Skip to content

Encryption and PasswordsActivities & Teaching Strategies

Active learning helps Year 9 students grasp encryption and password security because abstract concepts become concrete when they manipulate, test, and debate them. Hands-on activities build intuition about why longer isn’t always better, why encryption isn’t unbreakable, and why personal details weaken passwords.

Year 9Computing4 activities20 min45 min

Learning Objectives

  1. 1Explain how symmetric and asymmetric encryption methods protect data confidentiality using specific examples of algorithms.
  2. 2Design a secure password strategy that incorporates length, character variety, and passphrase techniques to balance security and memorability.
  3. 3Evaluate the effectiveness of common password policies, such as complexity requirements and lockout durations, in mitigating brute-force attacks.
  4. 4Compare the security implications of using password managers versus manual password storage methods.
  5. 5Critique the security of a given password against industry best practices and common vulnerabilities.

Want a complete lesson plan with these objectives? Generate a Mission

Pair Work: Cipher Encoding Challenge

Pairs create a Caesar cipher wheel from paper plates and encode secret messages for each other to decode. Swap roles after 10 minutes and discuss errors. Extend by trying Vigenère ciphers with keywords.

Prepare & details

Explain how encryption protects data confidentiality.

Facilitation Tip: During the Pair Work: Cipher Encoding Challenge, circulate and ask each pair to explain their encoding step to you before moving on to decoding, ensuring they understand the shift process.

Setup: Groups at tables with problem materials

Materials: Problem packet, Role cards (facilitator, recorder, timekeeper, reporter), Problem-solving protocol sheet, Solution evaluation rubric

ApplyAnalyzeEvaluateCreateRelationship SkillsDecision-MakingSelf-Management
45 min·Small Groups

Small Groups: Password Cracking Simulation

Groups receive lists of weak and strong passwords, then use dictionaries and common patterns to 'crack' the weak ones. Rate effectiveness on a class chart. Debrief on why complexity matters.

Prepare & details

Design a strong password strategy that balances security and memorability.

Facilitation Tip: In the Small Groups: Password Cracking Simulation, assign one student per group to act as the 'hacker' and another as the 'defender' to keep roles clear and engagement high.

Setup: Groups at tables with problem materials

Materials: Problem packet, Role cards (facilitator, recorder, timekeeper, reporter), Problem-solving protocol sheet, Solution evaluation rubric

ApplyAnalyzeEvaluateCreateRelationship SkillsDecision-MakingSelf-Management
40 min·Whole Class

Whole Class: Policy Debate Carousel

Post four password policies around the room (e.g., length rules, reuse bans). Students rotate, note pros/cons on sticky notes, then vote on the best. Facilitate a full-class discussion.

Prepare & details

Evaluate the effectiveness of different password policies in preventing unauthorized access.

Facilitation Tip: For the Whole Class: Policy Debate Carousel, provide a visible timer for each station to maintain momentum and prevent groups from over-analyzing at the expense of others' time.

Setup: Groups at tables with problem materials

Materials: Problem packet, Role cards (facilitator, recorder, timekeeper, reporter), Problem-solving protocol sheet, Solution evaluation rubric

ApplyAnalyzeEvaluateCreateRelationship SkillsDecision-MakingSelf-Management
20 min·Individual

Individual: Personal Strategy Design

Students audit their own passwords, then design three new ones using passphrase techniques. Test memorability by writing from memory after 5 minutes. Share anonymized examples.

Prepare & details

Explain how encryption protects data confidentiality.

Setup: Groups at tables with problem materials

Materials: Problem packet, Role cards (facilitator, recorder, timekeeper, reporter), Problem-solving protocol sheet, Solution evaluation rubric

ApplyAnalyzeEvaluateCreateRelationship SkillsDecision-MakingSelf-Management

Teaching This Topic

Teach encryption by starting with what students already know—secret codes from childhood—then gradually introduce complexity. Avoid overwhelming them with math by focusing on the practical impact of weak vs. strong methods. Research shows that when students experience both the creation and breaking of simple ciphers, they grasp why modern encryption relies on large keys and strong algorithms. Emphasize that security is about trade-offs, not perfection, and that human behavior is often the weakest link.

What to Expect

By the end of these activities, students will confidently explain why 'password123' fails despite its length, demonstrate how a Caesar cipher encodes and decodes messages, and design a personal password strategy that balances security and memorability. Success is visible in their discussions, decoded messages, and written defenses of their choices.

These activities are a starting point. A full mission is the experience.

  • Complete facilitation script with teacher dialogue
  • Printable student materials, ready for class
  • Differentiation strategies for every learner
Generate a Mission

Watch Out for These Misconceptions

Common MisconceptionDuring Pair Work: Cipher Encoding Challenge, listen for students to claim that a password like 'IloveSummer2024!' is secure because it is long and contains symbols.

What to Teach Instead

Use the Caesar cipher pairs to redirect this misconception: ask students to consider how easily a computer could guess 'summer' or 'love' by testing common words, then compare cracking times for random vs. dictionary-based ciphers.

Common MisconceptionDuring Small Groups: Password Cracking Simulation, expect students to believe that any encrypted message can be broken with enough time.

What to Teach Instead

After the simulation, have students compare the time taken to crack a 3-letter vs. a 26-letter key cipher, then discuss how modern encryption (e.g., AES-256) uses keys too large to brute-force even with supercomputers.

Common MisconceptionDuring Whole Class: Policy Debate Carousel, listen for students to argue that including personal details like a pet’s name makes a password stronger because it is memorable.

What to Teach Instead

Use the role-play guessing game from the carousel to expose this: have students attempt to guess passwords based on publicly available personal details, then reflect on how social media undermines such choices.

Assessment Ideas

Quick Check

After Pair Work: Cipher Encoding Challenge, present three passwords ('password123', 'MyDogFluffy!', 'Tr@v3l!ng_2_L0nd0n') and ask students to identify the strongest and weakest, explaining their reasoning in pairs before sharing with the class.

Exit Ticket

During Small Groups: Password Cracking Simulation, have students write on an index card: 1) One reason why using the same password for multiple accounts is risky, and 2) One characteristic of a strong password they will implement.

Discussion Prompt

After Whole Class: Policy Debate Carousel, facilitate a class discussion using the prompt: 'Imagine a company requires employees to change passwords every 30 days and use a 15-character passphrase. What are the benefits and drawbacks for both the company and employees?'

Extensions & Scaffolding

  • Challenge students to design a cipher that resists brute-force attacks by requiring a key longer than 26 characters.
  • Provide a word bank of mixed-case, symbol-rich passwords for students who struggle to generate their own strong options.
  • Invite students to research and present on a real-world encryption failure (e.g., Heartbleed) to deepen their understanding of algorithmic limits.

Key Vocabulary

EncryptionThe process of converting readable data (plaintext) into an unreadable format (ciphertext) using an algorithm and a key.
CiphertextThe scrambled, unreadable output of an encryption process, which can only be deciphered back into plaintext with the correct key.
Symmetric EncryptionAn encryption method that uses a single, shared secret key for both encrypting and decrypting data.
Asymmetric EncryptionAn encryption method that uses a pair of keys: a public key for encrypting and a private key for decrypting.
Password ManagerA software application used to store and manage passwords for various online accounts, often generating strong, unique passwords.

Ready to teach Encryption and Passwords?

Generate a full mission with everything you need

Generate a Mission