Skip to content
Technologies · Year 9

Active learning ideas

Encryption and Digital Signatures

Active learning makes encryption and digital signatures concrete for students. Encountering these concepts through hands-on tasks helps learners move beyond abstract definitions to grasp how encryption protects data and how signatures verify identity, which builds lasting understanding.

ACARA Content DescriptionsAC9DT10K02AC9DT10K03
20–35 minPairs → Whole Class4 activities

Activity 01

Problem-Based Learning25 min · Pairs

Pairs Activity: Symmetric Cipher Swap

Pairs invent a simple substitution cipher and share keys face-to-face. One encrypts a secret message for the partner to decode. Groups then discuss key-sharing risks and try intercepting a 'stolen' key from another pair.

Explain how encryption protects our privacy in an interconnected world.

Facilitation TipDuring Symmetric Cipher Swap, have each pair write down the time it takes to encode and decode a short message to emphasize speed versus security trade-offs.

What to look forPresent students with two short scenarios: one describing a secure online purchase and another describing a digitally signed email. Ask students to identify which type of encryption (symmetric or asymmetric) is primarily used in each scenario and to briefly explain why.

AnalyzeEvaluateCreateDecision-MakingSelf-ManagementRelationship Skills
Generate Complete Lesson

Activity 02

Problem-Based Learning35 min · Small Groups

Small Groups: Asymmetric Key Role-Play

Assign roles as sender, receiver, and eavesdropper in each group of four. Use paper 'public/private keys' (number pairs) to encrypt/decrypt messages. Groups simulate a secure transaction and test what happens if private keys leak.

Predict what would happen to global commerce if modern encryption was cracked.

Facilitation TipIn Asymmetric Key Role-Play, assign roles clearly and provide props like colored paper keys to make public and private keys visually distinct.

What to look forPose the question: 'If a government could legally access anyone's private encryption key, what are the potential benefits for national security, and what are the potential risks to individual privacy and global commerce?' Facilitate a class debate, encouraging students to support their arguments with reasoning about encryption's functions.

AnalyzeEvaluateCreateDecision-MakingSelf-ManagementRelationship Skills
Generate Complete Lesson

Activity 03

Problem-Based Learning30 min · Whole Class

Whole Class: Digital Signature Verification

Project a message hash; teacher 'signs' it with a private key demo. Students verify using public keys on handouts. Class votes on authenticity after introducing a tampered version, noting verification failures.

Justify the balance between the need for security and the need for government oversight.

Facilitation TipDuring Digital Signature Verification, ask students to tamper with a verified message and observe signature failure to reinforce integrity checks.

What to look forAsk students to write down the steps involved in a sender creating a digital signature for a message and the steps a receiver would take to verify that signature. They should include the roles of the sender's private key and public key.

AnalyzeEvaluateCreateDecision-MakingSelf-ManagementRelationship Skills
Generate Complete Lesson

Activity 04

Problem-Based Learning20 min · Individual

Individual: Encryption Impact Prediction

Students list three global commerce effects if encryption cracks, then share in a quick gallery walk. Collect predictions to fuel a follow-up debate on security versus oversight.

Explain how encryption protects our privacy in an interconnected world.

Facilitation TipFor Encryption Impact Prediction, set a strict four-sentence limit for predictions to force concise reasoning about consequences.

What to look forPresent students with two short scenarios: one describing a secure online purchase and another describing a digitally signed email. Ask students to identify which type of encryption (symmetric or asymmetric) is primarily used in each scenario and to briefly explain why.

AnalyzeEvaluateCreateDecision-MakingSelf-ManagementRelationship Skills
Generate Complete Lesson

A few notes on teaching this unit

Experienced teachers introduce encryption by focusing on the problem it solves, such as secure communication in the presence of an eavesdropper. They avoid starting with math formulas and instead use analogies like locked boxes or sealed letters to build intuition. Role-play and physical models help students grasp abstract concepts, while discussions about real-world trade-offs develop critical thinking about security policies.

Successful learning shows when students can explain the difference between symmetric and asymmetric encryption, describe how digital signatures work, and justify which method fits different security needs. They should also recognize the risks in key exchange and the role of hashing in signatures.


Watch Out for These Misconceptions

  • During Symmetric Cipher Swap, students may believe encryption permanently hides data from everyone.

    During Symmetric Cipher Swap, pause after decoding and ask partners to confirm that the original message reappears. Use their quick decoding experience to explain that encryption hides data temporarily and can be reversed with the right key.

  • During Asymmetric Key Role-Play, students may think symmetric encryption is always safer because it feels more private.

    During Asymmetric Key Role-Play, have students simulate an interception during key exchange and observe how symmetric keys can be stolen. Point out the role-play’s outcome to highlight why asymmetric methods secure key distribution better.

  • During Digital Signature Verification, students may believe signatures encrypt the entire message.

    During Digital Signature Verification, show how the signature file is separate from the message. Have students open both files and change a single word in the message to see the signature break, making clear that signatures verify origin, not secrecy.


Methods used in this brief