New
New
Year 11
OCR

Encryption tools to protect communication

I can describe and explain applications of encryption.

New
New
Year 11
OCR

Encryption tools to protect communication

I can describe and explain applications of encryption.

These resources will be removed by end of Summer Term 2025.

Switch to our new teaching resources now - designed by teachers and leading subject experts, and tested in classrooms.

These resources were created for remote use during the pandemic and are not designed for classroom teaching.

Lesson details

Key learning points

  1. Encryption is the process of converting data into an unreadable format to prevent unauthorised access.
  2. There are many different algorithms that can be used to encrypt data.
  3. Encryption protects personal data and keeps messages private, ensuring security during online transactions.
  4. Encryption is used in messaging services, HTTPS websites and banking apps.

Keywords

  • Encryption - the process of converting information or data into an unreadable format called ciphertext using an algorithm and key

  • Key - a piece of information that is used by an encryption algorithm to lock or unlock a message or data

  • Cipher - a method or algorithm used to encrypt and decrypt information

Common misconception

Encryption makes data completely safe and unbreakable.

Encryption greatly improves security, but it is not foolproof. If encryption keys are weak, stolen or mismanaged, encrypted data can still be accessed by attackers.


To help you plan your year 11 computer science lesson on: Encryption tools to protect communication, download all teaching resources for free and adapt to suit your pupils' needs...

Start a discussion with students about why certain technologies use encryption methods and what might happen if encryption wasn't used. Link encryption to real life examples that students can relate to.
Teacher tip

Equipment

Licence

This content is © Oak National Academy Limited (2025), licensed on Open Government Licence version 3.0 except where otherwise stated. See Oak's terms & conditions (Collection 2).

Lesson video

Loading...

Prior knowledge starter quiz

Download quiz pdf

6 Questions

Q1.
Match the following techniques to their purposes:
Correct Answer:input sanitisation,prevent harmful code from user input

prevent harmful code from user input

Correct Answer:strong passwords,add a layer of security against unauthorised access

add a layer of security against unauthorised access

Correct Answer:code reviews,identify and fix vulnerabilities in software

identify and fix vulnerabilities in software

Q2.
What is a vulnerability in a system?
a feature that improves security
a tool to prevent cyberattacks
a method of encrypting data
Correct answer: a weakness that can be exploited by attackers
Q3.
Arrange the steps to secure a system from cyberattacks:
1 - identify vulnerabilities in the system
2 - apply input sanitisation and code reviews
3 - test the system for weaknesses
4 - implement strong passwords and two-factor authentication
Q4.
What is a deliberate attempt to damage, disrupt, or gain unauthorised access to computer systems or data?
Correct Answer: cyberattack, cyber attack
Q5.
Why are strong passwords important?
to encrypt sensitive data
Correct answer: to add a layer of security against unauthorised access
to manage vulnerabilities in software
to test for cyberattacks
Q6.
Which of the following adds an extra layer of security against unauthorised access?
modular testing
input sanitisation
Correct answer: strong passwords and two-factor authentication
code reviews

Assessment exit quiz

Download quiz pdf

6 Questions

Q1.
What is the process of converting data into an unreadable format to prevent unauthorised access?
Correct Answer: encryption
Q2.
What is the method or algorithm used to encrypt and decrypt information?
Correct Answer: cipher, ciphertext
Q3.
Arrange the steps of how encryption protects data:
1 - Data is converted into ciphertext using an algorithm.
2 - The ciphertext is transmitted securely.
3 - The recipient uses the correct key to decrypt the data.
Q4.
Which of the following is true about encryption?
Encryption makes data completely safe and unbreakable.
Encryption eliminates the need for strong passwords.
Encryption prevents all types of cyberattacks.
Correct answer: Encryption improves security but is not foolproof.
Q5.
Match the following encryption applications to their purposes:
Correct Answer:messaging services,protects private messages

protects private messages

Correct Answer:HTTPS websites,secures data during online transactions

secures data during online transactions

Correct Answer:banking apps,protects sensitive financial data

protects sensitive financial data

Q6.
What does HTTPS indicate about a website?
Correct answer: It uses encryption to secure data.
It is a government-approved website.
It has no vulnerabilities.
It does not require a password.