Skip to content
Computer Science · 11th Grade

Active learning ideas

Introduction to Cryptography

Active learning works particularly well for cryptography because students need to experience the tension between secrecy and exposure to grasp abstract concepts. Activities like the Color Mixing Key Exchange let students feel how keys are shared without being sent, and the Timeline activity helps them see cryptography as a human endeavor, not just a math problem.

Common Core State StandardsCSTA: 3B-NI-04
25–45 minPairs → Whole Class3 activities

Activity 01

Escape Room30 min · Pairs

Format Name: Caesar Cipher Simulation

Students work in pairs to encrypt and decrypt short messages using a Caesar cipher. They manually shift letters based on a chosen key, then swap roles to decode the message, reinforcing the concept of a shared secret key.

Explain the fundamental concepts of symmetric and asymmetric encryption.

Facilitation TipDuring the Color Mixing Key Exchange, have students physically stand in two groups to simulate public and private spaces, reinforcing the idea that information can be combined without being transmitted.

RememberApplyAnalyzeRelationship SkillsSelf-Management
Generate Complete Lesson

Activity 02

Escape Room45 min · Small Groups

Format Name: Public Key Exchange Role Play

Assign students roles as Alice and Bob. One student acts as a sender with a public key, and another as a receiver with a private key. Students physically exchange 'messages' (pieces of paper) to simulate the secure transmission process.

Analyze the strengths and weaknesses of different cryptographic algorithms.

Facilitation TipFor the Cryptography Timeline, assign each pair one event to research and present in chronological order, ensuring all students engage with primary and secondary sources.

RememberApplyAnalyzeRelationship SkillsSelf-Management
Generate Complete Lesson

Activity 03

Escape Room25 min · Individual

Format Name: Hashing Algorithm Exploration

Using an online hashing tool, students input different text strings and observe how even minor changes result in drastically different hash outputs. They discuss the implications for data integrity.

Differentiate between encryption, hashing, and digital signatures.

Facilitation TipIn the Think-Pair-Share on encryption vs. hashing vs. digital signatures, ask students to write a two-sentence summary of their partner’s explanation before sharing with the class to deepen accountability.

RememberApplyAnalyzeRelationship SkillsSelf-Management
Generate Complete Lesson

A few notes on teaching this unit

Teachers should anchor lessons in real-world consequences, such as the 2012 LinkedIn password breach, to show why algorithm choice and implementation matter. Avoid rushing to formulas; instead, use analogies students can test themselves, like mixing paint for key exchange. Research shows that students retain concepts better when they first encounter them through embodied or collaborative activities before formal definitions.

By the end of these activities, students should clearly explain the difference between symmetric and asymmetric encryption, justify why hashing is irreversible, and describe how digital signatures prove authenticity. They should also be able to select the right cryptographic tool for a given security scenario.


Watch Out for These Misconceptions

  • During the Gallery Walk of Cryptographic Algorithm Profiles, watch for students assuming that a longer key always provides stronger security regardless of the algorithm.

    Use the algorithm profiles to point out the 'bits of security' column, and ask students to compare AES-256 and RSA-3072 directly. Have them note that RSA’s security relies on integer factorization, while AES relies on the hardness of the substitution-permutation network.

  • During the Think-Pair-Share on Encryption vs. Hashing vs. Digital Signatures, listen for students using 'hashing' and 'encryption' interchangeably.

    Pause the discussion and ask students to use the handout with the lock/unlock and one-way arrow icons. Have them label each technique and explain why password databases store hashes, not encrypted passwords.

  • During the Simulation of Color Mixing Key Exchange, observe students assuming asymmetric encryption is used to encrypt large messages.

    After the simulation, reveal the RSA image on the slide and ask students how long it would take to encrypt a 1MB file with RSA. Then show the hybrid TLS handshake diagram and ask them to identify where symmetric encryption takes over.


Methods used in this brief