Skip to content
Networks and Digital Security · Term 4

Encryption and Cryptography

Study the history and application of symmetric and asymmetric encryption in securing digital communications.

Need a lesson plan for Computer Science?

Generate Mission

Key Questions

  1. How does public key cryptography allow two strangers to communicate securely?
  2. What are the societal implications if government agencies have backdoors to encryption?
  3. How does the rise of quantum computing threaten current encryption standards?

Ontario Curriculum Expectations

CS.HS.S.4CS.HS.S.5
Grade: Grade 11
Subject: Computer Science
Unit: Networks and Digital Security
Period: Term 4

About This Topic

Encryption and cryptography safeguard digital communications by converting plaintext into ciphertext using mathematical algorithms and keys. Grade 11 students investigate symmetric encryption, such as AES, which relies on a shared secret key for both encrypting and decrypting data, and asymmetric encryption, like RSA, which uses a public key for encryption and a matching private key for decryption. This distinction allows secure exchanges between strangers without prior key sharing, aligning with Ontario curriculum standards CS.HS.S.4 and CS.HS.S.5 on secure protocols.

Students trace the history from ancient Caesar ciphers and World War II Enigma machines to modern standards, while addressing key questions. How do public keys enable stranger-to-stranger security? What privacy risks arise from government backdoors? How will quantum computing, via algorithms like Shor's, undermine RSA by factoring large primes efficiently? These explorations highlight ethical tensions and future challenges in networks and digital security.

Active learning suits this topic perfectly. When students code ciphers, simulate attacks, or debate backdoors in groups, abstract concepts gain immediacy. Hands-on key exchanges reveal vulnerabilities intuitively, collaborative cracking builds problem-solving skills, and role-plays foster nuanced views on societal impacts.

Learning Objectives

  • Compare and contrast the mechanisms of symmetric and asymmetric encryption, identifying their respective strengths and weaknesses.
  • Analyze the historical evolution of cryptographic methods, from ancient ciphers to modern algorithms like AES and RSA.
  • Evaluate the ethical implications of government access to encrypted data, considering privacy versus national security concerns.
  • Explain how public key cryptography enables secure communication between parties who have never met.
  • Predict the impact of quantum computing on current encryption standards, citing specific algorithms like Shor's algorithm.

Before You Start

Introduction to Data Representation

Why: Students need to understand how information is represented digitally to grasp how it can be transformed through encryption.

Basic Algorithmic Thinking

Why: Understanding that encryption relies on step-by-step processes (algorithms) is foundational to comprehending cryptographic methods.

Key Vocabulary

Symmetric EncryptionA type of encryption that uses a single, shared secret key for both encrypting and decrypting data. Examples include AES.
Asymmetric EncryptionA type of encryption that uses a pair of keys: a public key for encryption and a private key for decryption. Examples include RSA.
PlaintextThe original, unencrypted message or data that is understandable by humans or computers.
CiphertextThe encrypted form of plaintext, rendered unreadable without the correct decryption key.
Public KeyIn asymmetric encryption, this key is freely shared and used to encrypt messages intended for the private key holder.
Private KeyIn asymmetric encryption, this key is kept secret and is used to decrypt messages encrypted with the corresponding public key.

Active Learning Ideas

See all activities

Real-World Connections

Financial institutions like banks use both symmetric and asymmetric encryption to secure online transactions, protecting customer account details and preventing fraud during data transfer.

Secure communication platforms such as Signal and WhatsApp employ end-to-end encryption, utilizing public key cryptography to ensure that only the sender and intended recipient can read messages.

Governments worldwide grapple with the balance between national security and individual privacy, debating legislation that could mandate encryption backdoors for law enforcement access to encrypted communications.

Watch Out for These Misconceptions

Common MisconceptionPublic keys can be used to decrypt messages.

What to Teach Instead

Only private keys decrypt in asymmetric systems; public keys solely encrypt. Role-play simulations let students act as Eve with a public key, failing to read messages, which clarifies the one-way function clearly.

Common MisconceptionAll encryption is unbreakable with long enough keys.

What to Teach Instead

Security relies on algorithm strength too; quantum attacks like Grover's weaken symmetric keys. Coding exercises to crack short keys show brute-force patterns, helping students evaluate real-world key lengths.

Common MisconceptionSymmetric encryption replaces asymmetric entirely.

What to Teach Instead

Symmetric handles bulk data faster; hybrids combine both. Speed comparison activities in groups reveal why key exchange uses asymmetric, building appreciation for layered security.

Assessment Ideas

Quick Check

Present students with scenarios: 'Alice wants to send a secret message to Bob, whom she has never met. Which type of encryption should she use and why?' and 'A company needs to encrypt large files for internal storage. Which type of encryption is more efficient and why?' Collect responses to gauge understanding of symmetric vs. asymmetric use cases.

Discussion Prompt

Pose the question: 'If governments could easily access encrypted communications, what potential benefits could arise for society? Conversely, what risks to individual freedoms and democratic principles might emerge?' Facilitate a class debate, encouraging students to cite specific examples and ethical frameworks.

Exit Ticket

Ask students to write down one historical cryptographic tool (e.g., Caesar cipher, Enigma machine) and one modern encryption standard (e.g., AES, RSA). For each, they should briefly describe its core principle and one limitation or advantage.

Ready to teach this topic?

Generate a complete, classroom-ready active learning mission in seconds.

Generate a Custom Mission

Frequently Asked Questions

How does public key cryptography enable secure stranger communication?
Public key systems generate a key pair: public for anyone to encrypt messages, private kept secret for decryption only. Strangers use the recipient's public key from a directory, ensuring no shared secret needed upfront. This underpins HTTPS and secure email, preventing eavesdroppers from reading even if they intercept traffic. Students grasp this through simulations showing failed attacks.
What societal risks come from government encryption backdoors?
Backdoors allow agencies to bypass encryption, aiding law enforcement but risking mass surveillance, data breaches if compromised, and eroded public trust in digital services. They create a chilling effect on free speech and enable abuse by authoritarian regimes. Debates help students weigh security benefits against privacy rights, mirroring real policy tensions.
How does quantum computing threaten current encryption standards?
Quantum computers run Shor's algorithm to factor large numbers exponentially faster, breaking RSA and ECC by deriving private keys from public ones. Grover's algorithm halves symmetric key strength effectively. Urgent shift to post-quantum algorithms like lattice-based crypto is needed; research activities expose students to NIST competitions.
How does active learning enhance cryptography instruction?
Active methods like coding ciphers or simulating key exchanges make math tangible, as students experience encryption failures firsthand. Group debates on backdoors develop ethical reasoning, while cracking exercises reveal key principles intuitively. These approaches boost retention over lectures, align with inquiry-based Ontario curricula, and prepare students for cybersecurity careers through practical skills.