Skip to content
Computer Science · 9th Grade

Active learning ideas

Symmetric and Asymmetric Encryption

Encryption relies on abstract math and invisible key exchange, so active learning turns these concepts into physical or collaborative tasks. Students can feel the difference between shared secrets and public announcements when they mix colors or post padlocks, making invisible processes visible.

Common Core State StandardsCSTA: 3A-NI-06CSTA: 3A-NI-07
20–40 minPairs → Whole Class4 activities

Activity 01

Escape Room20 min · Pairs

Physical Simulation: Color Mixing Key Exchange

Using the Diffie-Hellman color analogy: students each pick a secret color and combine it with a shared public starting color. They exchange their mixed colors, then each combines the received mix with their own private color. Both arrive at the same final color without ever revealing their secrets.

Explain how two parties can share a secret over a public and monitored channel.

Facilitation TipFor the color mixing activity, provide each pair with two cups of different colored water and a third empty cup to simulate the mixing of secret keys without revealing the final color to observers.

What to look forProvide students with two scenarios: 1) Sending a large video file to a friend, and 2) Logging into a secure website. Ask them to identify which encryption type (symmetric or asymmetric) would be more appropriate for each scenario and briefly explain why, considering speed and security.

RememberApplyAnalyzeRelationship SkillsSelf-Management
Generate Complete Lesson

Activity 02

Inquiry Circle35 min · Small Groups

Inquiry Circle: How HTTPS Works

In groups, students trace a single HTTPS request from browser to server using a labeled diagram. They annotate each step where a key is used, identify which encryption type applies at each stage, and present their annotated diagram to the class for peer feedback.

Differentiate between symmetric and asymmetric encryption methods.

Facilitation TipWhen investigating HTTPS, have students trace the padlock icon in their browser to the certificate details to connect the padlock symbol with the underlying asymmetric key exchange process.

What to look forPose the question: 'Imagine you are Alice and Bob, and you need to share a secret message using only a public bulletin board where anyone can see your messages. How could you and Bob agree on a secret code without anyone else knowing it?' Guide students to discuss the challenges and potential solutions, leading towards the concept of key exchange.

AnalyzeEvaluateCreateSelf-ManagementSelf-Awareness
Generate Complete Lesson

Activity 03

Think-Pair-Share20 min · Pairs

Think-Pair-Share: When to Use Which

Students individually design two scenarios: one where symmetric encryption is the right choice, one where asymmetric is necessary. Pairs compare and refine their scenarios, then the class builds a shared decision framework on the board.

Design a scenario where each encryption type would be most appropriate.

Facilitation TipDuring the Think-Pair-Share, assign each student a role (Alice, Bob, or Eve) to ensure all perspectives are represented in the discussion about speed and security trade-offs.

What to look forPresent students with a series of statements about encryption, such as 'This method uses one key for both encryption and decryption' or 'This method uses a pair of keys, one public and one private.' Ask students to identify whether each statement describes symmetric or asymmetric encryption.

UnderstandApplyAnalyzeSelf-AwarenessRelationship Skills
Generate Complete Lesson

Activity 04

Jigsaw40 min · Small Groups

Jigsaw: Encryption Attack Vectors

Expert groups each research one attack method: brute force, man-in-the-middle, or key theft. After becoming specialists, they regroup to share their knowledge, and the combined class builds a defense map showing how each encryption type handles each threat.

Explain how two parties can share a secret over a public and monitored channel.

What to look forProvide students with two scenarios: 1) Sending a large video file to a friend, and 2) Logging into a secure website. Ask them to identify which encryption type (symmetric or asymmetric) would be more appropriate for each scenario and briefly explain why, considering speed and security.

UnderstandAnalyzeEvaluateRelationship SkillsSelf-Management
Generate Complete Lesson

A few notes on teaching this unit

Start with physical simulations to build intuition before formal definitions appear. Avoid teaching formulas first; instead, let students experience the problem asymmetrical encryption solves. Research shows that kinesthetic and collaborative tasks improve retention of abstract cryptographic concepts in early adolescence.

Students will recognize that symmetric encryption is fast for large files while asymmetric encryption solves the key-distribution problem over untrusted channels. They will justify when to use each and describe why public keys do not decrypt messages.


Watch Out for These Misconceptions

  • During the Color Mixing Key Exchange activity, watch for students who think the final color represents the encrypted message itself rather than the shared secret key used to encrypt.

    Pause the activity after the mixing step and ask each pair to explain what the final color represents. Direct students who confuse the color with the message to revisit the definition of a key versus ciphertext.

  • During the Collaborative Investigation of HTTPS, watch for students who believe the presence of a padlock means the website sent the entire page in an asymmetric envelope.

    Have students inspect the certificate details and trace the TLS handshake diagram. Remind them that only the initial key exchange uses asymmetric encryption, while the bulk data uses symmetric encryption.


Methods used in this brief