3. Terminology
3. Terminology
3.1. Requirements Language
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here.
3.2. Abbreviations
The following abbreviations are used in this document:
ABNF - Augmented Backus-Naur Form
CSPRNG - Cryptographically Secure Pseudorandom Number Generator
DBMS - Database Management System
IEEE - Institute of Electrical and Electronics Engineers
ITU - International Telecommunication Union
MAC - Media Access Control
MD5 - Message Digest 5
MSB - Most Significant Bit
OID - Object Identifier
SHA - Secure Hash Algorithm
SHA-1 - Secure Hash Algorithm 1 (with message digest of 160 bits)
SHA-3 - Secure Hash Algorithm 3 (arbitrary size)
SHA-224 - Secure Hash Algorithm 2 with message digest size of 224 bits
SHA-256 - Secure Hash Algorithm 2 with message digest size of 256 bits
SHA-512 - Secure Hash Algorithm 2 with message digest size of 512 bits
SHAKE - Secure Hash Algorithm 3 based on the KECCAK algorithm
URN - Uniform Resource Names