Lesson Plan

Lesson Plan
Grade: Date: 17/01/2026
Subject: Computer Science
Lesson Topic: Understand symmetric and asymmetric encryption methods
Learning Objective/s:
  • Describe the fundamental difference between symmetric and asymmetric encryption.
  • Identify at least two common algorithms for each type and their typical applications.
  • Explain how keys are generated, distributed and managed for both methods.
  • Compare the strengths and weaknesses of symmetric versus asymmetric encryption.
  • Apply the hybrid encryption concept to a real‑world scenario such as TLS.
Materials Needed:
  • Projector or interactive whiteboard for slides and diagrams.
  • Printed handout or digital PDF of the encryption comparison table.
  • Laptops/computers with a simple encryption demo tool (e.g., Python + PyCrypto).
  • Worksheets containing the quick‑revision checklist and short exercises.
  • Whiteboard markers and sticky notes for group brainstorming.
Introduction:

Begin with a quick poll: “If you could send a secret message, how would you keep it safe?” Connect this to students’ prior experience with passwords and secure apps. Explain that today they will discover how modern systems protect data using two complementary encryption approaches, and they will be able to explain when each method is appropriate.

Lesson Structure:
  1. Do‑now (5'): Students list any encryption terms they already know on sticky notes.
  2. Mini‑lecture (10'): Overview of symmetric encryption – key concept, AES example, advantages/disadvantages.
  3. Demo (10'): Live coding of a simple AES encryption/decryption using Python.
  4. Mini‑lecture (10'): Introduction to asymmetric encryption – public/private keys, RSA example, pros/cons.
  5. Group activity (15'): Teams create a flowchart of hybrid encryption (using the provided diagram template) and present key steps.
  6. Check for understanding (5'): Quick quiz (Kahoot/handout) covering algorithm types and key management.
  7. Reflection (5'): Students complete the “Quick Revision Checklist” on their worksheet.
Conclusion:

Recap the main differences between symmetric and asymmetric encryption and how they combine in hybrid systems. Ask each student to write one “exit ticket” sentence describing a real‑world example of hybrid encryption. Assign homework: research a recent security breach and explain which encryption weakness contributed to it.