • 본 논문에서는 데이터 의존 회전 기법과 프로그램 셀룰라 오토마타 기법을 사용한 블록 암호 알고리즘인 가칭 Pkc128(PuKyong Code 128) 암호 알고리즘을 제안한다. 제안한 암호 알고리즘의 블록 크기는 128 비트이고, 키의 치기는 128 비트 이상 가변이며 Feistel Network 구조를 취하였다. 제안한 알고리즘의 안전성을 검정하기 위하여 출력 스트림에 대한 통계적 검정을 실시하였다. 그 결과 16 회전 시에 모든 검정과정을 통과하여 제안된 알고리즘이 통계적으로 안전함을 확인하였다.

  • PDF

Study on Security Weakness of Barcode Devices (바코드를 이용하는 기기에서의 보안적 취약점 탐구)

  • Park, Beom-Joon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.11a
    • /
    • pp.189-192
    • /
    • 2017
  • 마트, 식당, 도서관 등 우리 주변 많은 곳에서 바코드가 사용되고 있다. 바코드는 주로 ISBN, Code128, Code39 등의 형식이 쓰이는데 그중 Code 128은 ASCII Code를 기반으로 하기 때문에 ASCII Code 0번부터 32번까지의 제어 문자를 바코드에 담을 수 있다. 제어 문자는 본래 프린터 또는 통신 접속구 등 주변 장치에 정보를 전달하기 위하여 사용되는 문자를 뜻하지만 Windows상에서 입력될 시 전혀 다른 역할을 한다. 주로 바코드 기기에서 입력 값을 검증하지 않으므로 이를 이용해 제어 문자를 담은 바코드를 태깅해 명령 프롬포트를 열고 명령을 실행할 수 있다. 또한 대부분의 바코드 인식 프로그램이 DB를 사용하고, 보안이 다른 프로그램들에 비해 취약하다는 점에서 SQL Injection 공격 가능성을 제시한다.

A universal infrared remote controller implementation for custom code identification systems (커스텀 코드 식별 방식의 만능 적외선 리모컨 구현)

  • Kim, Jin Young;Moon, Sangook
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.6 no.11
    • /
    • pp.621-628
    • /
    • 2016
  • Recently, remote controls for home appliances have been produced as many as the number of home appliances per household, and new home appliances are being released, but the number of new remote controls is continuously increasing due to their separate functions. Therefore, it is not inconvenient for first time users to use many remote controls because it is difficult and bulky. In recent years, the practical use of a universal remote control, such as large companies such as SAMSUNG and LG are producing a variety of forms. In this paper, we explain how to transmit and receive data format and infrared remote control through custom code identification method used in IR remote control for each company, and to see the size, characteristics and difference with ordinary remote control through ATmega128 remote control experiment. The ATmega128 can be used to control various home appliances displayed on the LCD. As a result, it can be seen that the number of remote controllers having only each function is reduced, and the integrated remote controller using ATmega128 Can handle household appliances.

A Study on Phase-Multiplexed Volume Hologram using Spatial Light Modulator (공간광변조기를 이용한 위상다중화 체적 홀로그램에 관한 연구)

  • Jo, Jong-Dug;Kim, Kyu-Tae
    • 전자공학회논문지 IE
    • /
    • v.44 no.3
    • /
    • pp.23-34
    • /
    • 2007
  • For an effective phase multiplexing in a volume holographic system, four types of phase code, pseudo random code(PSC), Hadamard matrix(HAM), pure random code(PRC), equivalent random code(ERC), used as reference beams are generated. In case of $32{\times}32$ address beam, a phase error with 0%, 5%, 10%, 15%, 20%, and 25% error rate, is purposely added to the real phase values in order to consider the practical SLM's nonlinear characteristics of phase modulation in computer simulation. Crosstalks and SNRs(signal-to-ratio) are comparatively analyzed for these phase codes by the auto-correlation and cross-correlation. PSC has the lowest cross-correlation mean value of 0.067 among four types of phase code, which means the SNR of the pseudo random phase code is higher than other phase codes. Also, the standard deviation of the pseudo random phase code indicating the degree of recalled data degradation is the lowest value of 0.0113. In order to analyze the affect by variation of pixel size, simulation is carried out by same method for the case of $32{\times}32$, $64{\times}64$, $128{\times}128$, $256{\times}256$ address beams.

Automatic Ship Control System to According for Fog Conditions (안개 상태에 따른 선박 자동제어 장치)

  • Lee, Kyeong-Min;Kim, Shin-Hoo;Kim, Kab-Ki;Park, Sung-Hyeon
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.23 no.6
    • /
    • pp.754-758
    • /
    • 2017
  • In this paper, we designed and manufactured an automatic control system to minimize or avoid damage by automatically controlling ship engines in case of fog to allow for safer operation. This automatic power control system uses ATmega128 and an RPM detection circuit to measure RPM changes by artificially generating fog in the fog generator. For this purpose, we have created a complete schematic and applied our source code to an ATmega128 for PWM control using a Hall sensor motor. In future, an experiment and safety evaluation using this automatic power control system with an actual ship will be prepared.

Design and Implementation of Conversion System Between ISO/IEC 10646 and Multi-Byte Code Set (ISO/IEC 10646과 멀티바이트 코드 세트간의 변환시스템의 설계 및 구현)

  • Kim, Chul
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.4
    • /
    • pp.319-324
    • /
    • 2018
  • In this paper, we designed and implemented a code conversion method between ISO/IEC 10646 and the multi-byte code set. The Universal Multiple-Octet Coded Character Set(UCS) provides codes for more than 65,000 characters, huge increase over ASCII's code capacity of 128 characters. It is applicable to the representation, transmission, interchange, processing, storage, input and presentation of the written form of the language throughout the world. Therefore, it is so important to guide on code conversion methods to their customers during customer systems are migrated to the environment which the UCS code system is used and/or the current code systems, i.e., ASCII PC code and EBCDIC host code, are used with the UCS together. Code conversion utility including the mapping table between the UCS and IBM new host code is shown for the purpose of the explanation of code conversion algorithm and its implementation in the system. The programs are successfully executed in the real system environments and so can be delivered to the customer during its migration stage from the UCS to the current IBM code system and vice versa.

Security Analysis of MAC Algorithm using Block Cipher (블록 암호 알고리즘을 애용한 MAC 분석)

  • Seo Chang-Ho;Yun Bo-Hyun;Maeng Sung-Reol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.2 s.34
    • /
    • pp.39-47
    • /
    • 2005
  • This paper proposes and analyzes the MAC(Message Authentication Code) algorithm that is used for the transition integrity and the entity authentication of message. The MAC algorithm uses the DES algorithm which has 64-bit block and 56-bit key and we compare the security according to 64-bit and 32-bit length of MAC value. Moreover, we use the SEED algorithm which has 128-bit block and 128-bit key and compare the security according to 128-bit and 64-bit length of MAC value. We analyze the security the forgery attack according to length of message and length of MAC value. this paper, a coarse-to-fine optical flow detection method is proposed. Provided that optical flow gives reliable approximation to two-dimensional image motion, it can be used to recover the three-dimensional motion. but usually to get the reliable optical flows are difficult. The proposed algorithm uses Horn's algorithm (or detecting initial optical flow, then Thin Plate Spline is introduced to warp a image frame of the initial optical flow to the next image frame. The optical flow for the warped image frame is again used iteratively until the mean square error between two image sequence frames is lowered. The proposed method is experimented for the real moving Picture image sequence. The proposed algorithm gives dense optical flow vectors.

  • PDF