HOME

TheInfoList



OR:

The Luhn algorithm or Luhn formula, also known as the " modulus 10" or "mod 10"
algorithm In mathematics and computer science, an algorithm () is a finite sequence of rigorous instructions, typically used to solve a class of specific problems or to perform a computation. Algorithms are used as specifications for performing ...
, named after its creator, IBM scientist Hans Peter Luhn, is a simple checksum formula used to validate a variety of identification numbers, such as
credit card numbers A payment card number, primary account number (PAN), or simply a card number, is the card identifier found on payment cards, such as credit cards and debit cards, as well as stored-value cards, gift cards and other similar cards. In some situatio ...
, IMEI numbers, National Provider Identifier numbers in the United States,
Canadian Canadians (french: Canadiens) are people identified with the country of Canada. This connection may be residential, legal, historical or cultural. For most Canadians, many (or all) of these connections exist and are collectively the source of ...
Social Insurance Numbers,
Israeli Israeli may refer to: * Something of, from, or related to the State of Israel * Israelis, citizens or permanent residents of the State of Israel * Modern Hebrew, a language * ''Israeli'' (newspaper), published from 2006 to 2008 * Guni Israeli (b ...
ID Numbers, South African ID Numbers, Swedish National identification numbers, Swedish Corporate Identity Numbers (OrgNr), Greek Social Security Numbers (ΑΜΚΑ), SIM card numbers, European patent application number and survey codes appearing on
McDonald's McDonald's Corporation is an American multinational fast food chain, founded in 1940 as a restaurant operated by Richard and Maurice McDonald, in San Bernardino, California, United States. They rechristened their business as a hambur ...
,
Taco Bell Taco Bell is an American-based chain of fast food restaurants founded in 1962 by Glen Bell (1923–2010) in Downey, California. Taco Bell is a subsidiary of Yum! Brands, Inc. The restaurants serve a variety of Mexican-inspired foods, includi ...
, and Tractor Supply Co. receipts. It is described in U.S. Patent No. 2,950,048, granted on August 23, 1960. The algorithm is in the
public domain The public domain (PD) consists of all the creative work to which no exclusive intellectual property rights apply. Those rights may have expired, been forfeited, expressly waived, or may be inapplicable. Because those rights have expired ...
and is in wide use today. It is specified in ISO/IEC 7812-1. It is not intended to be a cryptographically secure hash function; it was designed to protect against accidental errors, not malicious attacks. Most credit cards and many government identification numbers use the algorithm as a simple method of distinguishing valid numbers from mistyped or otherwise incorrect numbers.


Description

The check digit is computed as follows: # If the number already contains the check digit, drop that digit to form the "payload." The check digit is most often the last digit. # With the payload, start from the rightmost digit. Moving left, double the value of every second digit (including the rightmost digit). # Sum the digits of the resulting value in each position (using the original value where a digit did not get doubled in the previous step). # The check digit is calculated by (10 - (s \operatorname 10)) \operatorname 10. This is the least number (possibly zero) that must be added to s to make a multiple of 10. Other valid formulas giving the same value are (1000-s)\operatorname 10 and 10\lceil s/10\rceil - s.


Example for computing check digit

Assume an example of an account number "7992739871" (just the "payload", check digit not yet included): The sum of the resulting digits is 67. The check digit is equal to (10 - (67\operatorname 10))\operatorname 10 = 3. This makes the full account number read 79927398713.


Example for validating check digit

# Drop the check digit (last digit) of the number to validate. (e.g. 79927398713 -> 7992739871) # Calculate the check digit (see above) # Compare your result with the original check digit. If both numbers match, the result is valid. (e.g.(givenCheckDigit = calculatedCheckDigit) \Leftrightarrow (isValidCheckDigit)).


Strengths and weaknesses

The Luhn algorithm will detect any single-digit error, as well as almost all transpositions of adjacent digits. It will not, however, detect transposition of the two-digit sequence ''09'' to ''90'' (or vice versa). It will detect most of the possible twin errors (it will not detect ''22'' ↔ ''55'', ''33'' ↔ ''66'' or ''44'' ↔ ''77''). Other, more complex check-digit algorithms (such as the Verhoeff algorithm and the
Damm algorithm In error detection, the Damm algorithm is a check digit algorithm that detects all single-digit errors and all adjacent transposition errors. It was presented by H. Michael Damm in 2004. Strengths and weaknesses Strengths The Damm algorithm is ...
) can detect more transcription errors. The
Luhn mod N algorithm The Luhn mod N algorithm is an extension to the Luhn algorithm (also known as mod 10 algorithm) that allows it to work with sequences of values in any even-numbered base. This can be useful when a check digit is required to validate an identific ...
is an extension that supports non-numerical strings. Because the algorithm operates on the digits in a right-to-left manner and zero digits affect the result only if they cause shift in position, zero-padding the beginning of a string of numbers does not affect the calculation. Therefore, systems that pad to a specific number of digits (by converting 1234 to 0001234 for instance) can perform Luhn validation before or after the padding and achieve the same result. The algorithm appeared in a United States Patent for a simple, hand-held, mechanical device for computing the checksum. The device took the mod 10 sum by mechanical means. The ''substitution digits'', that is, the results of the double and reduce procedure, were not produced mechanically. Rather, the digits were marked in their permuted order on the body of the machine.


Pseudocode implementation

The following function takes a card number, including the check digit, as an array of integers and outputs true if the check digit is correct, false otherwise. function isValid(cardNumber ..length sum := 0 parity := length mod 2 for i from 1 to length do if i mod 2 = parity then sum := sum + cardNumber elseif cardNumber > 4 then sum := sum + 2 * cardNumber - 9 else sum := sum + 2 * cardNumber end if end for return sum mod 10 = 0 end function


References


External links


Implementation in 150 languages on the Rosetta Code project
{{DEFAULTSORT:Luhn Algorithm Modular arithmetic Checksum algorithms Error detection and correction 1954 introductions Articles with example pseudocode