Common ciphers
I can describe how common ciphers work, and use them to encrypt and decrypt information.
Common ciphers
I can describe how common ciphers work, and use them to encrypt and decrypt information.
These resources will be removed by end of Summer Term 2025.
Switch to our new teaching resources now - designed by teachers and leading subject experts, and tested in classrooms.
These resources were created for remote use during the pandemic and are not designed for classroom teaching.
Lesson details
Key learning points
- Ciphers are used to encrypt and decrypt messages, turning readable text into unreadable ciphertext.
- Common ciphers like the Caesar and substitution ciphers use patterns or keys to shift or replace letters in a message.
- More complex ciphers use multiple shifts or a keyword, making them harder to break.
Keywords
Encrypt - to take readable information and convert it into a coded unreadable form
Decrypt - to take unreadable information and convert it back into a readable form
Ciphertext - a scrambled, unreadable version of a message
Common misconception
Ciphers and encryption are the same thing.
Ciphers are one type of encryption method. Encryption includes ciphers but also involves algorithms, keys, and protocols used in modern digital security systems.
To help you plan your year 11 computer science lesson on: Common ciphers, download all teaching resources for free and adapt to suit your pupils' needs...
To help you plan your year 11 computer science lesson on: Common ciphers, download all teaching resources for free and adapt to suit your pupils' needs.
The starter quiz will activate and check your pupils' prior knowledge, with versions available both with and without answers in PDF format.
We use learning cycles to break down learning into key concepts or ideas linked to the learning outcome. Each learning cycle features explanations with checks for understanding and practice tasks with feedback. All of this is found in our slide decks, ready for you to download and edit. The practice tasks are also available as printable worksheets and some lessons have additional materials with extra material you might need for teaching the lesson.
The assessment exit quiz will test your pupils' understanding of the key learning points.
Our video is a tool for planning, showing how other teachers might teach the lesson, offering helpful tips, modelled explanations and inspiration for your own delivery in the classroom. Plus, you can set it as homework or revision for pupils and keep their learning on track by sharing an online pupil version of this lesson.
Explore more key stage 4 computer science lessons from the Cyber threats and security unit, dive into the full secondary computer science curriculum, or learn more about lesson planning.
Equipment
Licence
Prior knowledge starter quiz
6 Questions
the process of converting data into an unreadable format
a method or algorithm used to encrypt or decrypt information
information used by an algorithm to lock or unlock data
the unreadable output of encryption
Assessment exit quiz
6 Questions
to turn readable text into ciphertext
to turn ciphertext back into readable text
a method for encrypting or decrypting messages
the unreadable output of a cipher