Lesson Plan
Codebreakers Session 1 Plan
Introduce the concept of encryption and have students apply simple ciphers to encode and decode messages.
Understanding encryption’s history and mechanics develops critical thinking and problem-solving skills essential for digital literacy and security awareness.
Audience
12th Grade
Time
45 minutes
Approach
Interactive demonstration and hands-on cipher activities.
Prep
Materials Setup
15 minutes
- Review Session 1 Slide Deck for key talking points
- Print copies of Encryption Warm-Up Exercise, Encryption Practice Worksheet, and Session 1 Reflection Prompt
- Assemble or distribute Cipher Wheel Activity Materials
- Familiarize yourself with answer guidelines in Session 1 Quiz Answer Key
Step 1
Warm-Up
5 minutes
- Distribute Encryption Warm-Up Exercise
- Students complete a brief prompt on why people might hide messages
- Select 2–3 volunteers to share responses
Step 2
Introduction to Encryption
10 minutes
- Present definition of encryption via Session 1 Slide Deck
- Discuss historical ciphers (e.g., Caesar cipher) and real-world uses
- Clarify terms: plaintext, ciphertext, key
Step 3
Cipher Demonstration
10 minutes
- Demonstrate Caesar cipher encoding with Cipher Wheel Activity Materials
- Volunteers set a shift key and encode a sample message on the board
- Class decodes the message together
Step 4
Hands-On Activity
15 minutes
- Distribute Encryption Practice Worksheet
- Students work in pairs to encode/decode messages using specified shift keys
- Circulate to support and check for understanding
Step 5
Assessment & Assignment
5 minutes
- Administer Session 1 Quick Quiz as an exit ticket
- Review answers using Session 1 Quiz Answer Key
- Assign Session 1 Mini Test for homework
- Prompt students to reflect on challenges using Session 1 Reflection Prompt

Slide Deck
Codebreakers: Session 1 – Introduction to Encryption
Today’s goals:
- Define encryption and its purpose
- Learn key vocabulary: plaintext, ciphertext, key
- Explore the Caesar cipher and encode/decode messages
- Prepare for hands-on practice
Welcome students and introduce yourself. Explain that over two sessions, they will become ‘codebreakers,’ learning how to hide and reveal secret messages. Emphasize relevance to digital security.
What Is Encryption?
Encryption is the process of converting information (plaintext) into a secret form (ciphertext) using a rule or key.
Only someone with the correct key can decrypt it back into readable form.
Discuss a simple definition: encryption transforms readable data into an unreadable form that only authorized parties can reverse. Use everyday examples (e.g., ATM PIN, messaging apps).
Why Encryption Matters
- Protects personal and sensitive data from unauthorized access
- Secures online transactions and communications
- Safeguards national security and critical infrastructure
Highlight real-world importance: privacy, secure communication, e-commerce. Ask for volunteer examples (e.g., online banking, email).
Key Vocabulary
Plaintext: the original readable message
Ciphertext: the encrypted, unreadable output
Key: the secret information used to encrypt or decrypt
Introduce each term clearly. Ask students to repeat definitions and share examples of plaintext and ciphertext.
Caesar Cipher: How It Works
- Choose a shift number (key), e.g., 3
- For each letter in plaintext, shift it forward by key positions
- Wrap around from Z back to A when necessary
Explain that the Caesar cipher is one of the oldest known encryption methods. Describe how each letter is shifted by a fixed number in the alphabet.
Example: Encoding “HELLO” with Key = 3
Plaintext: H E L L O
Shift +3 → K H O O R
Ciphertext: KHOOR
Walk through the example slowly on the board. Show shift of 3: A→D, B→E… etc. Then encode the word “HELLO.”
Demo & Guided Practice
- Set your key on the cipher wheel
- Encode a class-chosen word
- Pass the wheel to a partner for decoding
Demonstrate with the cipher wheel. Invite two volunteers: one sets the key, the other encodes a short word. Then decode together. Remind students to note down steps for practice.
Next Steps & Exit Ticket
• Complete today’s Quick Quiz (exit ticket)
• Homework: Session 1 Mini Test + Reflection Prompt
• Prepare for deeper cipher practice next session
Explain exit ticket: quick quiz to check understanding. Remind students of the homework mini-test and reflection prompt.

