Skip to content
Computer Science · 12th Grade

Active learning ideas

Encryption Standards and Hashing

Encryption and hashing are abstract concepts, and passive instruction often leaves students confused about their distinct roles in data protection. Active learning forces students to confront these differences directly through hands-on comparisons and real-world applications, which research shows improves retention of technical distinctions.

Common Core State StandardsCSTA: 3B-NI-04CSTA: 3B-IC-28
20–40 minPairs → Whole Class4 activities

Activity 01

Card Sort: Encryption vs. Hashing Use Cases

Print 20 scenario cards (e.g., 'storing a password in a database,' 'sending a credit card number online,' 'verifying a file download'). Students sort each card into Encryption, Hashing, or Both categories, then compare with another pair and resolve disagreements. Debrief as a class to address edge cases and hybrid scenarios.

How do encryption algorithms balance security with computational speed?

Facilitation TipDuring the Card Sort, listen for students who group symmetric and asymmetric encryption together, and use their groupings as a springboard for targeted questioning about reversibility and key use.

What to look forPresent students with two scenarios: Scenario A describes a system needing to encrypt large video files for transfer, and Scenario B describes a system needing to verify that a downloaded software update has not been tampered with. Ask students to identify which primary cryptographic technique (symmetric encryption, asymmetric encryption, or hashing) is most appropriate for each scenario and briefly explain why.

ApplyAnalyzeEvaluateCreateRelationship SkillsDecision-MakingSelf-Management
Generate Complete Lesson

Activity 02

Think-Pair-Share20 min · Pairs

Think-Pair-Share: Choosing the Right Algorithm

Present three scenarios on the board (high-speed database encryption, secure email, password storage) and ask students to individually identify which algorithm type fits best and why. Pairs discuss their reasoning, then share with the class while building a comparison chart together on the board.

Differentiate between symmetric and asymmetric encryption and their use cases.

Facilitation TipIn the Think-Pair-Share, require pairs to write their chosen algorithm on a whiteboard before discussing, so you can quickly scan for correct reasoning or missteps.

What to look forFacilitate a class discussion using the following prompt: 'Imagine you are designing a secure messaging app. What are the advantages and disadvantages of using only symmetric encryption versus only asymmetric encryption for sending messages? How might you combine both to create a robust system that balances security and performance?'

UnderstandApplyAnalyzeSelf-AwarenessRelationship Skills
Generate Complete Lesson

Activity 03

Jigsaw40 min · Small Groups

Jigsaw: Symmetric vs. Asymmetric Encryption

Divide students into two expert groups -- one studies symmetric encryption (AES, key exchange challenges), the other studies asymmetric encryption (RSA, public-private key mechanics). Expert groups then remix so each new group has one member from each side, who teaches the other and they jointly document a comparison.

Analyze the role of hashing in ensuring data integrity and password storage.

Facilitation TipFor the Jigsaw activity, assign each expert group a specific scenario to analyze, then have them present only the key decision factors rather than the full explanation to keep discussions focused.

What to look forOn an index card, ask students to write: 1. One key difference between encryption and hashing. 2. An example of a real-world application where hashing is crucial for security. 3. A situation where asymmetric encryption is preferred over symmetric encryption.

UnderstandAnalyzeEvaluateRelationship SkillsSelf-Management
Generate Complete Lesson

Activity 04

Gallery Walk35 min · Small Groups

Gallery Walk: Hashing Algorithm Comparison

Post chart-paper stations around the room labeled with different hashing algorithms (MD5, SHA-1, SHA-256, bcrypt). Students rotate through, adding facts, use cases, and known vulnerabilities from their research notes. The class synthesizes findings into a recommendation matrix showing which algorithm fits which scenario.

How do encryption algorithms balance security with computational speed?

Facilitation TipSet a timer for the Gallery Walk so students move efficiently between hashing algorithm stations, and require them to record one strength and one limitation for each algorithm on their sheets.

What to look forPresent students with two scenarios: Scenario A describes a system needing to encrypt large video files for transfer, and Scenario B describes a system needing to verify that a downloaded software update has not been tampered with. Ask students to identify which primary cryptographic technique (symmetric encryption, asymmetric encryption, or hashing) is most appropriate for each scenario and briefly explain why.

UnderstandApplyAnalyzeCreateRelationship SkillsSocial Awareness
Generate Complete Lesson

A few notes on teaching this unit

Teaching encryption and hashing works best when students experience both the power and the limits of each technique. Avoid starting with definitions; instead, let students grapple with scenarios first, then formalize concepts afterward. Research shows that students retain technical details better when they first encounter a problem where the wrong choice has visible consequences, such as failing to detect tampered data or being unable to decrypt a message.

By the end of these activities, students should confidently explain when to use encryption versus hashing, justify algorithm choices with evidence, and troubleshoot common misconceptions using concrete examples from each task.


Watch Out for These Misconceptions

  • During Card Sort: Encryption vs. Hashing Use Cases, watch for students who group password storage with encryption because both involve 'hiding' data.

    Pause the activity after 10 minutes and ask students to attempt reversing a sample SHA-256 hash using a provided tool, then contrast this with decrypting an AES-256 encrypted message using a key. Highlight that hashing produces a fixed output that cannot be undone, while encryption is designed to be reversed.

  • During Think-Pair-Share: Choosing the Right Algorithm, watch for students who assume AES-256 is always better than RSA because it uses longer keys.

    Provide benchmark data comparing AES-256 and RSA at equivalent key sizes, and have students calculate the time difference for encrypting a 1MB file. Guide them to recognize that RSA is slower but enables key exchange, while AES is faster for bulk encryption.

  • During Gallery Walk: Hashing Algorithm Comparison, watch for students who believe unsalted hashes are secure as long as the hash algorithm is strong.

    Set up a live demo of a rainbow table attack on a weak password hash (e.g., MD5 of 'password123'), then show how bcrypt with salting prevents this attack. Ask students to explain why salting is necessary even with a strong hash algorithm.


Methods used in this brief