Skip to content

Introduction to CryptographyActivities & Teaching Strategies

Active learning works particularly well for cryptography because students need to experience the tension between secrecy and exposure to grasp abstract concepts. Activities like the Color Mixing Key Exchange let students feel how keys are shared without being sent, and the Timeline activity helps them see cryptography as a human endeavor, not just a math problem.

11th GradeComputer Science3 activities25 min45 min
30 min·Pairs

Format Name: Caesar Cipher Simulation

Students work in pairs to encrypt and decrypt short messages using a Caesar cipher. They manually shift letters based on a chosen key, then swap roles to decode the message, reinforcing the concept of a shared secret key.

Prepare & details

Explain the fundamental concepts of symmetric and asymmetric encryption.

Facilitation Tip: During the Color Mixing Key Exchange, have students physically stand in two groups to simulate public and private spaces, reinforcing the idea that information can be combined without being transmitted.

Setup: Group tables with puzzle envelopes, optional locked boxes

Materials: Puzzle packets (4-6 per group), Lock boxes or code sheets, Timer (projected), Hint cards

RememberApplyAnalyzeRelationship SkillsSelf-Management
45 min·Small Groups

Format Name: Public Key Exchange Role Play

Assign students roles as Alice and Bob. One student acts as a sender with a public key, and another as a receiver with a private key. Students physically exchange 'messages' (pieces of paper) to simulate the secure transmission process.

Prepare & details

Analyze the strengths and weaknesses of different cryptographic algorithms.

Facilitation Tip: For the Cryptography Timeline, assign each pair one event to research and present in chronological order, ensuring all students engage with primary and secondary sources.

Setup: Group tables with puzzle envelopes, optional locked boxes

Materials: Puzzle packets (4-6 per group), Lock boxes or code sheets, Timer (projected), Hint cards

RememberApplyAnalyzeRelationship SkillsSelf-Management
25 min·Individual

Format Name: Hashing Algorithm Exploration

Using an online hashing tool, students input different text strings and observe how even minor changes result in drastically different hash outputs. They discuss the implications for data integrity.

Prepare & details

Differentiate between encryption, hashing, and digital signatures.

Facilitation Tip: In the Think-Pair-Share on encryption vs. hashing vs. digital signatures, ask students to write a two-sentence summary of their partner’s explanation before sharing with the class to deepen accountability.

Setup: Group tables with puzzle envelopes, optional locked boxes

Materials: Puzzle packets (4-6 per group), Lock boxes or code sheets, Timer (projected), Hint cards

RememberApplyAnalyzeRelationship SkillsSelf-Management

Teaching This Topic

Teachers should anchor lessons in real-world consequences, such as the 2012 LinkedIn password breach, to show why algorithm choice and implementation matter. Avoid rushing to formulas; instead, use analogies students can test themselves, like mixing paint for key exchange. Research shows that students retain concepts better when they first encounter them through embodied or collaborative activities before formal definitions.

What to Expect

By the end of these activities, students should clearly explain the difference between symmetric and asymmetric encryption, justify why hashing is irreversible, and describe how digital signatures prove authenticity. They should also be able to select the right cryptographic tool for a given security scenario.

These activities are a starting point. A full mission is the experience.

  • Complete facilitation script with teacher dialogue
  • Printable student materials, ready for class
  • Differentiation strategies for every learner
Generate a Mission

Watch Out for These Misconceptions

Common MisconceptionDuring the Gallery Walk of Cryptographic Algorithm Profiles, watch for students assuming that a longer key always provides stronger security regardless of the algorithm.

What to Teach Instead

Use the algorithm profiles to point out the 'bits of security' column, and ask students to compare AES-256 and RSA-3072 directly. Have them note that RSA’s security relies on integer factorization, while AES relies on the hardness of the substitution-permutation network.

Common MisconceptionDuring the Think-Pair-Share on Encryption vs. Hashing vs. Digital Signatures, listen for students using 'hashing' and 'encryption' interchangeably.

What to Teach Instead

Pause the discussion and ask students to use the handout with the lock/unlock and one-way arrow icons. Have them label each technique and explain why password databases store hashes, not encrypted passwords.

Common MisconceptionDuring the Simulation of Color Mixing Key Exchange, observe students assuming asymmetric encryption is used to encrypt large messages.

What to Teach Instead

After the simulation, reveal the RSA image on the slide and ask students how long it would take to encrypt a 1MB file with RSA. Then show the hybrid TLS handshake diagram and ask them to identify where symmetric encryption takes over.

Assessment Ideas

Quick Check

After the Gallery Walk, present students with three scenarios: 1) Sending a secret message to a friend, 2) Verifying that a downloaded file hasn't been tampered with, and 3) Authenticating your identity to a website. Ask students to identify whether symmetric encryption, asymmetric encryption, or hashing is the most appropriate tool for each scenario and briefly explain why.

Discussion Prompt

During the Think-Pair-Share on Encryption vs. Hashing vs. Digital Signatures, facilitate a class discussion using the prompt: 'Imagine you are designing a secure messaging app. What are the primary security challenges you would face, and how would you use the concepts of symmetric encryption, asymmetric encryption, and digital signatures to address them?' Encourage students to consider key exchange, message integrity, and sender authentication.

Exit Ticket

After the Color Mixing Key Exchange simulation, provide students with a diagram showing a public key and a private key. Ask them to answer the following: 'If Party A wants to send a secret message to Party B, which key should Party A use to encrypt the message, and why? Which key should Party B use to decrypt the message, and why?'

Extensions & Scaffolding

  • Challenge students who finish early to design a simple cipher and exchange it with a peer, then attempt to break it using frequency analysis.
  • For students who struggle, provide a partially completed algorithm profile template with key terms filled in to reduce cognitive load.
  • Offer deeper exploration by having students research post-quantum cryptography and present one algorithm to the class, focusing on its resistance to quantum attacks.

Ready to teach Introduction to Cryptography?

Generate a full mission with everything you need

Generate a Mission