Warm Up
Encryption Warm-Up Exercise
Spend 5 minutes responding to the prompt below:
Prompt: Why might people hide messages?
- List two reasons why someone would conceal information:
- For each reason, provide a real-world example where encryption is used:


Activity
Cipher Wheel Activity
Objective: Practice encoding and decoding messages using the Caesar cipher and a cipher wheel.
Materials:
- One pre-assembled cipher wheel per student or pair
- Blank message cards or slips of paper
- Pens or pencils
Instructions:
- Pair up and secretly agree on a shift key between 1 and 25. Record your key.
2. Player A writes a short message (3–5 words) on a message card. Using the cipher wheel and your agreed key, encode the message into ciphertext.
3. Exchange the ciphertext card with Player B. Player B uses the cipher wheel and the same key to decrypt the message back into plaintext. Verify correctness.
4. Switch roles: Player B creates a new message and key, encodes it, and Player A decodes.
5. Repeat as time allows, trying different shift keys each round.
Reflection Questions:
- Which shift keys were easiest to work with? Which were most challenging, and why?
- How did the cipher wheel help you understand the mechanics of the Caesar cipher?
- What strategies did you develop to avoid errors in encoding or decoding?


Worksheet
Session 1 Practice Worksheet
Use the Caesar cipher with the given shift key to complete the exercises below. You may use Cipher Wheel Activity Materials to help with encoding and decoding.
Part A: Encoding
- Plaintext: SECRET
Key = 4
Ciphertext: ____________________________ - Plaintext: HELLO WORLD
Key = 5
Ciphertext: ____________________________ - Plaintext: DIGITAL
Key = 2
Ciphertext: ____________________________
Part B: Decoding
- Ciphertext: KHOOR
Key = 3
Plaintext: ____________________________ - Ciphertext: YMJBTWQI
Key = 5
Plaintext: ____________________________ - Ciphertext: GCUA VJCV KC C EQOG
Key = 2
Plaintext: ____________________________
Part C: Create & Exchange
- Write your own short message (3–5 words), choose a key (1–25), and encode it. Then swap with a partner and decode their message.Your message (plaintext): ____________________________
Key used: ______
Ciphertext: ____________________________
Partner’s decoded message: ____________________________
Part D: Reflection
- Which shift keys felt easiest to work with? Why?
- Describe one strategy you used to avoid errors when encoding or decoding.
Good luck, Codebreakers! Keep track of your process and be prepared to discuss your strategies in class.


Quiz
Session1 Quick Quiz

Answer Key
Session 1 Quick Quiz Answer Key
This answer key provides the correct responses and the reasoning steps for each question.
Question 1
Prompt: What do we call the original readable message before encryption?
Correct Answer: plaintext
Explanation / Reasoning:
- Plaintext is the standard term for any message or data in its original, human-readable form.
- After encryption, plaintext becomes ciphertext, which is unreadable without the proper key.
Question 2
Prompt: Using a Caesar cipher with a shift key of 4, encode the word “HELLO”. Write the resulting ciphertext.
Correct Answer: LIPPS
Step-by-Step Encoding:
- Identify the shift: +4 positions in the alphabet.
- Encode each letter:
- H → move forward 4 → I (1), J (2), K (3), L (4)
- E → F (1), G (2), H (3), I (4)
- L → M (1), N (2), O (3), P (4)
- L → P (same as previous L)
- O → P (1), Q (2), R (3), S (4)
- Combine the results: L I P P S → LIPPS
Note: Students must show understanding of the shift process. Full credit for the correct ciphertext LIPPS.
Question 3
Prompt: Provide one real-world example where encryption is important and briefly explain why.
Sample Model Answer:
- Example: Online banking transactions.
- Explanation: When you log in to your bank’s website or mobile app, your username, password, and account data are encrypted. This prevents hackers or eavesdroppers from intercepting and reading your personal financial information.
Rubric / Scoring Guidelines:
- 2 points: Student names a valid context where encryption is used and provides a clear, relevant explanation.
- 1 point: Student names a valid context but gives only a vague or incomplete rationale.
- 0 points: Response does not identify a correct encryption use case or explanation is incorrect.
Good work, Codebreakers! Ensure you review these steps before moving on to the Session 1 mini-test and reflection prompt.


