Skip to content
Computing · Year 8

Active learning ideas

Encryption: Securing Data

Active learning helps students grasp encryption because it transforms abstract concepts like keys and algorithms into concrete, hands-on experiences. When students manipulate ciphers or simulate secure transmissions, they build durable understanding that static examples cannot provide.

National Curriculum Attainment TargetsKS3: Computing - CybersecurityKS3: Computing - Data Encryption
25–45 minPairs → Whole Class4 activities

Activity 01

Problem-Based Learning30 min · Pairs

Pairs: Caesar Cipher Challenge

Pairs create a Caesar cipher with a shift of 3-10, encode a secret message, and swap with another pair to decode. Provide letter frequency charts for cracking tougher shifts. Discuss successes and failures as a class.

Explain how encryption protects data during storage and transmission.

Facilitation TipDuring the Caesar Cipher Challenge, circulate with a decoder ring to help pairs test their shifts quickly, reinforcing the relationship between key size and difficulty.

What to look forProvide students with a short, encrypted message using a Caesar cipher. Ask them to: 1. State the key used if they can crack it. 2. Write one sentence explaining why this method is not secure for modern data. 3. Name one real-world application where stronger encryption is essential.

AnalyzeEvaluateCreateDecision-MakingSelf-ManagementRelationship Skills
Generate Complete Lesson

Activity 02

Problem-Based Learning45 min · Small Groups

Small Groups: Modern Encryption Simulation

Groups use online tools like CyberChef to encrypt/decrypt messages with base64 and simple AES demos. Rotate roles: encoder, decoder, attacker. Record how key length affects security.

Compare different methods of encryption (e.g., Caesar cipher vs. modern encryption concepts).

Facilitation TipIn the Modern Encryption Simulation, assign roles (sender, receiver, interceptor) to make the purpose of keys and algorithms visible to everyone.

What to look forPose the question: 'Should governments have the ability to access encrypted communications for national security purposes, even if it compromises individual privacy?' Facilitate a class debate, asking students to support their arguments with examples of encryption's benefits and risks.

AnalyzeEvaluateCreateDecision-MakingSelf-ManagementRelationship Skills
Generate Complete Lesson

Activity 03

Problem-Based Learning40 min · Whole Class

Whole Class: Encryption Debate

Divide class into privacy advocates and security experts. Present scenarios like government surveillance. Vote and reflect on balanced views using prepared evidence cards.

Analyze the balance between personal privacy and national security in encryption debates.

Facilitation TipFor the Encryption Debate, give students 2 minutes to prepare opening statements using evidence from their simulations or prior learning.

What to look forPresent students with two scenarios: one describing data stored on a lost laptop and another describing a message sent over the internet. Ask them to identify which type of encryption (symmetric or asymmetric) would be more appropriate for each scenario and briefly explain why.

AnalyzeEvaluateCreateDecision-MakingSelf-ManagementRelationship Skills
Generate Complete Lesson

Activity 04

Problem-Based Learning25 min · Individual

Individual: Code Breaker History Hunt

Students research Enigma machine or Vigenère cipher online, then apply one method to a provided message. Share findings in a gallery walk.

Explain how encryption protects data during storage and transmission.

What to look forProvide students with a short, encrypted message using a Caesar cipher. Ask them to: 1. State the key used if they can crack it. 2. Write one sentence explaining why this method is not secure for modern data. 3. Name one real-world application where stronger encryption is essential.

AnalyzeEvaluateCreateDecision-MakingSelf-ManagementRelationship Skills
Generate Complete Lesson

A few notes on teaching this unit

Teach encryption by starting with the familiar (Caesar cipher) before introducing modern algorithms, because this progression builds confidence and reveals why complexity matters. Avoid overwhelming students with mathematical details early; focus first on the concept of keys and the purpose of scrambling data. Research shows that concrete examples paired with immediate application help students transfer abstract ideas to real-world contexts.

By the end of these activities, students should confidently explain how Caesar and AES ciphers work, compare their security strengths, and justify the importance of encryption in daily technology use. They will also practice ethical reasoning about encryption’s role in society.


Watch Out for These Misconceptions

  • During the Caesar Cipher Challenge, watch for students who believe the scrambled text has disappeared or is ‘gone.’

    Use the challenge’s ciphertext and plaintext side-by-side to show that data is still present but transformed, linking this observation to how real encryption protects data at rest.

  • During the Modern Encryption Simulation, listen for claims that all encryption methods are equally secure.

    Have groups compare their simulation results with frequency analysis of historical ciphers, then prompt them to explain why modern algorithms resist such attacks.

  • During the Encryption Debate, note when students dismiss encryption as irrelevant to their lives.

    Refer to the simulation’s messaging app scenario and ask students to identify which encrypted services they already use daily, grounding the discussion in their lived experience.


Methods used in this brief