Skip to main content

3. Terminology

3. Terminology

3.1. Requirements Language

The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here.

3.2. Abbreviations

The following abbreviations are used in this document:

ABNF - Augmented Backus-Naur Form

CSPRNG - Cryptographically Secure Pseudorandom Number Generator

DBMS - Database Management System

IEEE - Institute of Electrical and Electronics Engineers

ITU - International Telecommunication Union

MAC - Media Access Control

MD5 - Message Digest 5

MSB - Most Significant Bit

OID - Object Identifier

SHA - Secure Hash Algorithm

SHA-1 - Secure Hash Algorithm 1 (with message digest of 160 bits)

SHA-3 - Secure Hash Algorithm 3 (arbitrary size)

SHA-224 - Secure Hash Algorithm 2 with message digest size of 224 bits

SHA-256 - Secure Hash Algorithm 2 with message digest size of 256 bits

SHA-512 - Secure Hash Algorithm 2 with message digest size of 512 bits

SHAKE - Secure Hash Algorithm 3 based on the KECCAK algorithm

URN - Uniform Resource Names