Test
Session 1 Mini Test

Answer Key
Session 1 Mini Test Answer Key
This answer key provides the correct responses, step-by-step solutions, and scoring guidelines for each question on the Session 1 Mini Test.
Question 1
Prompt: What is the process of converting readable information into an unreadable form called?
Correct Answer: Encryption
Explanation / Reasoning:
- Encryption is the standard term for taking plaintext (readable data) and transforming it into ciphertext (unreadable form) using an algorithm and key.
Scoring Guidelines:
- 1 point for selecting Encryption.
- 0 points for any other choice.
Question 2
Prompt: What do we call the process of converting ciphertext back to plaintext?
Correct Answer: Decryption
Explanation / Reasoning:
- Decryption reverses encryption, transforming ciphertext back into its original readable form using the correct key.
Scoring Guidelines:
- 1 point for selecting Decryption.
- 0 points for any other choice.
Question 3
Prompt: Define ‘plaintext’ in your own words.
Model Answer:
Plaintext is the original, human-readable message or data before it is encrypted into ciphertext.
Explanation / Reasoning:
- Emphasize that plaintext is the starting (unencrypted) form of any message.
Scoring Guidelines:
- 2 points: Clear, accurate definition mentioning “readable” or “original message” before encryption.
- 1 point: Partial description (e.g., “unencrypted data”) without clarity on readability.
- 0 points: Incorrect or missing definition.
Question 4
Prompt: In the context of a Caesar cipher, what is a ‘key’?
Model Answer:
A key is the number of positions each letter in the plaintext is shifted in the alphabet to produce the ciphertext.
Explanation / Reasoning:
- The key determines how far forward (or backward) you move each letter.
Scoring Guidelines:
- 2 points: Correctly identifies the key as the shift amount in the alphabet.
- 1 point: Mentions that the key is needed to shift letters but lacking detail on shift amount.
- 0 points: Incorrect or no answer.
Question 5
Prompt: Using a Caesar cipher with a shift key of 4, encode the message ‘CLASS’. Write the ciphertext.
Correct Answer: G P E W W → GPEWW
Step-by-Step Encoding:
- C → move forward 4 → D (1), E (2), F (3), G (4)
- L → M (1), N (2), O (3), P (4)
- A → B (1), C (2), D (3), E (4)
- S → T (1), U (2), V (3), W (4)
- S → W (same as previous S)
- Combine: G P E W W
Scoring Guidelines:
- 2 points: Correct ciphertext GPEWW and evidence of correct shifting.
- 1 point: Minor arithmetic or transcription error but clear understanding of shifting.
- 0 points: Incorrect answer without demonstration of shift process.
Question 6
Prompt: Decode the following ciphertext using a shift key of 2: EKUVN
. Write the plaintext.
Correct Answer: C I S T L → CISTL
Step-by-Step Decoding:
- E → move backward 2 → D (–1), C (–2)
- K → J (–1), I (–2)
- U → T (–1), S (–2)
- V → U (–1), T (–2)
- N → M (–1), L (–2)
- Combine: C I S T L
Scoring Guidelines:
- 2 points: Correct plaintext CISTL with clear backward shifting.
- 1 point: Minor error but correct approach to shifting.
- 0 points: Incorrect answer without proper use of the key.
Total Points Available: 10
Ensure students review these solutions before proceeding to deeper encryption methods in Session 2.


Cool Down
Session 1 Cool Down
Take 5 minutes to reflect on today’s work with the Caesar cipher. Respond to the prompts below:
- What was one key insight you gained about how the Caesar cipher transforms plaintext into ciphertext?
- Which step in encoding or decoding did you find most challenging, and why?
- What is one question or idea about encryption you’d like to explore in Session 2?


