DEPARTMENT OF …COMPUTER SCIENCE AND ENGINEERING…
MALLA REDDY COLLEGE OF ENGINEERING
(Approved by AICTE-New Delhi, Affiliated to JNTUH-Hyderabad)
Recognised under Section 2(f) & 12(B) of the UGC Act 1956,
An ISO 9001:2015 Certified Institution.
Maisammaguda, Dhulapally, post via Kompally, Secunderabad - 500100
TEACHING LEARNING STRATEGIES AND DELIVERY METHODS
Sl.N Teaching Delivery Methods
o Learning Definition / What students do (DM)
Process (TLP)
Participative Learning
1 Lecture Instructor presents the material and students answer
questions that arise in.
Activities: Demonstration, modeling, presentation,
slideshow, note-taking Chalk & Talk
(C&T)
2 Interactive Instructor shall make the lecture into parts by ICT Tools
Lecture incorporating 5–10-minute break for student activities at Working Models
every 15 minutes Charts
Activities:MCQs, Problem solving and compare and
contrast discussion, elicit the information from the
students
3 Tutorial / ACT The tutorial questions are given to the students by the
Hr. teacher in advance. The students can use the class notes Chalk & Talk
and books as reference for solving the given questions (C&T)
either as an individual or in group.
4 Guest Lecture An expert from industry or academia shall be invited to ICT Tools
(Optional) give a guest lecture on advance topics. Working Modules
5 Seminar Seminar presentations are given from any prerequisite
course or fundamental/simple topics by the students. ICT Tools
(Restricted to 2 seminars per semester)
6 Group After the completion of a complex topic, few students -
Discussion will be called for a brain storming session
7 Quiz After the completion of 2 and 1/2 modules, a Quiz shall ICT Tools
be conducted by making the students into group of four.
Experiential Learning
8 Laboratory Students are exposed to the application of their learning
Session process through observation, reflection and hands on Demonstration
Industrial Visits experience. ICT Tools
Centre of Working Models
Excellence
Collaborative Learning
9 Project/Mini Students will be assigned to a feasible project to test Demonstration
Project based their application of course knowledge to produce a Presentation
learning visible product and make it available on record. It may
often be paired with cooperative learning
10 Fieldwork / Students learn how to conduct research and develop a
Internships vision on professional arena in the respective industry
MALLA REDDY COLLEGE OF ENGINEERING
(Approved by AICTE-New Delhi, Affiliated to JNTUH-Hyderabad)
Recognised under Section 2(f) & 12(B) of the UGC Act 1956,
An ISO 9001:2015 Certified Institution.
Maisammaguda, Dhulapally, post via Kompally, Secunderabad - 500100
LESSON PLAN– THEORY
Programme : B. Tech Year/Semester : III/ I
Subject/ Lab : Cryptography & Network Security Academic Year : 2025-26
Name of the Faculty : M Srinivas Regulation : R22
*To be filled at the beginning of the semester with Academic Calendar as reference
TLP: Teaching Learning Process , DM : Delivery Method
Hour Unit I- Introduction to Security Actual
Planned TL
Count concept Date & Hr. DM Remarks
Date & Hr. * P
1 1.1 Introduction, The need for
1 C&T
security
2 1.2 Security approaches,
1 C&T
Principles of security
3 1.3 Types of Security attacks 1 C&T
4 1.4 Security services, 1 C&T
5 1.5 Security Mechanisms 1 C&T
6 1.6 A model for Network Security 1 C&T
7 1.7 Cryptography Concepts and
Techniques: Introduction, plain 1 C&T
text and cipher text
8 1.8 substitution techniques 1 C&T
9 1.9 transposition techniques 1 C&T
10 1.10 encryption and decryption 1 C&T
11 1.11symmetric and asymmetric
1 C&T
key cryptography
12 1.12 SteganoGraphy 1 C&T
13 1.13 key range and key size 1 C&T
14 1.14 possible types of attacks 1 C&T
Actual
Planned Date & Hr. TL
Unit II- Symmetric key Ciphers DM Remarks
Date & Hr. * P
1 2.1Block Cipher principles, 1 C&T
2 2.2DES, AES, Blowfish, RC5, IDEA 1 C&T
2.3Block cipher operation, ICT
3 1
Tools
4 2.4Stream ciphers, RC4. 1 C&T
5 2.5 Principles of public key 1 C&T
cryptosystems
6 2.6 RSA algorithm 1 C&T
7 2.7 Elgamal Cryptography 1 C&T
8 2.8 Diffie-Hellman Key Exchange 1 C&T
2.9 Knapsack Algorithm ICT
9 1
Tools
Unit III- Cryptographic Hash
Planned Actual TL
Functions DM Remarks
Date & Hr. * Date & Hr. P
1 3.1 Message Authentication 1 C&T
3.2 Secure Hash Algorithm (SHA-
2 1 C&T
512)
3 3.3 Authentication requirements 1 C&T
4 3.4 HMAC, CMAC 1 C&T
5 3.5 Digital signatures 1 C&T
3.6 Elgamal Digital Signature ICT
6 1
Scheme. Tools
3.7 Symmetric Key Distribution
ICT
7 Using Symmetric & Asymmetric 1
Tools
Encryption,
ICT
8 3.8 Distribution of Public Keys 1
Tools
9 3.9 Kerberos, 1 C&T
10 3.10 X.509 Authentication Service 1 C&T
11 3.11 Public – Key Infrastructure 1 C&T
Unit IV- Transport-level Planned Actual TL
DM Remarks
Security Date & Hr. * Date & Hr. P
1 4.1 Web security considerations 1 C&T
4.2 Secure Socket Layer and
2 1 C&T
Transport Layer Security,
3 4.3 HTTPS, Secure Shell (SSH) 1 C&T
4 4.4 Wireless Security 1 C&T
5 4.5 Mobile Device Security 1 C&T
6 4.6 IEEE 802.11 Wireless LAN, 1 C&T
4.7 IEEE 802.11i Wireless LAN
7 1 C&T
Security
Unit V- E-Mail Security Planned Actual TL
DM Remarks
Date & Hr. * Date & Hr. P
1 5.1 Pretty Good Privacy 1 C&T
2 5.2 S/MIME IP Security 1 C&T
3 5.3 IP Security overview 1 C&T
4 5.4 IP Security architecture 1 C&T
5 5.5 Authentication Header 1 C&T
6 5.6 Encapsulating security payload 1 C&T
7 5.7 Combining security associations 1 C&T
8 5.8 Internet Key Exchange 1 C&T
9 5.9 Secure Multiparty Calculation 1 C&T
10 5.10 Virtual Elections 1 C&T
11 5.11 Single sign On 1 C&T
12 5.12 Secure Inter-branch Payment 1 C&T
Transactions,
5.13 Cross site Scripting C&T
13 1
Vulnerability
Signature of Faculty HODs Signature for HODs Signature after
plan approval execution of plan
ACTION TAKEN
Deviation from the plan of Modules:
(If deviation greater than 5-10 %)
HODs instruction to compensate deviations:
Remarks on follow-up for deviation by faculty
Signature of Faculty HOD