This document outlines a lesson plan on encryption that involves students exploring who cares about encryption through readings and a debate activity. Students will represent different groups (government, civil liberties, business) in the debate about the availability of encryption software. The lesson aims to help students identify cybersecurity concerns and evaluate online sources, as well as understand that cybersecurity involves tradeoffs and that the trust model of the internet has limitations. Homework involves reading more about the evolution of encryption methods.
Encryption Debate: Gov't vs. Civil Liberties vs. Business
1. L.O: STUDENTS WILL
EXPLORE WHO CARES
ABOUT ENCRYPTION.
65-75 minutes
DO NOW:
READ Unit 2 Lab 6: Encryption,
Page 4
2. WHO SHOULD CARE ABOUT ENCRYPTION?
Governments, Civil Liberties Groups,
Businesses AND you should all care about
protecting information!
3. For You To Do
1. Read "Encryption in the Hands of Terrorists, and
Everyone Else" and "Why Not Regulate
Encryption? (Blown to Bits pages 161-165).
2. Read "Cryptography Unsettled" (Blown to Bits
pages 191- top of 193)
4. 3. Do the following debate activity on the
issue of the availability of encryption
software. You will be representing either
the government, a civil liberties group, or
the business community.
First, as a class, discuss the position each
of these groups will take on the issue.
What will the government claim is the
right thing to do regarding encryption
software? What would civil liberties
advocates say should be done? The
business community? Each group should
have a clear position statement that
everyone in the class knows.
5. • Split into three groups - government,
civil liberty groups, and businesses.
In each group, write the two most
convincing reasons or pieces of
evidence that support your position.
Then write one reason against the
position of each of the other two
groups.
6. For example, the government group
would write:
• Government's position: ______________
• Reasons for supporting our position:
a. ______________
b. ______________
• We are against the civil liberty group's
position because ______________
• We are against the business' position because
______________
7. Take It Further (Extension Activities)
A.Which group's reasons were you
most convinced by today (even if
you don't actually agree with their
position)? Why were they so
convincing? What made it hard to
argue against their position?
8. Take It Further (Extension Activities)
B. The debate continues:
• FBI: Weaker Encryption is a Worthwhile Tradeoff for Law
Enforcement Access to Data (on nextgov.com, 9/15/15)
• Most Americans Support Government Backdoors, Even
Though They Know The Risks (on forbes.com, 9/11/15)
• Why the Fear Over Ubiquitous Data Encryption is
Overblown (on WashingtonPost.com, 7/28/15)
• Obama Administration Explored Ways to Bypass
Smartphone Encryption (on WashingtonPost.com,
9/24/15)
9. HOMEWORK:
read Chapter 5 of “Blown to Bits”.
Reading through the entire chapter will be helpful,
especially to get a better understanding of the
evolution of encryption methods and some details of
public key encryption.
10. Learning Objectives:
1. LO 6.3.1 Identify existing cybersecurity
concerns and potential options to
address these issues with the Internet
and the systems built on it. [P1]
2. LO 7.5.2 Evaluate online and print
sources for appropriateness and
credibility [P5]
GIVE EXAMPLES OF THESE LEARNING OBJECTIVES IN THE LESSON
11. Enduring Understandings:
1. EU 6.3 Cybersecurity is an important
concern for the Internet and the systems
built on it.
2. EU 7.5 An investigative process is aided by
effective organization and selection of
resources. Appropriate technologies and
tools facilitate the accessing of information
and enable the ability to evaluate the
credibility of sources
EXPLAIN THESE “ENDURING UNDERSTANDINGS”
12. Essential Knowledge:
1. EK 1.2.5A The context in which an artifact is used
determines the correctness, usability, functionality, and
suitability of the artifact.
2. EK 1.2.5B A computational artifact may have weaknesses,
mistakes, or errors depending on the type of artifact.
3. EK 1.2.5C The functionality of a computational artifact may
be related to how it is used or perceived.
4. EK 1.2.5D The suitability (or appropriateness) of a
computational artifact may be related to how it is used or
perceived.
5. EK 3.2.2D Maintaining privacy of large data sets containing
personal information can be challenging.
