Activity 01
Card Sort: Encryption vs. Hashing Use Cases
Print 20 scenario cards (e.g., 'storing a password in a database,' 'sending a credit card number online,' 'verifying a file download'). Students sort each card into Encryption, Hashing, or Both categories, then compare with another pair and resolve disagreements. Debrief as a class to address edge cases and hybrid scenarios.
How do encryption algorithms balance security with computational speed?
Facilitation TipDuring the Card Sort, listen for students who group symmetric and asymmetric encryption together, and use their groupings as a springboard for targeted questioning about reversibility and key use.
What to look forPresent students with two scenarios: Scenario A describes a system needing to encrypt large video files for transfer, and Scenario B describes a system needing to verify that a downloaded software update has not been tampered with. Ask students to identify which primary cryptographic technique (symmetric encryption, asymmetric encryption, or hashing) is most appropriate for each scenario and briefly explain why.