Skip to content
Computer Science · Grade 10

Active learning ideas

Introduction to Cryptography

Active learning works well for cryptography because encryption is a hands-on concept that requires students to manipulate keys and messages themselves. When students encode and decode during activities, they experience the mechanical process behind security, making abstract ideas concrete. This approach builds both understanding and confidence in how encryption protects data in real systems.

Ontario Curriculum ExpectationsCS.HS.S.2CS.HS.S.3
20–45 minPairs → Whole Class4 activities

Activity 01

Escape Room30 min · Pairs

Pairs: Caesar Cipher Challenge

Pairs create a shared shift key and encode sample messages using a Caesar cipher. They exchange encoded messages, decode using the key, and discuss vulnerabilities if the key leaks. Extend by trying multiple shifts.

Explain the fundamental purpose of encryption in securing digital communication.

Facilitation TipDuring the Caesar Cipher Challenge, circulate to ensure pairs are testing their decryption methods step-by-step, not just guessing solutions.

What to look forPresent students with two scenarios: 1) Sending a large file to a friend, and 2) Securely logging into an online banking website. Ask them to identify which scenario would benefit more from symmetric encryption and which from asymmetric encryption, and to briefly justify their choices.

RememberApplyAnalyzeRelationship SkillsSelf-Management
Generate Complete Lesson

Activity 02

Escape Room45 min · Small Groups

Small Groups: Symmetric vs. Asymmetric Simulation

Groups use paper cards as keys to simulate symmetric encryption on short texts, then role-play asymmetric with public-private key handouts. Compare time and security in a group chart. Debrief differences.

Compare symmetric and asymmetric encryption methods.

Facilitation TipFor the Symmetric vs. Asymmetric Simulation, assign roles clearly so each group member understands their task in the key exchange process.

What to look forOn an index card, have students define 'public key' and 'private key' in their own words. Then, ask them to describe one specific situation where using both keys is crucial for security.

RememberApplyAnalyzeRelationship SkillsSelf-Management
Generate Complete Lesson

Activity 03

Escape Room20 min · Whole Class

Whole Class: Key Exchange Demo

Project a live demo where the teacher distributes public keys via chat, students encode messages, and 'send' for private decoding. Class votes on method strengths. Record insights on shared board.

Analyze how public and private keys are used to ensure secure data exchange.

Facilitation TipIn the Key Exchange Demo, pause frequently to ask students to predict what will happen next before revealing the next step.

What to look forFacilitate a class discussion using the prompt: 'Imagine you are designing a secure messaging app. What are the advantages and disadvantages of using only symmetric encryption versus only asymmetric encryption for message transmission? How might you combine both methods?'

RememberApplyAnalyzeRelationship SkillsSelf-Management
Generate Complete Lesson

Activity 04

Escape Room25 min · Individual

Individual: Online Encryption Tool

Students use a browser-based tool to encrypt/decrypt files with symmetric and asymmetric options. Log results in a table comparing key management challenges. Share one insight with class.

Explain the fundamental purpose of encryption in securing digital communication.

Facilitation TipWhen students use the Online Encryption Tool, remind them to record their key choices and resulting ciphertexts for later comparison.

What to look forPresent students with two scenarios: 1) Sending a large file to a friend, and 2) Securely logging into an online banking website. Ask them to identify which scenario would benefit more from symmetric encryption and which from asymmetric encryption, and to briefly justify their choices.

RememberApplyAnalyzeRelationship SkillsSelf-Management
Generate Complete Lesson

A few notes on teaching this unit

Teach cryptography by starting with the Caesar Cipher Challenge because it simplifies encryption to its core mechanics. Avoid overwhelming students with complex math early; focus on the concept of keys and transformation first. Research shows that when students physically manipulate ciphers, their retention of encryption principles improves significantly. Emphasize that encryption is a tool, not a mystery, by connecting each activity to real-world uses like secure messaging or file sharing.

By the end of these activities, students should be able to explain the difference between symmetric and asymmetric encryption, describe the purpose of public and private keys, and justify their use in different scenarios. They should also demonstrate the reversibility of encryption and the importance of secure key exchange through their work and discussions.


Watch Out for These Misconceptions

  • During the Caesar Cipher Challenge, watch for students who think encrypted messages are permanently lost. Redirect them by having them decode a message they encrypted moments ago to see how it returns to plaintext.

    During the Caesar Cipher Challenge, when a pair finishes encoding a message, immediately ask them to swap with another pair and decode it using the shared shift value. This demonstrates that encryption is reversible with the correct key, reinforcing the concept through direct experience.

  • During the Symmetric vs. Asymmetric Simulation, listen for groups claiming symmetric encryption is always more secure. Redirect them by asking how the key would be shared securely in a real-world scenario.

    During the Symmetric vs. Asymmetric Simulation, after groups test symmetric key exchange, ask them to present their process and identify any vulnerabilities in sharing the key. Then have them compare this to the asymmetric method, where keys are never shared directly, to highlight the trade-offs in security and efficiency.

  • During the Key Exchange Demo, watch for students assuming public keys can decrypt messages. Redirect them by having the 'receiver' use only the public key to attempt decryption, showing it’s impossible.

    During the Key Exchange Demo, after revealing the public key to the 'sender,' pause the demo and ask the 'receiver' to attempt decoding the ciphertext using only the public key. When this fails, explicitly state that public keys only encrypt, and connect this to the role-play scenario where the private key is kept secret for decryption.


Methods used in this brief