Skip to content

Encryption and CryptographyActivities & Teaching Strategies

Active learning helps students grasp encryption and cryptography because these concepts rely on hands-on problem solving, not passive absorption. When students manipulate ciphers, simulate key exchanges, or debate security trade-offs, they internalize how algorithms and keys function in real systems.

Grade 11Computer Science4 activities30 min50 min

Learning Objectives

  1. 1Compare and contrast the mechanisms of symmetric and asymmetric encryption, identifying their respective strengths and weaknesses.
  2. 2Analyze the historical evolution of cryptographic methods, from ancient ciphers to modern algorithms like AES and RSA.
  3. 3Evaluate the ethical implications of government access to encrypted data, considering privacy versus national security concerns.
  4. 4Explain how public key cryptography enables secure communication between parties who have never met.
  5. 5Predict the impact of quantum computing on current encryption standards, citing specific algorithms like Shor's algorithm.

Want a complete lesson plan with these objectives? Generate a Mission

35 min·Pairs

Pairs: Caesar Cipher Coding

Students pair up to code a Caesar cipher in Python or JavaScript. They select shift values, encrypt classmate messages, exchange, and decrypt. Groups then test larger shifts and discuss brute-force feasibility.

Prepare & details

How does public key cryptography allow two strangers to communicate securely?

Facilitation Tip: For Caesar Cipher Coding, provide each pair with a plaintext message and a shifted alphabet sheet to physically encode and decode, ensuring both students take turns encrypting and decrypting.

Setup: Group tables with puzzle envelopes, optional locked boxes

Materials: Puzzle packets (4-6 per group), Lock boxes or code sheets, Timer (projected), Hint cards

RememberApplyAnalyzeRelationship SkillsSelf-Management
45 min·Small Groups

Small Groups: Diffie-Hellman Simulation

Provide worksheets for groups to simulate Diffie-Hellman key exchange with numbers. Assign roles: Alice, Bob, Eve. Calculate shared secrets step-by-step, then analyze if Eve intercepts public values.

Prepare & details

What are the societal implications if government agencies have backdoors to encryption?

Facilitation Tip: During the Diffie-Hellman Simulation, circulate among groups to clarify the color-mixing analogy when students confuse public and private values.

Setup: Group tables with puzzle envelopes, optional locked boxes

Materials: Puzzle packets (4-6 per group), Lock boxes or code sheets, Timer (projected), Hint cards

RememberApplyAnalyzeRelationship SkillsSelf-Management
50 min·Whole Class

Whole Class: Backdoor Debate

Pose scenarios on government backdoors. Students vote positions, hear expert talks from volunteers, then debate in open forum with evidence from research. Tally shifts in opinion.

Prepare & details

How does the rise of quantum computing threaten current encryption standards?

Facilitation Tip: For the Backdoor Debate, assign roles in advance so each student prepares arguments for or against government access to encrypted communications before the discussion begins.

Setup: Group tables with puzzle envelopes, optional locked boxes

Materials: Puzzle packets (4-6 per group), Lock boxes or code sheets, Timer (projected), Hint cards

RememberApplyAnalyzeRelationship SkillsSelf-Management
30 min·Individual

Individual: Quantum Threat Research

Students research one post-quantum algorithm, summarize threats to RSA, and propose transitions. Present findings in a shared digital poster gallery for peer review.

Prepare & details

How does public key cryptography allow two strangers to communicate securely?

Facilitation Tip: In Quantum Threat Research, require students to include at least one source from a reputable cryptography organization or peer-reviewed journal in their final report.

Setup: Group tables with puzzle envelopes, optional locked boxes

Materials: Puzzle packets (4-6 per group), Lock boxes or code sheets, Timer (projected), Hint cards

RememberApplyAnalyzeRelationship SkillsSelf-Management

Teaching This Topic

Start with concrete examples before abstract theory, using historical ciphers like Caesar to build intuition before introducing AES or RSA. Avoid overwhelming students with mathematical complexity; focus instead on the concepts of keys, algorithms, and security trade-offs. Research shows that ethical discussions, embedded within technical topics, deepen student engagement and critical thinking about real-world applications.

What to Expect

Successful learning looks like students confidently distinguishing symmetric from asymmetric encryption and explaining why each method matters in different contexts. They should articulate key security principles and consider ethical implications of encryption use in society.

These activities are a starting point. A full mission is the experience.

  • Complete facilitation script with teacher dialogue
  • Printable student materials, ready for class
  • Differentiation strategies for every learner
Generate a Mission

Watch Out for These Misconceptions

Common MisconceptionDuring Caesar Cipher Coding, watch for students assuming the shift number can be used to decrypt any message encrypted with that key.

What to Teach Instead

Have students attempt to decrypt a message encrypted with shift 3 using a shift 5 key, then ask them to explain why the decryption fails, reinforcing the need for the correct key.

Common MisconceptionDuring Diffie-Hellman Simulation, watch for students thinking the exchanged color represents the final shared key.

What to Teach Instead

Ask groups to write down the actual shared key color after mixing and compare it to the exchanged color, clarifying that the exchange reveals the color but the key is derived from the mixing process.

Common MisconceptionDuring Quantum Threat Research, watch for students believing that quantum computers will completely obsolete current encryption standards overnight.

What to Teach Instead

Have students calculate how many qubits would be required to break a 256-bit AES key using Grover's algorithm and discuss the timeline for practical quantum computers, grounding the claim in current research.

Assessment Ideas

Quick Check

After Caesar Cipher Coding, present students with a scenario: 'Eve intercepts a message encrypted with a Caesar cipher and shift 7. Which shift should she try first to decrypt it?' Collect responses to assess understanding of key-based decryption.

Discussion Prompt

During the Backdoor Debate, circulate and listen for students citing specific examples of encryption use in secure messaging apps or banking systems to justify their positions on government access.

Exit Ticket

After Quantum Threat Research, ask students to write a short paragraph explaining one advantage and one limitation of AES-256 in the context of quantum computing threats.

Extensions & Scaffolding

  • Challenge early finishers to research elliptic curve cryptography and present a 2-minute explanation of why it is used in modern applications.
  • Scaffolding for struggling students: provide a partially completed example of a Diffie-Hellman key exchange with missing values for them to calculate step-by-step.
  • Deeper exploration: invite a guest speaker from a local cybersecurity firm to discuss how encryption is implemented in industry practices and current threats.

Key Vocabulary

Symmetric EncryptionA type of encryption that uses a single, shared secret key for both encrypting and decrypting data. Examples include AES.
Asymmetric EncryptionA type of encryption that uses a pair of keys: a public key for encryption and a private key for decryption. Examples include RSA.
PlaintextThe original, unencrypted message or data that is understandable by humans or computers.
CiphertextThe encrypted form of plaintext, rendered unreadable without the correct decryption key.
Public KeyIn asymmetric encryption, this key is freely shared and used to encrypt messages intended for the private key holder.
Private KeyIn asymmetric encryption, this key is kept secret and is used to decrypt messages encrypted with the corresponding public key.

Ready to teach Encryption and Cryptography?

Generate a full mission with everything you need

Generate a Mission