Entrance Announcement
MICTE 2080
2080 Magh 07
User:Prakash Timilsina/Real Teaching Lesson Plan25: Difference between revisions
Jump to navigation
Jump to search
(→Specific Objectives: →Teaching Learning Materials: →Teaching Learning Activities: →Evaluation) |
(→Specific Objectives: →Teaching Learning Materials: →Teaching Learning Activities: →Evaluation) |
||
Line 9: | Line 9: | ||
== Specific Objectives: == | == Specific Objectives: == | ||
At the end of the class, students will be able to: | |||
# Define and understand the concept of key exchanges and Generations. | |||
# Explain key exchange schemes with suitable examples. | |||
== Teaching Learning Materials: == | == Teaching Learning Materials: == | ||
Daily usages Materials, Laptop, PowerPoint slide, Multimedia | |||
== Teaching Learning Activities: == | == Teaching Learning Activities: == | ||
After entering the class, I will do the following activities. | |||
# At the phase, I will discuss about previous topic key interchanges in network security, if they have problem in previous topic, I will revise. | |||
# At the second phase, I will inform the today's topic key exchanges and generations. I will ask question to students, what is Key Exchanges and generations? Is there difference between key interchanges and key exchange? I will write or copy their statement, what they find. I will explain as method in cryptography by which cryptographic key are exchanged between two parties, Then I will explain Channel of exchange as key exchange is done either in-band or out-of-band. In topic generation I will explain generation as crucial component, ensure that the resulting shared secret is unique and secure. | |||
# At the end of the class, I will recall or revise, if they understand or not. | |||
== Evaluation: == | == Evaluation: == | ||
# Define the meaning of key exchange and generation | |||
# What are the advantages and disadvantages of Key exchange? |
Latest revision as of 03:15, 16 May 2024
Class: BEDICT 6th Semester
Subject: Network Security
Teaching Topic: Key Exchanges and Generations
Period Duration: 50 min
Specific Objectives:[edit | edit source]
At the end of the class, students will be able to:
- Define and understand the concept of key exchanges and Generations.
- Explain key exchange schemes with suitable examples.
Teaching Learning Materials:[edit | edit source]
Daily usages Materials, Laptop, PowerPoint slide, Multimedia
Teaching Learning Activities:[edit | edit source]
After entering the class, I will do the following activities.
- At the phase, I will discuss about previous topic key interchanges in network security, if they have problem in previous topic, I will revise.
- At the second phase, I will inform the today's topic key exchanges and generations. I will ask question to students, what is Key Exchanges and generations? Is there difference between key interchanges and key exchange? I will write or copy their statement, what they find. I will explain as method in cryptography by which cryptographic key are exchanged between two parties, Then I will explain Channel of exchange as key exchange is done either in-band or out-of-band. In topic generation I will explain generation as crucial component, ensure that the resulting shared secret is unique and secure.
- At the end of the class, I will recall or revise, if they understand or not.
Evaluation:[edit | edit source]
- Define the meaning of key exchange and generation
- What are the advantages and disadvantages of Key exchange?