Skip to content

Encryption Standards and HashingActivities & Teaching Strategies

Encryption and hashing are abstract concepts, and passive instruction often leaves students confused about their distinct roles in data protection. Active learning forces students to confront these differences directly through hands-on comparisons and real-world applications, which research shows improves retention of technical distinctions.

12th GradeComputer Science4 activities20 min40 min

Learning Objectives

  1. 1Compare and contrast the security strengths and weaknesses of symmetric and asymmetric encryption algorithms.
  2. 2Analyze the role of hashing in verifying data integrity and securing password storage in real-world applications.
  3. 3Evaluate the trade-offs between computational speed and security level for different encryption standards.
  4. 4Design a scenario where a combination of symmetric and asymmetric encryption is optimally used for secure communication.

Want a complete lesson plan with these objectives? Generate a Mission

Card Sort: Encryption vs. Hashing Use Cases

Print 20 scenario cards (e.g., 'storing a password in a database,' 'sending a credit card number online,' 'verifying a file download'). Students sort each card into Encryption, Hashing, or Both categories, then compare with another pair and resolve disagreements. Debrief as a class to address edge cases and hybrid scenarios.

Prepare & details

How do encryption algorithms balance security with computational speed?

Facilitation Tip: During the Card Sort, listen for students who group symmetric and asymmetric encryption together, and use their groupings as a springboard for targeted questioning about reversibility and key use.

Setup: Groups at tables with problem materials

Materials: Problem packet, Role cards (facilitator, recorder, timekeeper, reporter), Problem-solving protocol sheet, Solution evaluation rubric

ApplyAnalyzeEvaluateCreateRelationship SkillsDecision-MakingSelf-Management
20 min·Pairs

Think-Pair-Share: Choosing the Right Algorithm

Present three scenarios on the board (high-speed database encryption, secure email, password storage) and ask students to individually identify which algorithm type fits best and why. Pairs discuss their reasoning, then share with the class while building a comparison chart together on the board.

Prepare & details

Differentiate between symmetric and asymmetric encryption and their use cases.

Facilitation Tip: In the Think-Pair-Share, require pairs to write their chosen algorithm on a whiteboard before discussing, so you can quickly scan for correct reasoning or missteps.

Setup: Standard classroom seating; students turn to a neighbor

Materials: Discussion prompt (projected or printed), Optional: recording sheet for pairs

UnderstandApplyAnalyzeSelf-AwarenessRelationship Skills
40 min·Small Groups

Jigsaw: Symmetric vs. Asymmetric Encryption

Divide students into two expert groups -- one studies symmetric encryption (AES, key exchange challenges), the other studies asymmetric encryption (RSA, public-private key mechanics). Expert groups then remix so each new group has one member from each side, who teaches the other and they jointly document a comparison.

Prepare & details

Analyze the role of hashing in ensuring data integrity and password storage.

Facilitation Tip: For the Jigsaw activity, assign each expert group a specific scenario to analyze, then have them present only the key decision factors rather than the full explanation to keep discussions focused.

Setup: Flexible seating for regrouping

Materials: Expert group reading packets, Note-taking template, Summary graphic organizer

UnderstandAnalyzeEvaluateRelationship SkillsSelf-Management
35 min·Small Groups

Gallery Walk: Hashing Algorithm Comparison

Post chart-paper stations around the room labeled with different hashing algorithms (MD5, SHA-1, SHA-256, bcrypt). Students rotate through, adding facts, use cases, and known vulnerabilities from their research notes. The class synthesizes findings into a recommendation matrix showing which algorithm fits which scenario.

Prepare & details

How do encryption algorithms balance security with computational speed?

Facilitation Tip: Set a timer for the Gallery Walk so students move efficiently between hashing algorithm stations, and require them to record one strength and one limitation for each algorithm on their sheets.

Setup: Wall space or tables arranged around room perimeter

Materials: Large paper/poster boards, Markers, Sticky notes for feedback

UnderstandApplyAnalyzeCreateRelationship SkillsSocial Awareness

Teaching This Topic

Teaching encryption and hashing works best when students experience both the power and the limits of each technique. Avoid starting with definitions; instead, let students grapple with scenarios first, then formalize concepts afterward. Research shows that students retain technical details better when they first encounter a problem where the wrong choice has visible consequences, such as failing to detect tampered data or being unable to decrypt a message.

