User:Prakash Timilsina/Real Teaching Lesson Plan25: Difference between revisions

From ICTED-WIKI
Jump to navigation Jump to search
 
 
Line 9: Line 9:


== Specific Objectives: ==
== Specific Objectives: ==
At the end of the class, students will be able to:
# Define and understand the concept of key exchanges and Generations.
# Explain key exchange schemes with suitable examples.


== Teaching Learning Materials: ==
== Teaching Learning Materials: ==
Daily usages Materials, Laptop, PowerPoint slide, Multimedia


== Teaching Learning Activities: ==
== Teaching Learning Activities: ==
After entering the class, I will do the following activities.
# At the phase, I will discuss about previous topic key interchanges in network security, if they have problem in previous topic, I will revise.
# At the second phase, I will inform the today's topic key exchanges and generations. I will ask question to students, what is Key Exchanges and generations? Is there difference between key interchanges and key exchange? I will write or copy their statement, what they find. I will explain as method in cryptography by which cryptographic key are exchanged between two parties, Then I will explain Channel of exchange as key exchange is done either in-band or out-of-band. In topic generation I will explain generation as crucial component, ensure that the resulting shared secret is unique and secure.
# At the end of the class, I will recall or revise, if they understand or not.


== Evaluation: ==
== Evaluation: ==
# Define the meaning of key exchange and generation
# What are the advantages and disadvantages of Key exchange?

Latest revision as of 03:15, 16 May 2024

Class: BEDICT 6th Semester

Subject: Network Security

Teaching Topic: Key Exchanges and Generations

Period Duration: 50 min

Specific Objectives:[edit | edit source]

At the end of the class, students will be able to:

  1. Define and understand the concept of key exchanges and Generations.
  2. Explain key exchange schemes with suitable examples.

Teaching Learning Materials:[edit | edit source]

Daily usages Materials, Laptop, PowerPoint slide, Multimedia

Teaching Learning Activities:[edit | edit source]

After entering the class, I will do the following activities.

  1. At the phase, I will discuss about previous topic key interchanges in network security, if they have problem in previous topic, I will revise.
  2. At the second phase, I will inform the today's topic key exchanges and generations. I will ask question to students, what is Key Exchanges and generations? Is there difference between key interchanges and key exchange? I will write or copy their statement, what they find. I will explain as method in cryptography by which cryptographic key are exchanged between two parties, Then I will explain Channel of exchange as key exchange is done either in-band or out-of-band. In topic generation I will explain generation as crucial component, ensure that the resulting shared secret is unique and secure.
  3. At the end of the class, I will recall or revise, if they understand or not.

Evaluation:[edit | edit source]

  1. Define the meaning of key exchange and generation
  2. What are the advantages and disadvantages of Key exchange?