QCecuring - Enterprise Security Solutions

OID Lookup

Search Object Identifiers by OID number or name. Covers certificates, algorithms, extensions, and PQC standards.

65 OIDs found

OIDNameCategoryUsage
2.5.4.3Common Name (CN)X.500 DNSubject/Issuer field in certificates
2.5.4.6Country (C)X.500 DNTwo-letter country code
2.5.4.7Locality (L)X.500 DNCity or locality name
2.5.4.8State/Province (ST)X.500 DNState or province name
2.5.4.10Organization (O)X.500 DNOrganization name
2.5.4.11Organizational Unit (OU)X.500 DNDepartment or division
2.5.4.5Serial NumberX.500 DNDevice or entity serial number
2.5.4.12TitleX.500 DNJob title
1.2.840.113549.1.9.1Email AddressPKCS#9Email in certificate subject
1.2.840.113549.1.1.1RSA EncryptionSignatureRSA public key algorithm
1.2.840.113549.1.1.5SHA-1 with RSASignatureDeprecated signature algorithm
1.2.840.113549.1.1.11SHA-256 with RSASignatureStandard RSA signature algorithm
1.2.840.113549.1.1.12SHA-384 with RSASignatureRSA signature with SHA-384
1.2.840.113549.1.1.13SHA-512 with RSASignatureRSA signature with SHA-512
1.2.840.113549.1.1.10RSA-PSSSignatureProbabilistic RSA signature scheme
1.2.840.10045.2.1EC Public KeySignatureElliptic Curve public key
1.2.840.10045.4.3.2ECDSA with SHA-256SignatureEC signature with SHA-256
1.2.840.10045.4.3.3ECDSA with SHA-384SignatureEC signature with SHA-384
1.2.840.10045.4.3.4ECDSA with SHA-512SignatureEC signature with SHA-512
1.3.101.112Ed25519SignatureEdDSA signature on Curve25519
1.3.101.113Ed448SignatureEdDSA signature on Curve448
1.2.840.10045.3.1.7P-256 (prime256v1)EC CurveNIST P-256 elliptic curve
1.3.132.0.34P-384 (secp384r1)EC CurveNIST P-384 elliptic curve
1.3.132.0.35P-521 (secp521r1)EC CurveNIST P-521 elliptic curve
2.5.29.17Subject Alternative NameExtensionAdditional identities (DNS names, IPs, emails)
2.5.29.15Key UsageExtensionPermitted key operations (sign, encrypt, etc.)
2.5.29.37Extended Key UsageExtensionSpecific purposes (TLS server, code signing, etc.)
2.5.29.19Basic ConstraintsExtensionCA flag and path length constraint
2.5.29.14Subject Key IdentifierExtensionHash of the subject's public key
2.5.29.35Authority Key IdentifierExtensionIdentifies the issuer's public key
2.5.29.31CRL Distribution PointsExtensionURLs to download the CRL
1.3.6.1.5.5.7.1.1Authority Information AccessExtensionOCSP responder and CA issuer URLs
2.5.29.32Certificate PoliciesExtensionPolicy OIDs and qualifiers
2.5.29.30Name ConstraintsExtensionPermitted/excluded name subtrees for CA certs
2.5.29.36Policy ConstraintsExtensionConstraints on policy mapping
2.5.29.33Policy MappingsExtensionMaps policies between CA domains
2.5.29.46Freshest CRLExtensionDelta CRL distribution point
1.3.6.1.4.1.11129.2.4.2CT Precertificate SCTsExtensionSigned Certificate Timestamps for CT
1.3.6.1.5.5.7.3.1TLS Web Server AuthenticationEKUServer TLS/SSL certificate
1.3.6.1.5.5.7.3.2TLS Web Client AuthenticationEKUClient TLS/SSL certificate
1.3.6.1.5.5.7.3.3Code SigningEKUSign executable code
1.3.6.1.5.5.7.3.4Email Protection (S/MIME)EKUSign and encrypt email
1.3.6.1.5.5.7.3.8Time StampingEKUTrusted timestamp authority
1.3.6.1.5.5.7.3.9OCSP SigningEKUSign OCSP responses
1.3.6.1.4.1.311.10.3.3Microsoft SGCEKUMicrosoft Server Gated Crypto (legacy)
2.16.840.1.113730.4.1Netscape SGCEKUNetscape Server Gated Crypto (legacy)
1.3.6.1.5.5.7.3.17CMC Registration AuthorityEKUCMC RA signing
1.2.840.113549.1.7.1PKCS#7 DataPKCSBasic data content type
1.2.840.113549.1.7.2PKCS#7 Signed DataPKCSSigned data content type
1.2.840.113549.1.7.6PKCS#7 Encrypted DataPKCSEncrypted data content type
1.2.840.113549.1.9.14Extension RequestPKCS#9CSR extension request attribute
2.16.840.1.101.3.4.2.1SHA-256Hash256-bit hash function
2.16.840.1.101.3.4.2.2SHA-384Hash384-bit hash function
2.16.840.1.101.3.4.2.3SHA-512Hash512-bit hash function
1.3.14.3.2.26SHA-1Hash160-bit hash (deprecated)
2.16.840.1.101.3.4.2.8SHA3-256HashSHA-3 256-bit hash
2.16.840.1.101.3.4.2.9SHA3-384HashSHA-3 384-bit hash
2.16.840.1.101.3.4.2.10SHA3-512HashSHA-3 512-bit hash
2.16.840.1.101.3.4.4.1ML-DSA-44 (Dilithium2)PQCNIST PQC digital signature (security level 2)
2.16.840.1.101.3.4.4.2ML-DSA-65 (Dilithium3)PQCNIST PQC digital signature (security level 3)
2.16.840.1.101.3.4.4.3ML-DSA-87 (Dilithium5)PQCNIST PQC digital signature (security level 5)
2.16.840.1.101.3.4.4.4ML-KEM-512 (Kyber512)PQCNIST PQC key encapsulation (security level 1)
2.16.840.1.101.3.4.4.5ML-KEM-768 (Kyber768)PQCNIST PQC key encapsulation (security level 3)
2.16.840.1.101.3.4.4.6ML-KEM-1024 (Kyber1024)PQCNIST PQC key encapsulation (security level 5)
2.16.840.1.101.3.4.3.17SLH-DSA-SHA2-128sPQCNIST PQC stateless hash-based signature

OID Lookup — Object Identifier Reference

Object Identifiers (OIDs) are used throughout X.509 certificates, PKCS standards, and ASN.1 structures to identify algorithms, extensions, attributes, and policies. This tool lets you search by OID number or name to find what each identifier means.

Includes OIDs for signature algorithms, hash functions, elliptic curves, certificate extensions, Extended Key Usage values, PKCS standards, and NIST post-quantum cryptography algorithms.

Runs entirely in your browser.

Ready to Secure Your Enterprise?

Experience how our cryptographic solutions simplify, centralize, and automate identity management for your entire organization.