Skip to content
Technologies · Year 7

Active learning ideas

Introduction to Encryption

Encryption abstracts can confuse students without concrete manipulation of symbols and keys. Active learning lets them physically transform plaintext into ciphertext, experiencing both the vulnerability of unprotected data and the power of simple algorithms to block access.

ACARA Content DescriptionsAC9TDI8K03
15–35 minPairs → Whole Class4 activities

Activity 01

Document Mystery25 min · Pairs

Pairs Activity: Caesar Cipher Swap

Pairs agree on a shift number between 1 and 25, then write a short secret message and encrypt it using the Caesar method. They swap ciphertexts with their partner to decrypt and verify accuracy. Pairs discuss what happens if the shift is guessed wrong.

Explain the fundamental purpose of encryption.

Facilitation TipDuring Caesar Cipher Swap, circulate and listen for pairs verbalizing the shift rule before they write, to catch misapplied directions early.

What to look forProvide students with two short text snippets, one labeled 'Unencrypted' and one labeled 'Encrypted'. Ask them to write one sentence explaining which is which and why. Then, ask them to list one type of information that should always be encrypted.

AnalyzeEvaluateSelf-ManagementDecision-Making
Generate Complete Lesson

Activity 02

Document Mystery35 min · Small Groups

Small Groups: Key Security Simulation

Groups role-play sending messages: one member encrypts a message with a shared key, passes it via a 'public channel,' and a 'eavesdropper' tries to read it without the key. Groups test different key lengths and report on security levels. Debrief on safe key sharing.

Differentiate between encrypted and unencrypted data.

Facilitation TipIn Key Security Simulation, assign one student as the ‘eavesdropper’ who records how long it takes to guess a key without context clues, making the urgency of secure keys tangible.

What to look forPresent a scenario: 'You are sending a secret message to a friend using a simple substitution cipher where A=B, B=C, etc. What is the purpose of this cipher? What would happen if someone intercepted the message without knowing the rule?'

AnalyzeEvaluateSelf-ManagementDecision-Making
Generate Complete Lesson

Activity 03

Document Mystery20 min · Whole Class

Whole Class: Visual Encryption Demo

Project a plaintext message and demonstrate encryption with a simple tool or Scratch program, showing key input and output. Class predicts decryption results for varied keys, then votes on secure vs insecure examples. Follow with Q&A on transmission risks.

Analyze how encryption protects sensitive information online.

Facilitation TipFor the Visual Encryption Demo, use colored cards to trace each letter’s path from plaintext to ciphertext so the transformation is visible to the whole class at once.

What to look forFacilitate a class discussion: 'Imagine you are shopping online. How does encryption help protect your payment details? What are the risks if a website does not use encryption for sensitive transactions?'

AnalyzeEvaluateSelf-ManagementDecision-Making
Generate Complete Lesson

Activity 04

Document Mystery15 min · Individual

Individual: Personal Data Lock

Students encrypt their own email or username using a substitution cipher they design. They store it in a class-shared 'database' and swap keys with a teacher for verification. Reflect on why personal info needs protection online.

Explain the fundamental purpose of encryption.

Facilitation TipDuring Personal Data Lock, remind students to include at least one sensitive detail they would never share without encryption, grounding the activity in real-life stakes.

What to look forProvide students with two short text snippets, one labeled 'Unencrypted' and one labeled 'Encrypted'. Ask them to write one sentence explaining which is which and why. Then, ask them to list one type of information that should always be encrypted.

AnalyzeEvaluateSelf-ManagementDecision-Making
Generate Complete Lesson

A few notes on teaching this unit

Start with the physical act of scrambling letters, then layer in the concept of keys as shared secrets. Avoid technical jargon that obscures the core idea. Research shows that tactile manipulation of ciphertext builds durable mental models before introducing complex algorithms. Emphasize that encryption does not delete data but makes it unreadable to the wrong eyes, a subtle but critical distinction for young learners.

Students will demonstrate understanding by correctly encoding and decoding messages, identifying the role of keys, and explaining why encryption matters for personal data. Look for clear articulation of the difference between scrambled text and true secrecy.


Watch Out for These Misconceptions

  • During Caesar Cipher Swap, watch for students who believe the cipher hides their message from sight entirely.

    During Caesar Cipher Swap, have pairs exchange ciphertexts and attempt to read them aloud. When they fail, prompt them to notice the letters are still there, just rearranged, to correct the idea that encryption removes visibility.

  • During Key Security Simulation, some may think small keys are as hard to crack as large ones.

    During Key Security Simulation, reveal how many guesses it takes to crack a 1-shift key versus a 5-shift key. Ask groups to compare attempts and discuss why key length matters.

  • During Visual Encryption Demo, students may assume only experts can create secure ciphers.

    During Visual Encryption Demo, highlight everyday examples like HTTPS and app locks. Ask students to name three places they rely on encryption already, linking the abstract concept to their own lives.


Methods used in this brief