Skip to content
Computer Science · Grade 11

Active learning ideas

Encryption and Cryptography

Active learning helps students grasp encryption and cryptography because these concepts rely on hands-on problem solving, not passive absorption. When students manipulate ciphers, simulate key exchanges, or debate security trade-offs, they internalize how algorithms and keys function in real systems.

Ontario Curriculum ExpectationsCS.HS.S.4CS.HS.S.5
30–50 minPairs → Whole Class4 activities

Activity 01

Escape Room35 min · Pairs

Pairs: Caesar Cipher Coding

Students pair up to code a Caesar cipher in Python or JavaScript. They select shift values, encrypt classmate messages, exchange, and decrypt. Groups then test larger shifts and discuss brute-force feasibility.

How does public key cryptography allow two strangers to communicate securely?

Facilitation TipFor Caesar Cipher Coding, provide each pair with a plaintext message and a shifted alphabet sheet to physically encode and decode, ensuring both students take turns encrypting and decrypting.

What to look forPresent students with scenarios: 'Alice wants to send a secret message to Bob, whom she has never met. Which type of encryption should she use and why?' and 'A company needs to encrypt large files for internal storage. Which type of encryption is more efficient and why?' Collect responses to gauge understanding of symmetric vs. asymmetric use cases.

RememberApplyAnalyzeRelationship SkillsSelf-Management
Generate Complete Lesson

Activity 02

Escape Room45 min · Small Groups

Small Groups: Diffie-Hellman Simulation

Provide worksheets for groups to simulate Diffie-Hellman key exchange with numbers. Assign roles: Alice, Bob, Eve. Calculate shared secrets step-by-step, then analyze if Eve intercepts public values.

What are the societal implications if government agencies have backdoors to encryption?

Facilitation TipDuring the Diffie-Hellman Simulation, circulate among groups to clarify the color-mixing analogy when students confuse public and private values.

What to look forPose the question: 'If governments could easily access encrypted communications, what potential benefits could arise for society? Conversely, what risks to individual freedoms and democratic principles might emerge?' Facilitate a class debate, encouraging students to cite specific examples and ethical frameworks.

RememberApplyAnalyzeRelationship SkillsSelf-Management
Generate Complete Lesson

Activity 03

Escape Room50 min · Whole Class

Whole Class: Backdoor Debate

Pose scenarios on government backdoors. Students vote positions, hear expert talks from volunteers, then debate in open forum with evidence from research. Tally shifts in opinion.

How does the rise of quantum computing threaten current encryption standards?

Facilitation TipFor the Backdoor Debate, assign roles in advance so each student prepares arguments for or against government access to encrypted communications before the discussion begins.

What to look forAsk students to write down one historical cryptographic tool (e.g., Caesar cipher, Enigma machine) and one modern encryption standard (e.g., AES, RSA). For each, they should briefly describe its core principle and one limitation or advantage.

RememberApplyAnalyzeRelationship SkillsSelf-Management
Generate Complete Lesson

Activity 04

Escape Room30 min · Individual

Individual: Quantum Threat Research

Students research one post-quantum algorithm, summarize threats to RSA, and propose transitions. Present findings in a shared digital poster gallery for peer review.

How does public key cryptography allow two strangers to communicate securely?

Facilitation TipIn Quantum Threat Research, require students to include at least one source from a reputable cryptography organization or peer-reviewed journal in their final report.

What to look forPresent students with scenarios: 'Alice wants to send a secret message to Bob, whom she has never met. Which type of encryption should she use and why?' and 'A company needs to encrypt large files for internal storage. Which type of encryption is more efficient and why?' Collect responses to gauge understanding of symmetric vs. asymmetric use cases.

RememberApplyAnalyzeRelationship SkillsSelf-Management
Generate Complete Lesson

A few notes on teaching this unit

Start with concrete examples before abstract theory, using historical ciphers like Caesar to build intuition before introducing AES or RSA. Avoid overwhelming students with mathematical complexity; focus instead on the concepts of keys, algorithms, and security trade-offs. Research shows that ethical discussions, embedded within technical topics, deepen student engagement and critical thinking about real-world applications.

Successful learning looks like students confidently distinguishing symmetric from asymmetric encryption and explaining why each method matters in different contexts. They should articulate key security principles and consider ethical implications of encryption use in society.


Watch Out for These Misconceptions

  • During Caesar Cipher Coding, watch for students assuming the shift number can be used to decrypt any message encrypted with that key.

    Have students attempt to decrypt a message encrypted with shift 3 using a shift 5 key, then ask them to explain why the decryption fails, reinforcing the need for the correct key.

  • During Diffie-Hellman Simulation, watch for students thinking the exchanged color represents the final shared key.

    Ask groups to write down the actual shared key color after mixing and compare it to the exchanged color, clarifying that the exchange reveals the color but the key is derived from the mixing process.

  • During Quantum Threat Research, watch for students believing that quantum computers will completely obsolete current encryption standards overnight.

    Have students calculate how many qubits would be required to break a 256-bit AES key using Grover's algorithm and discuss the timeline for practical quantum computers, grounding the claim in current research.


Methods used in this brief