User:Prakash Timilsina/Real Teaching Lesson Plan 29: Difference between revisions

From ICTED-WIKI
Jump to navigation Jump to search
 
 
Line 9: Line 9:


== Specific Objectives: ==
== Specific Objectives: ==
At the end of the class, students will be able to:
# Develop and understand the concept of Authenticated encryption.
# Define and explain various elements related to authenticated encryption such as CCM (Counter with Cipher Block Chaining Message Authentication code) and GCM (Galois/ Counter Mode)


== Teaching Learning Materials: ==
== Teaching Learning Materials: ==
Daily usages Materials, Laptop, PowerPoint slide, Multimedia


== Teaching Learning Activities: ==
== Teaching Learning Activities: ==
After entering the class, I will revise previous class if they have confusion. Then I will inform today's topic Authenticated Encryption. I will define the combination of confidentiality (Privacy) and Authenticity (Unforgeability) as Authentication encryption and Programming Interface.


== Evaluation: ==
== Evaluation: ==
# The process of identifying and verifying is called_________.
# What are the element that authentication encryption combined?

Latest revision as of 12:13, 16 May 2024

Class: BEDICT 6th Semester

Subject: Network Security

Teaching Topic: Authenticated Encryption

Period Duration: 50 min

Specific Objectives:[edit | edit source]

At the end of the class, students will be able to:

  1. Develop and understand the concept of Authenticated encryption.
  2. Define and explain various elements related to authenticated encryption such as CCM (Counter with Cipher Block Chaining Message Authentication code) and GCM (Galois/ Counter Mode)

Teaching Learning Materials:[edit | edit source]

Daily usages Materials, Laptop, PowerPoint slide, Multimedia

Teaching Learning Activities:[edit | edit source]

After entering the class, I will revise previous class if they have confusion. Then I will inform today's topic Authenticated Encryption. I will define the combination of confidentiality (Privacy) and Authenticity (Unforgeability) as Authentication encryption and Programming Interface.

Evaluation:[edit | edit source]

  1. The process of identifying and verifying is called_________.
  2. What are the element that authentication encryption combined?