What to Expect

By the end of these activities, students should confidently explain when to use encryption versus hashing, justify algorithm choices with evidence, and troubleshoot common misconceptions using concrete examples from each task.

These activities are a starting point. A full mission is the experience.

  • Complete facilitation script with teacher dialogue
  • Printable student materials, ready for class
  • Differentiation strategies for every learner
Generate a Mission

Watch Out for These Misconceptions

Common MisconceptionDuring Card Sort: Encryption vs. Hashing Use Cases, watch for students who group password storage with encryption because both involve 'hiding' data.

What to Teach Instead

Pause the activity after 10 minutes and ask students to attempt reversing a sample SHA-256 hash using a provided tool, then contrast this with decrypting an AES-256 encrypted message using a key. Highlight that hashing produces a fixed output that cannot be undone, while encryption is designed to be reversed.

Common MisconceptionDuring Think-Pair-Share: Choosing the Right Algorithm, watch for students who assume AES-256 is always better than RSA because it uses longer keys.

What to Teach Instead

Provide benchmark data comparing AES-256 and RSA at equivalent key sizes, and have students calculate the time difference for encrypting a 1MB file. Guide them to recognize that RSA is slower but enables key exchange, while AES is faster for bulk encryption.

Common MisconceptionDuring Gallery Walk: Hashing Algorithm Comparison, watch for students who believe unsalted hashes are secure as long as the hash algorithm is strong.

What to Teach Instead

Set up a live demo of a rainbow table attack on a weak password hash (e.g., MD5 of 'password123'), then show how bcrypt with salting prevents this attack. Ask students to explain why salting is necessary even with a strong hash algorithm.

Assessment Ideas

Quick Check

After Card Sort: Encryption vs. Hashing Use Cases, present students with two scenarios: one requiring encrypted video file transfer and another requiring verification of a software update’s integrity. Ask students to identify the correct technique for each and justify their choices in one sentence, then collect responses for formative feedback.

Discussion Prompt

During Think-Pair-Share: Choosing the Right Algorithm, facilitate a whole-class discussion using the prompt: 'If you designed a secure messaging app, what are the tradeoffs between using only symmetric encryption versus only asymmetric encryption? How would you combine both to balance security and performance?' Circulate and take notes on key arguments students raise.

Exit Ticket

After Jigsaw: Symmetric vs. Asymmetric Encryption, have students complete an exit ticket with three prompts: 1. One key difference between symmetric and asymmetric encryption. 2. An example where asymmetric encryption is necessary. 3. A situation where symmetric encryption is preferred. Use responses to identify lingering misconceptions about key management.

Extensions & Scaffolding

  • Challenge advanced students to design a hybrid encryption system for a secure file-sharing app, specifying which parts use symmetric encryption, asymmetric encryption, and hashing, and explaining their choices.
  • For students who struggle, provide a pre-sorted partial card sort with 3 correct matches already placed to reduce cognitive load and focus their attention on the remaining pairs.
  • Deeper exploration: Have students research and present on post-quantum cryptography, focusing on how quantum computing might impact current encryption standards like RSA and ECC.

Key Vocabulary

Symmetric EncryptionA type of encryption that uses a single, shared secret key for both encrypting and decrypting data. It is generally faster than asymmetric encryption.
Asymmetric EncryptionA type of encryption that uses a pair of keys: a public key for encryption and a private key for decryption. It solves key distribution problems but is computationally more intensive.
HashingA one-way process that converts an input of any size into a fixed-size string of characters, often called a hash value or digest. It is irreversible and used for integrity checks and password storage.
Data IntegrityEnsuring that data has not been altered or corrupted during transmission or storage. Hashing is a primary method for verifying data integrity.
Salt (Hashing)Random data that is added to a password before hashing. It helps prevent attackers from using precomputed rainbow tables to crack passwords.

Ready to teach Encryption Standards and Hashing?

Generate a full mission with everything you need

Generate a Mission