81
edits
Entrance Announcement
MICTE 2080
2080 Magh 07
(→Specific Objectives: →Teaching Learning Materials: →Teaching Learning Activities: →Evaluation) |
(→Specific Objectives: →Teaching Learning Materials: →Teaching Learning Activities: →Evaluation) |
||
Line 9: | Line 9: | ||
== Specific Objectives: == | == Specific Objectives: == | ||
At the end of the class, students will be able to: | |||
# Define and understand the concept of key exchanges and Generations. | |||
# Explain key exchange schemes with suitable examples. | |||
== Teaching Learning Materials: == | == Teaching Learning Materials: == | ||
Daily usages Materials, Laptop, PowerPoint slide, Multimedia | |||
== Teaching Learning Activities: == | == Teaching Learning Activities: == | ||
After entering the class, I will do the following activities. | |||
# At the phase, I will discuss about previous topic key interchanges in network security, if they have problem in previous topic, I will revise. | |||
# At the second phase, I will inform the today's topic key exchanges and generations. I will ask question to students, what is Key Exchanges and generations? Is there difference between key interchanges and key exchange? I will write or copy their statement, what they find. I will explain as method in cryptography by which cryptographic key are exchanged between two parties, Then I will explain Channel of exchange as key exchange is done either in-band or out-of-band. In topic generation I will explain generation as crucial component, ensure that the resulting shared secret is unique and secure. | |||
# At the end of the class, I will recall or revise, if they understand or not. | |||
== Evaluation: == | == Evaluation: == | ||
# Define the meaning of key exchange and generation | |||
# What are the advantages and disadvantages of Key exchange? |
edits