Digital signature algorithm applied to hashed content
View at oid-info.com
More information can be found in Recommendation ITU-T X.509 (March 2000) and in ISO/IEC 9594-8 (2001) "Directory: Public-key and attribute certificate frameworks".
hashAlgorithm OBJECT IDENTIFIER ::= {algorithm 2}
ITU-T SG 17 & ISO/IEC JTC 1/SC 6
OID | Name | Sub children | Sub Nodes Total | Description |
---|---|---|---|---|
2.5.8.2.1 | sqMod-n | 0 | 0 | SQ Mod-n |
OID | Name | Sub children | Sub Nodes Total | Description |
---|---|---|---|---|
2.5.8.0 | nullAlgorithm | 0 | 0 | Null algorithm |
2.5.8.1 | encryptionAlgorithm | 1 | 1 | Digital signature algorithm applied to encrypted content |
2.5.8.3 | signatureAlgorithm | 1 | 1 | Digital signature algorithm applied to a signature |