Skip to content
Computer Science · 10th Grade

Active learning ideas

Introduction to Cryptography

Active learning works well for cryptography because students need to experience the tension between keeping information secret and sharing it securely. By handling real ciphers and discussing key distribution, they confront the core challenge of modern security systems head on.

Common Core State StandardsCSTA: 3A-NI-06CSTA: 3A-NI-08
25–45 minPairs → Whole Class3 activities

Activity 01

Document Mystery45 min · Pairs

Hands-On Activity: Caesar Cipher to Modern Encryption

Students start by encrypting a short message with a Caesar cipher by hand, then attempt to break a classmate's cipher using frequency analysis. The class then compares this to a demonstration of AES encryption, discussing why the mathematical complexity of modern algorithms makes the frequency analysis approach impractical.

Differentiate between symmetric and asymmetric encryption.

Facilitation TipDuring Caesar Cipher to Modern Encryption, circulate with a printed reference sheet of known plaintext attacks to redirect students who assume longer ciphers are always harder to crack.

What to look forPresent students with two scenarios: one describing a secret message shared between two friends who can meet in person, and another describing a secure online purchase. Ask students to identify which scenario is better suited for symmetric encryption and which for asymmetric encryption, and to briefly justify their choices.

AnalyzeEvaluateSelf-ManagementDecision-Making
Generate Complete Lesson

Activity 02

Think-Pair-Share25 min · Pairs

Think-Pair-Share: The Key Distribution Problem

Present this scenario: two students on opposite sides of the room need to share a secret number without anyone else in the room learning it, and they can only communicate by writing on the whiteboard. Students individually brainstorm strategies, pair to refine ideas, then share. Connect the best ideas to Diffie-Hellman key exchange.

Explain the role of a key in cryptographic systems.

Facilitation TipFor The Key Distribution Problem, limit the think phase to two minutes so pairs can move quickly to identifying the core issue of trust without overcomplicating the scenario.

What to look forPose the question: 'If an encryption algorithm is publicly known, how can it still be secure?' Guide students to discuss the importance of key secrecy and management over algorithm secrecy, referencing the concept of Kerckhoffs's principle.

UnderstandApplyAnalyzeSelf-AwarenessRelationship Skills
Generate Complete Lesson

Activity 03

Document Mystery35 min · Small Groups

Collaborative Mapping: Symmetric vs. Asymmetric Use Cases

Small groups receive a deck of cards, each describing a real use case (online banking session, password storage, email attachment, software update signature). Groups sort the cards into symmetric, asymmetric, or hybrid categories and justify each placement. Groups compare their sorts and resolve disagreements with evidence.

Analyze the security implications of a weak encryption algorithm.

Facilitation TipIn Collaborative Mapping, provide one blank Venn diagram per group and one set of pre-cut sticky notes to keep the activity focused on categorizing real-world use cases.

What to look forAsk students to write down the primary challenge associated with using symmetric encryption for communication between two parties who have never met. Then, ask them to describe how asymmetric encryption addresses this specific challenge.

AnalyzeEvaluateSelf-ManagementDecision-Making
Generate Complete Lesson

A few notes on teaching this unit

Teachers should start with concrete ciphers before abstracting to modern systems, because students grasp the purpose of encryption only after trying to break or share a secret themselves. Avoid diving straight into binary or RSA math; instead, build intuition with paper ciphers and shared secrets. Research shows that letting students struggle to send a message without revealing the key creates the most durable understanding of why secure key exchange matters.

Successful learning looks like students explaining why key management matters more than algorithm secrecy, choosing the right encryption method for a given scenario, and articulating the trade-offs between speed and security in symmetric and asymmetric systems.


Watch Out for These Misconceptions

  • During Caesar Cipher to Modern Encryption, watch for students who believe a longer shift always makes the cipher stronger.

    Use the activity’s reflection sheet to have students compare ciphertext lengths and key lengths, then introduce a known-plaintext attack scenario where a longer key fails to protect against frequency analysis.

  • During Collaborative Mapping, watch for students who claim asymmetric encryption replaces symmetric encryption entirely.

    Direct groups back to the Venn diagram’s labeled sections, asking them to place TLS and PGP examples and note why each protocol uses both types for different steps.


Methods used in this brief