Lesson Plan
Codebreakers Session 2 Plan
Introduce students to symmetric vs. asymmetric encryption, demonstrate public-key concepts (Diffie–Hellman key exchange, basic RSA), and have them simulate secure key exchanges.
Public-key cryptography underpins modern secure communication (e.g., HTTPS, email encryption). Hands-on experience solidifies understanding of how secret keys are negotiated and used.
Audience
12th Grade
Time
45 minutes
Approach
Mini-lecture, guided demo, hands-on simulation
Prep
Materials Setup
15 minutes
- Review Session 2 Slide Deck and speaker notes for Diffie–Hellman and RSA steps
- Print copies of Session 2 Warm-Up Exercise, Public-Key Practice Worksheet, and Session 2 Reflection Prompt
- Prepare small number cards or worksheets for Diffie–Hellman Key Exchange Activity Materials
- Familiarize yourself with scoring in Session 2 Quiz Answer Key and Session 2 Test Answer Key
Step 1
Warm-Up
5 minutes
- Distribute Session 2 Warm-Up Exercise
- Students list differences they predict between symmetric and asymmetric encryption
- Invite volunteers to share their ideas
Step 2
Symmetric vs. Asymmetric Overview
10 minutes
- Present definitions and comparisons using Session 2 Slide Deck
- Highlight real-world uses: Bluetooth pairing (symmetric), HTTPS (asymmetric)
- Clarify terms: public key, private key, shared secret
Step 3
Diffie–Hellman Demonstration
10 minutes
- Demonstrate key exchange with volunteer pairs using Diffie–Hellman Key Exchange Activity Materials
- Walk through example numbers p, g, secret exponents, and resulting shared key
- Emphasize that no secret exponent is transmitted directly
Step 4
Hands-On Simulation
15 minutes
- Distribute Diffie–Hellman Key Exchange Activity Materials and Public-Key Practice Worksheet
- Students work in pairs to perform a simulated Diffie–Hellman exchange and then encrypt/decrypt a short message using basic RSA parameters (small primes)
- Circulate to support calculations and conceptual questions
Step 5
Assessment & Assignment
5 minutes
- Administer Session 2 Quick Quiz as an exit ticket
- Review answers using Session 2 Quiz Answer Key
- Assign Session 2 Test for homework
- Prompt students to complete Session 2 Reflection Prompt

Slide Deck
Codebreakers: Session 2 – Public-Key Cryptography
Today’s goals:
- Differentiate symmetric and asymmetric encryption
- Explore the Diffie–Hellman key exchange process
- Learn basic RSA encryption and decryption steps
Welcome students and briefly recap Session 1: Caesar cipher and key concepts. Explain today’s focus on modern cryptography: symmetric vs. asymmetric methods, secure key exchange, and RSA basics.
Symmetric Encryption
• Uses one secret key for encryption and decryption
• Fast and efficient for large data
• Key must be shared securely before communication
Define symmetric encryption and highlight how the same key is used for both encryption and decryption. Use real-world example: AES in secure messaging.
Asymmetric Encryption
• Involves a key pair: public key (encrypt) and private key (decrypt)
• Enables secure communication without prior key sharing
• Underlies HTTPS, email encryption, digital signatures
Define asymmetric encryption, also called public-key cryptography. Stress that public key is shared openly, private key remains secret.
Symmetric vs. Asymmetric
• Symmetric:
- Single shared key
- Fast, efficient
- Key distribution problem
• Asymmetric:
- Public/private keys
- Slower, computationally heavier
- Simplifies key exchange
Compare the two approaches side by side. Emphasize trade-offs: speed vs. secure key distribution.
Diffie–Hellman Key Exchange
- Agree on public numbers: prime p and base g
- Each party chooses a private secret: a or b
- Compute public values: A = g^a mod p, B = g^b mod p
- Exchange A and B openly
- Compute shared key: s = B^a mod p = A^b mod p
Introduce Diffie–Hellman as a way for two parties to agree on a shared secret over an insecure channel. Explain the role of prime (p) and base (g).
Example: Diffie–Hellman
• Public: p = 23, g = 5
• Alice secret a = 6 → A = 5^6 mod 23 = 8
• Bob secret b = 15 → B = 5^15 mod 23 = 19
• Shared key: s = 19^6 mod 23 = 8^15 mod 23 = 2
Work through a simple numeric example: p=23, g=5, secrets a=6 and b=15. Show students how both compute the same shared key.
Basic RSA Encryption
- Choose two primes p and q
- Compute n = p·q and φ(n) = (p–1)(q–1)
- Select public exponent e (1 < e < φ(n), gcd(e,φ)=1)
- Compute private exponent d such that e·d ≡ 1 (mod φ(n))
- Encrypt: C = M^e mod n
- Decrypt: M = C^d mod n
Introduce RSA steps: choosing primes p, q; computing n and φ(n); selecting public exponent e and private exponent d; encryption and decryption formulas.
Example: RSA with Small Primes
• p = 3, q = 11 → n = 33, φ(n) = 20
• Public key (e,n) = (3,33), private key d = 7
• Encrypt M=4: C = 4^3 mod 33 = 64 mod 33 = 31
• Decrypt C=31: M = 31^7 mod 33 = 4
Show a small RSA example: p=3, q=11 → n=33, φ=20, e=3, d=7. Encrypt M=4 and decrypt C.
Next Steps & Exit Ticket
• Complete today’s Quick Quiz as exit ticket
• Homework: Session 2 Test + Reflection Prompt
• Prepare for deeper exploration of cryptographic protocols
Explain that students will simulate Diffie–Hellman and practice basic RSA on the worksheet. Remind them of exit ticket and homework test.

