Skip to content
Computing · Secondary 3

Active learning ideas

Protecting Data with Encryption (Basic Concept)

Students learn best when they can connect abstract ideas to hands-on tasks. For encryption, active learning lets them experience firsthand how scrambled data protects information, making the concept memorable and meaningful. These activities transform a technical idea into a relatable skill by using everyday scenarios like secret messages and shopping trips.

MOE Syllabus OutcomesMOE: Cybersecurity - S3
20–40 minPairs → Whole Class4 activities

Activity 01

Pair Encoding Challenge: Daily Secrets

Pairs invent a basic shift code for the alphabet and encode personal messages about school routines. They swap messages with their partner, who uses the shared key to decode. Groups then share successes and failures in protecting 'private' info.

Explain the purpose of encryption in keeping digital information private.

Facilitation TipDuring the Pair Encoding Challenge, circulate to listen for students’ explanations of how their encoding mimics encryption’s scrambling effect.

What to look forProvide students with a scenario, for example: 'You are sending a secret message to a friend using a public computer.' Ask them to write two sentences explaining how encryption would protect their message and one example of what might happen if the message was not encrypted.

RememberUnderstandApplyRelationship SkillsSelf-Management
Generate Complete Lesson

Activity 02

Numbered Heads Together40 min · Small Groups

Scenario Role-Play: Secure Shopping

Small groups simulate an online purchase: one acts as buyer entering card details, another as hacker intercepting unencrypted vs encrypted data. They compare outcomes and note when data stays safe. Debrief on real app indicators like padlock icons.

Describe how encryption makes data unreadable to unauthorized individuals.

Facilitation TipIn the Secure Shopping role-play, assign specific roles like shopper, cashier, and hacker to keep the scenario dynamic and focused.

What to look forPose the question: 'Imagine you receive a message that looks like random letters and symbols. What does this tell you about how the message might have been protected?' Facilitate a brief class discussion, guiding students to connect the unreadable format to encryption.

RememberUnderstandApplyRelationship SkillsSelf-Management
Generate Complete Lesson

Activity 03

Numbered Heads Together25 min · Whole Class

Whole Class Simulation: Message Intercept

Teacher sends a class-wide 'message' first unencrypted, then encrypted. Students attempt to 'read' it in roles as sender, receiver, and intruder. Discuss barriers without keys and vote on encryption's effectiveness.

Identify common situations where encryption is used (e.g., online shopping, messaging).

Facilitation TipFor the Message Intercept simulation, set a clear time limit so students experience the tension of failed access without the key.

What to look forPresent students with a list of digital activities. Ask them to circle the activities where encryption is most likely being used to protect their data and briefly explain why for two of them (e.g., 'Online shopping because payment details need protection').

RememberUnderstandApplyRelationship SkillsSelf-Management
Generate Complete Lesson

Activity 04

Numbered Heads Together20 min · Individual

Individual Analogy Build: Lock Models

Students draw or build paper models showing data as a letter in a locked box, key as decryption. They label steps from plain text to ciphertext. Share models to explain to peers.

Explain the purpose of encryption in keeping digital information private.

Facilitation TipWhen building Lock Models, provide diverse materials like locks, keys, and boxes so students connect physical barriers to digital ones.

What to look forProvide students with a scenario, for example: 'You are sending a secret message to a friend using a public computer.' Ask them to write two sentences explaining how encryption would protect their message and one example of what might happen if the message was not encrypted.

RememberUnderstandApplyRelationship SkillsSelf-Management
Generate Complete Lesson

A few notes on teaching this unit

Teachers should introduce encryption through relatable analogies before diving into activities, as students grasp the lock-and-key concept more easily than abstract algorithms. Avoid technical jargon like 'cipher' or 'key length' to prevent overload. Research shows that when students physically encode and decode messages, they internalize the protection process better than through lecture alone. Keep discussions grounded in their experiences with apps and online services they use daily.

Students should leave with a clear understanding that encryption keeps data safe by transforming it into unreadable form, and that only the right key restores it. They should also recognize encryption in their daily digital lives and explain why it matters. Successful learning is visible when students can describe real-world examples and role-play the need for protection.


Watch Out for These Misconceptions

  • During Pair Encoding Challenge, watch for students who think encrypted data disappears completely.

    Use the scrambled messages from the challenge to show that the text still exists but is unreadable without the key. Ask students to compare their original and decoded messages to see the protection in action.

  • During Secure Shopping role-play, listen for students who believe encryption is only for big companies.

    Have students reflect on their own roles as shoppers or cashiers and discuss how their personal data like card numbers would be at risk without encryption. Use their role-play notes to highlight real-life stakes.

  • During Message Intercept simulation, watch for students who think encrypted data can never be recovered.

    After the simulation, ask students to explain why the hacker failed to read the message. Guide them to connect this to the importance of the correct key, reinforcing that encryption protects by controlling access.


Methods used in this brief