The Luhn algorithm, also known as the modulus 10 or mod 10 algorithm, is a simple checksum formula used to validate a variety of identification numbers, such as credit card numbers, IMEI numbers, Canadian Social Insurance Numbers. The LUHN formula was created in the late 1960s by a group of mathematicians. Shortly thereafter, credit card companies adopted it. Because the algorithm is in the public domain, it can be used by anyone. Most credit cards and many government identification numbers use the algorithm as a simple method of distinguishing valid numbers from mistyped or otherwise incorrect numbers. It was designed to protect against accidental errors, not malicious attacks.
Steps involved in Luhn algorithm
Let’s understand the algorithm with an example:
Consider the example of an account number “79927398713“.
Step 1 – Starting from the rightmost digit double the value of every second digit,
Step 2 – If doubling of a number results in a two digits number i.e greater than 9(e.g., 6 × 2 = 12), then add the digits of the product (e.g., 12: 1 + 2 = 3, 15: 1 + 5 = 6), to get a single digit number.
Step 3 – Now take the sum of all the digits.
Step 4 – If the total modulo 10 is equal to 0 (if the total ends in zero) then the number is valid according to the Luhn formula; else it is not valid.
Since the sum is 70 which is a multiple of 10, therefore the account number is possibly valid.
The idea is simple, we traverse from end. For every second digit, we double it before adding. We add two digits of the number obtained after doubling.
This is not a valid card
The Luhn algorithm detects any single-digit error, as well as almost all transpositions of adjacent digits.
This article is contributed by Vishal Kumar Gupta. If you like GeeksforGeeks and would like to contribute, you can also write an article using contribute.geeksforgeeks.org or mail your article to firstname.lastname@example.org. See your article appearing on the GeeksforGeeks main page and help other Geeks.
Please write comments if you find anything incorrect, or you want to share more information about the topic discussed above.
Don’t stop now and take your learning to the next level. Learn all the important concepts of Data Structures and Algorithms with the help of the most trusted course: DSA Self Paced. Become industry ready at a student-friendly price.
- Karatsuba algorithm for fast multiplication using Divide and Conquer algorithm
- RSA Algorithm in Cryptography
- Decrypt the String according to given algorithm
- ElGamal Encryption Algorithm
- Blowfish Algorithm with Examples
- How to solve RSA Algorithm Problems?
- KMP Algorithm for Pattern Searching
- One Time Password (OTP) algorithm in Cryptography
- Knapsack Encryption Algorithm in Cryptography
- An in-place algorithm for String Transformation
- Naive algorithm for Pattern Searching
- Decode the string encoded with the given algorithm
- How to generate Large Prime numbers for RSA Algorithm
- Applications and Limitations of Diffie-Hellman algorithm
- Shamir's Secret Sharing Algorithm | Cryptography
- RSA Algorithm using Multiple Precision Arithmetic Library
- Online algorithm for checking palindrome in a stream
- Move To Front Data Transform Algorithm
- Burrows - Wheeler Data Transform Algorithm
- Boyer Moore Algorithm for Pattern Searching