Activity 01
Simulation Lab: Symmetric Key Sharing Failures
Pairs simulate a network: one encrypts messages with a shared key, an 'eavesdropper' intercepts during exchange. Groups document breach points, then discuss solutions. Introduce asymmetric basics via provided diagram.
How does asymmetric encryption solve the problem of secure key exchange?
Facilitation TipIn the Simulation Lab, set a visible timer to pressure key exchange and make breaches visible the moment they occur, reinforcing why secure distribution matters.
What to look forPresent students with three scenarios: 1) encrypting a large video file for personal backup, 2) a secure chat application needing to establish a connection, and 3) signing a digital document. Ask students to identify which type of encryption (symmetric, asymmetric, or both) would be most appropriate for each scenario and briefly justify their choice.