Need a perfect paper? Place your first order and save 5% with this code:   SAVE5NOW

Through programming, several lessons are learned through the use of the assigned tasks and programming tools. Firstly, verifying the credit card numbers helps determine if the credit card number is valid. The coding accepts the 16 digit string, and then after running the numbers, the program should determine whether they are valid, and thus the clients consider updating them. The process applies to financial institutions which contain personal data and financial status. Thus, keeping the cards updated to avoid a personal data breach is applicable.

For instance, in the validation of the numbers, if doubling the numbers produces the sum greater than numbers such as nine, then the nine should be subtracted from the summation to get a single digit (Tanikella, 2020). Taking the totality of the digits, if the sum can be divided by ten, the results indicate that the card numbers are valid. The credit card validation thorough check-up is helpful for security since the auditors can know that they are not exposing the clients to breaches of their information. The use of regular information can help the management to catch up with the numbers. If they are invalid, the service providers can use JavaScript to check the validity of the cards instantly without making the clients wait for so long.

In the application of the BCH coding, they form the cyclic error codes to correct errors, and they are constructed using polynomials under the finite field. BCH coding contains a feature that is useful for precise control of the numbers in the symbol errors, and they are correctable using the codes. Therefore, BCH coding can be applied to correct two-bit errors in a problem (Walters & Roy 2020). The decoding of the BCH coding is accessible through the processes such as algebraic system decoding, which simplifies the designing and decoding of these codes through the use of power electronic hardware. For the BCG coding for the digit for ten to six generators, they identify the unusable numbers, and thus using the corrector, both single and doubled must correct errors. In this case, more than two errors must be detected and corrected.

The brute force password cracker used THC-Hydra cracker to identify any vulnerabilities in the client’s system. The process runs over millions of passwords, and thus it is an attack above 50 protocols and several operating systems (Tirado et al., 2018). The identification of the password by the Brute force is the simple passwords which are used by the majority of the people; on the chart below, the brute force identified the following weak password used by the majority of the people, such as “123456” 1234567890″ “password,” “12345678”, “123”, 1q2w3e4r” and “12′. In addition, the analysis identifies the passwords that contain a maximum of the six lower letters or numbers and the particular case where the passwords contain BCH (16, 6) codes.

From the analysis, it is clear that organizations should use strong passwords that are free from brute force attacks on online platforms by using passwords that contain many characters and then avoid using the typical number and letters patterns such as “:12334….9”.

### REFERENCE

Tanikella, U. (2020). Credit Card Approval Verification Model (Doctoral dissertation, California State University San Marcos).

Walters, M., & Roy, S. S. (2020, October). Constant-time BCH error-correcting code. In 2020 IEEE International Symposium on Circuits and Systems (ISCAS) (pp. 1-5). IEEE.

Tirado, E., Turpin, B., Beltz, C., Roshon, P., Judge, R., & Gagneja, K. (2018, July). A new distributed brute-force password cracking technique. In International conference on future network systems and security (pp. 117-127). Springer, Cham.

Trieu, K., & Yang, Y. (2018). Artificial intelligence-based password brute force attacks. Proc. MWAIS39.

Don't have time to write this essay on your own?
Use our essay writing service and save your time. We guarantee high quality, on-time delivery and 100% confidentiality. All our papers are written from scratch according to your instructions and are plagiarism free.
Place an order

## Cite This Work

APA
MLA
Harvard
Vancouver
Chicago
ASA
IEEE
AMA
Copy to clipboard
Copy to clipboard
Copy to clipboard
Copy to clipboard
Copy to clipboard
Copy to clipboard
Copy to clipboard
Copy to clipboard
Need a plagiarism free essay written by an educator?
Order it today