Secure Hash Algorithm that uses a 256 bit key (SHA256)
View at oid-info.com
This OID is defined in National Institute of Standards and Technology (NIST), Federal Information Processing Standard (FIPS) Publication 180-3: Secure Hash Standard, October 2008.
Automatically extracted from IETF RFC 3560. See also IETF RFC 5754 and RFC 5758.
Computer Security Objects Register
OID | Name | Sub children | Sub Nodes Total | Description |
---|---|---|---|---|
2.16.840.1.101.3.4.2.2 | sha384 | 0 | 0 | Secure hashing algorithm that uses a 384 bit key (SHA384) |
2.16.840.1.101.3.4.2.3 | sha512 | 0 | 0 | Secure Hash Algorithm that uses a 512 bit key (SHA512) |
2.16.840.1.101.3.4.2.4 | sha224 | 0 | 0 | A 224-bit One-way Hash Function: SHA-224 |
2.16.840.1.101.3.4.2.5 | sha512-224 | 0 | 0 | SHA512-224 algorithm |
2.16.840.1.101.3.4.2.6 | sha512-256 | 0 | 0 | SHA512-256 algorithm |
2.16.840.1.101.3.4.2.7 | 7 | 0 | 0 | SHA3-224 algorithm |
2.16.840.1.101.3.4.2.8 | 8 | 0 | 0 | SHA3-256 algorithm |
2.16.840.1.101.3.4.2.9 | 9 | 0 | 0 | SHA3-384 algorithm |
2.16.840.1.101.3.4.2.10 | 10 | 0 | 0 | SHA3-512 hash algorithm |
2.16.840.1.101.3.4.2.11 | 11 | 0 | 0 | SHAKE128 algorithm |
2.16.840.1.101.3.4.2.12 | 12 | 0 | 0 | SHAKE256 algorithm |