Activity 01
Simulation Game: Public Key Exchange Role-Play
Assign roles as Alice and Bob; provide worksheets with sample public/private key pairs. Students encrypt a message using Alice's public key, exchange it, then decrypt with Bob's private key. Discuss vulnerabilities if keys are swapped. Debrief on secure stranger communication.
How does public key cryptography allow two strangers to communicate securely?
Facilitation TipDuring Public Key Exchange Role-Play, assign students as Alice, Bob, and an eavesdropper to physically pass encrypted notes and witness failed decryptions when wrong keys are used.
What to look forPose the question: 'Should governments have the right to access encrypted communications to prevent crime or terrorism?' Facilitate a class debate where students must argue for or against this position, citing specific examples of privacy concerns or security benefits.