Entrance Announcement
MICTE 2080
2080 Magh 07
User:Prakash Timilsina/Real Teaching Lesson Plan 29: Difference between revisions
Jump to navigation
Jump to search
(→Specific Objectives: →Teaching Learning Materials: →Teaching Learning Activities: →Evaluation) |
(→Specific Objectives: →Teaching Learning Materials: →Teaching Learning Activities: →Evaluation) |
||
Line 9: | Line 9: | ||
== Specific Objectives: == | == Specific Objectives: == | ||
At the end of the class, students will be able to: | |||
# Develop and understand the concept of Authenticated encryption. | |||
# Define and explain various elements related to authenticated encryption such as CCM (Counter with Cipher Block Chaining Message Authentication code) and GCM (Galois/ Counter Mode) | |||
== Teaching Learning Materials: == | == Teaching Learning Materials: == | ||
Daily usages Materials, Laptop, PowerPoint slide, Multimedia | |||
== Teaching Learning Activities: == | == Teaching Learning Activities: == | ||
After entering the class, I will revise previous class if they have confusion. Then I will inform today's topic Authenticated Encryption. I will define the combination of confidentiality (Privacy) and Authenticity (Unforgeability) as Authentication encryption and Programming Interface. | |||
== Evaluation: == | == Evaluation: == | ||
# The process of identifying and verifying is called_________. | |||
# What are the element that authentication encryption combined? |
Latest revision as of 12:13, 16 May 2024
Class: BEDICT 6th Semester
Subject: Network Security
Teaching Topic: Authenticated Encryption
Period Duration: 50 min
Specific Objectives:[edit | edit source]
At the end of the class, students will be able to:
- Develop and understand the concept of Authenticated encryption.
- Define and explain various elements related to authenticated encryption such as CCM (Counter with Cipher Block Chaining Message Authentication code) and GCM (Galois/ Counter Mode)
Teaching Learning Materials:[edit | edit source]
Daily usages Materials, Laptop, PowerPoint slide, Multimedia
Teaching Learning Activities:[edit | edit source]
After entering the class, I will revise previous class if they have confusion. Then I will inform today's topic Authenticated Encryption. I will define the combination of confidentiality (Privacy) and Authenticity (Unforgeability) as Authentication encryption and Programming Interface.
Evaluation:[edit | edit source]
- The process of identifying and verifying is called_________.
- What are the element that authentication encryption combined?