Warm Up
Session 2 Warm-Up Exercise
Spend 5 minutes responding to the prompts below as you prepare to explore modern encryption methods:
- List two differences you predict between symmetric and asymmetric encryption:
- For each difference, provide a real-world example of where that type of encryption is used:


Activity
Diffie–Hellman Key Exchange Activity
Objective: Simulate the Diffie–Hellman key exchange to understand how two parties can agree on a shared secret over an insecure channel without directly sharing their private keys.
Materials:
- Pre-printed parameter cards (one per pair) with prime p and base g (e.g., p = 23, g = 5; alternate set: p = 17, g = 3)
- Secret exponent cards (one per student) with a private number between 1 and p–2 (keep this face-down)
- Scratch paper or whiteboards for calculations
- Optional: calculators for modular arithmetic
Instructions:
- Form pairs. Each pair receives one parameter card listing your agreed public values: prime p and base g.
- Each student secretly selects a private exponent (secret) a (or b) from their card—do not reveal this to your partner.
- Compute your public value:
- Student A computes A = g^a mod p
- Student B computes B = g^b mod p
- Exchange your public values (swap only A and B).
- Compute the shared secret key s:
- Student A computes s = B^a mod p
- Student B computes s = A^b mod p
Note: Both calculations yield the same number s.
- Verify with your partner that you both arrived at the same shared secret s (reveal only this number).
Extension:
- Repeat with the alternate parameter set (p = 17, g = 3) and compare results.
- Try choosing different secret exponents and repeat the process to see how the shared secret changes.
Reflection Questions:
- Did both participants calculate the same shared secret? Why does the math guarantee this?
- Why is it secure that each party’s private exponent was never sent over the channel?
- If an eavesdropper knows p, g, A, and B, what information would they need to compute the shared secret? Why is this difficult?


