shivajikobardan Posted February 28, 2022 Share Posted February 28, 2022 can you post some examples of this? Link to comment Share on other sites More sharing options...
Sensei Posted February 28, 2022 Share Posted February 28, 2022 41 minutes ago, shivajikobardan said: can you post some examples of this? The 1st one can be implemented using hash algorithms MD5, SHA1, SHA256 etc: https://en.wikipedia.org/wiki/Cryptographic_hash_function The 2nd can be implemented using Luhn's algorithm or variation of it: https://en.wikipedia.org/wiki/Luhn_algorithm Read the articles. There are examples there. Link to comment Share on other sites More sharing options...
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now