Module: Digital Enterprise
Level of study: Level 5
Venue: Computer lab. Consult your timetable.
Week of session: Week No 38
Title of session:
Public key Infrastructure in electronic business and Private Key Encryption |
Aims:
To understand the underlying principles of encrption, encryption algorithm, and encryption key. To examine a simple encryption algorithm and use it to manually encrypt. |
Learning outcomes:
By
the end of the session learners will know the principles of encryption.
Learners will appreciate stong encryption and factors that contribute
to strength of encryption. |
Prior action needed:
At
a minimum, learners are required to carry out all learning activities
for week
38. There are numerous tasks and questions that learners are
requested to carry out throughout the learning materials. Learners should
do/answer all tasks/questions and make comprehensive notes.
|
Learners
are prompted with pertinent questions throughout the session. Learning
outcomes of the session contributes directly to the deliverables of personal blog and critical reflection assignments.
|
Plan
|
||
Time: | Activity: | Resource: |
0:00 - 0:05 | Taking register | |
0:05 - 0:20 | Evaluation of prior learning and discussion on week 38 learning material. Questions and answers. | Learners are required to bring with them notes that they have made on "week 38 learning material" tasks and personal notes |
0:20 - 0:50 | "Private Key Encryption" Tutorial activity. | Tutorial sheet, pen, paper, PC, scientific calculator |
0:50 - 0:55 | Evaluation of session and preparation for Public key encryption session. | Pen, paper, |