Worksheet
Public-Key Practice Worksheet
Use your Diffie–Hellman Key Exchange Activity materials and RSA formulas from the slides to complete the exercises below. Show all calculations and be prepared to discuss your results.
Part A: Diffie–Hellman Key Exchange Simulation
Parameters Set 1: p = 23, g = 5
- Your secret exponent (a): ________________________
- Compute your public value: A = gᵃ mod p = ________________________
- Partner’s public value (B): ________________________
- Compute shared secret: s = Bᵃ mod p = ________________________
Parameters Set 2: p = 17, g = 3
5. Your secret exponent (a): ________________________
6. Compute your public value: A = gᵃ mod p = ________________________
7. Partner’s public value (B): ________________________
8. Compute shared secret: s = Bᵃ mod p = ________________________
Part B: Basic RSA Practice
Use small primes p = 3 and q = 11.
- Compute the modulus: n = p × q = ________________________
- Compute Euler’s totient: φ(n) = (p–1)(q–1) = ________________________
- Given public exponent e = 3, find the private exponent d such that e · d ≡ 1 (mod φ(n)): d = ________________________
- Encryption: For message M = 4, compute ciphertext C = Mᵉ mod n = ________________________
- Decryption: For ciphertext C = 31, compute plaintext M = Cᵈ mod n = ________________________
Part C: Reflection Questions
- In your own words, explain why two parties end up with the same shared secret in Diffie–Hellman even though they never exchange their private exponents.
- Describe how the choice of a large prime modulus (p) in Diffie–Hellman and RSA contributes to the security of each system.
Good work, Codebreakers! Be ready to share your calculations and insights in our next discussion.


Quiz
Session 2 Quick Quiz

Answer Key
Session 2 Quick Quiz Answer Key
This answer key provides the correct responses and the reasoning steps for each question on the Session 2 Quick Quiz.
Question 1
Prompt: Which statement correctly describes the difference between symmetric and asymmetric encryption?
Correct Answer: Symmetric encryption uses the same secret key for encryption and decryption, while asymmetric encryption uses a public/private key pair.
Explanation / Reasoning:
- Symmetric encryption relies on one shared secret key for both encrypting and decrypting data.
- Asymmetric encryption employs two mathematically related keys: a public key for encryption (shared openly) and a private key for decryption (kept secret).
Scoring Guidelines:
- 1 point: Selects the exact statement above.
- 0 points: Any other selection.
Question 2
Prompt: In a Diffie–Hellman exchange with p = 23, g = 5, your secret exponent a = 6, and your partner’s public value B = 19, what shared secret s will you compute? Show your work.
Correct Answer: s = 2
Step-by-Step Calculation:
- Identify values: p = 23, g = 5, a = 6, B = 19.
- Compute s = Bᵃ mod p = 19⁶ mod 23.
- 19² mod 23 = 361 mod 23 = 16
- 19⁴ mod 23 = (19²)² = 16² = 256 mod 23 = 3
- 19⁶ mod 23 = (19⁴ · 19²) mod 23 = (3 · 16) mod 23 = 48 mod 23 = 2
- Result: s = 2
Scoring Guidelines:
- 2 points: Correctly computes s = 2 with clear modular arithmetic steps.
- 1 point: Correct s = 2 but with incomplete or minor errors in the work.
- 0 points: Incorrect result or missing calculation.
Question 3
Prompt: Using the RSA parameters p = 3, q = 11, e = 3, and d = 7, decrypt the ciphertext C = 31. What is the plaintext message M? Show your calculation.
Correct Answer: M = 4
Step-by-Step Calculation:
- Compute modulus: n = p · q = 3 · 11 = 33
- Decrypt using M = Cᵈ mod n = 31⁷ mod 33.
- 31² mod 33 = 961 mod 33 = 4
- 31⁴ mod 33 = (31²)² = 4² = 16
- 31⁶ mod 33 = (31⁴ · 31²) mod 33 = (16 · 4) mod 33 = 64 mod 33 = 31
- 31⁷ mod 33 = (31⁶ · 31) mod 33 = (31 · 31) mod 33 = 961 mod 33 = 4
- Result: M = 4
Scoring Guidelines:
- 2 points: Correctly finds M = 4 with modular exponentiation steps.
- 1 point: Correct M but with incomplete or minor errors in work.
- 0 points: Incorrect result or missing calculation.
Great work, Codebreakers! Review these steps to solidify your understanding before the Session 2 test and next unit activities.


Test
Session 2 Test

Answer Key
Session 2 Test Answer Key
This answer key provides the correct responses, step-by-step solutions, and scoring guidelines for each question on the Session 2 Test.
Question 1
Prompt: Which statement correctly describes asymmetric encryption?
Correct Answer: Involves a public key to encrypt and a private key to decrypt
Explanation / Reasoning:
- Asymmetric encryption uses a pair of keys: the public key is shared openly for encryption, and the private key is kept secret for decryption.
Scoring Guidelines:
- 1 point for selecting the correct statement.
- 0 points for any other choice.
Question 2
Prompt: Which values are exchanged publicly during the Diffie–Hellman key exchange?
Correct Answer: Public values (A and B)
Explanation / Reasoning:
- Each party computes a public value (A = g^a mod p, B = g^b mod p) and shares only these in the clear.
- The private exponents (a and b) remain secret, and the shared secret is derived from A and B plus each party’s own private exponent.
Scoring Guidelines:
- 1 point for selecting Public values (A and B).
- 0 points for any other selection.
Question 3
Prompt: In a Diffie–Hellman exchange with p = 23, g = 5, your secret exponent a = 10, and your partner’s public value B = 19, what shared secret s will you compute? Show your work.
Correct Answer: s = 6
Step-by-Step Calculation:
- Identify values: p = 23, g = 5, a = 10, B = 19.
- Compute powers of 19 modulo 23:
- 19² mod 23 = 361 mod 23 = 16
- 19⁴ = (19²)² = 16² = 256 mod 23 = 3
- 19⁸ = (19⁴)² = 3² = 9
- Combine to find 19¹⁰ = 19⁸ · 19² = 9 · 16 = 144 mod 23 = 144 – 23·6 = 6
- Result: s = 6
Scoring Guidelines:
- 2 points: Correctly computes s = 6 with clear modular arithmetic steps.
- 1 point: Correct result but incomplete or minor errors in the work.
- 0 points: Incorrect result or missing calculation.
Question 4
Prompt: Using RSA with parameters p = 3, q = 11, e = 3, and d = 7, encrypt the message M = 5. What is the ciphertext C? Show your calculation.
Correct Answer: C = 26
Step-by-Step Calculation:
- Compute modulus: n = p · q = 3 · 11 = 33
- Encrypt: C = Mᵉ mod n = 5³ mod 33
- 5² = 25 mod 33 = 25
- 5³ = 5² · 5 = 25 · 5 = 125 mod 33 = 125 – 33·3 = 26
- Result: C = 26
Scoring Guidelines:
- 2 points: Correct ciphertext 26 with evidence of modular exponentiation.
- 1 point: Correct result but missing or flawed steps.
- 0 points: Incorrect result or no work shown.
Question 5
Prompt: Using the same RSA parameters (p = 3, q = 11, e = 3, d = 7), decrypt the ciphertext C = 26. What is the plaintext message M? Show your calculation.
Correct Answer: M = 5
Step-by-Step Calculation:
- Compute modulus: n = 33
- Decrypt: M = Cᵈ mod n = 26⁷ mod 33
- 26² mod 33 = 676 mod 33 = 16
- 26⁴ = (26²)² = 16² = 256 mod 33 = 25
- Combine for 26⁷ = 26⁴ · 26² · 26 = 25 · 16 = 400 mod 33 = 4; then 4 · 26 = 104 mod 33 = 104 – 33·3 = 5
- Result: M = 5
Scoring Guidelines:
- 2 points: Correct plaintext 5 with clear modular exponentiation.
- 1 point: Correct result but partial or minor errors in work.
- 0 points: Incorrect result or missing calculation.
Question 6
Prompt: Explain one advantage and one disadvantage of symmetric versus asymmetric encryption.
Sample Model Answer:
- Advantage of symmetric encryption: It is computationally efficient and fast, making it ideal for encrypting large amounts of data.
- Disadvantage of symmetric encryption: Securely sharing the single secret key between parties can be challenging, requiring a secure channel.
Explanation / Reasoning:
- Symmetric encryption uses one shared key (speed, efficiency) but suffers from a key distribution problem.
- Asymmetric encryption (by contrast) simplifies key distribution (public key can be shared openly) but is slower and less efficient for large data volumes.
Scoring Guidelines:
- 2 points: Clearly states one relevant advantage and one relevant disadvantage.
- 1 point: Mentions only one of the two or provides an incomplete explanation.
- 0 points: Incorrect or no response.
Total Points Available: 10