EXPLAIN THESE “ENDURING UNDERSTANDINGS”
13. Essential Knowledge:
• 6.EK 3.3.1A Digital data representations involve trade-
offs related to storage, security, and privacy concerns.
• 7.EK 3.3.1B Security concerns engender trade-offs in
storing and transmitting information.
• 8.EK 3.3.1F Security and privacy concerns arise with
data containing personal information.
• 9. EK 5.4.1L An explanation of a program helps people
understand the functionality and purpose of it.
• 10. EK 5.4.1M The functionality of a program is often
described by how a user interacts with it
EXPLAIN THESE “ENDURING UNDERSTANDINGS”
14. Essential Knowledge:
• 11.EK 6.1.1A The Internet connects devices and
networks all over the world.
• 12.EK 6.1.1D The Internet and the systems built on it
facilitate collaboration.
• 13.EK 6.3.1A The trust model of the Internet involves
trade-offs.
• 14. EK 6.3.1B The DNS was not designed to be
completely secure.
• 15. EK 6.3.1C Implementing cybersecurity has
software, hardware, and human components.
• 16. EK 6.3.1D Cyber warfare and cyber crime have
widespread and potentially devastating effects
EXPLAIN THESE “ENDURING UNDERSTANDINGS”
15. Essential Knowledge:
• 17. EK 6.3.1H Cryptography is essential to many
models of cybersecurity.
• 18. EK 6.3.1I Cryptography has a mathematical
foundation.
• 19. EK 6.3.1J Open standards help ensure
cryptography is secure.
• 20. EK 6.3.1K Symmetric encryption is a method of
encryption involving one key for encryption and
decryption.
• 21. EK 6.3.1L Public key encryption, which is not
symmetric, is an encryption method that is widely
used because of the functionality it provides.
EXPLAIN THESE “ENDURING UNDERSTANDINGS”
16. Essential Knowledge:
• 22.EK 6.3.1M Certificate authorities (CAs) issue
digital certificates that validate the ownership of
encrypted keys used in secured communications and
are based on a trust model.
• 23.EK 7.3.1A Innovations enabled by computing raise
legal and ethical concerns.
• 24.EK 7.3.1G Privacy and security concerns arise in
the development and use of computational systems
and artifacts.
• 25.EK 7.3.1L Commercial and governmental curation
of information may be exploited if privacy and other
protections are ignored.
EXPLAIN THESE “ENDURING UNDERSTANDINGS”
Editor's Notes
Page 4: Who Cares About Encryption?
Understand the social implications of public key encryption, and be able to detail positive and negative affects.
Page 4: Who Cares about Encryption?
Students read sections of Blown to Bits to prepare for a debate activity about the availability of encryption software.
The student page suggests a class discussion to help make sure that everyone is clear on the position that each of the three groups (governments, civil liberties groups, businesses) will take.
Depending on the size of the class, it may make sense to split into 6 groups or more, with multiple groups representing each position. Having more than one group per position can also add interest, by letting groups compare the reasons they thought made the most convincing arguments.
If you wish, you can make this into a more full-fledged debate. Visit the Boston Debate League for resources, like this guide for a full-class multi-perspective debate.
This can also be a simpler activity in which each group presents its case. Each group can first share its reasons for supporting its position. Then, the government and business groups can share their reason they are against the civil liberties position, and the civil liberties groups could have the opportunity to respond. Each position gets its turn to hear the reasons others are against its position and gets the opportunity to defend itself.
The Take It Further prompts include an opportunity for students to reflect on their learning through the debate activity.
Page 4: Who Cares about Encryption?
Students read sections of Blown to Bits to prepare for a debate activity about the availability of encryption software.
The student page suggests a class discussion to help make sure that everyone is clear on the position that each of the three groups (governments, civil liberties groups, businesses) will take.
Depending on the size of the class, it may make sense to split into 6 groups or more, with multiple groups representing each position. Having more than one group per position can also add interest, by letting groups compare the reasons they thought made the most convincing arguments.
If you wish, you can make this into a more full-fledged debate. Visit the Boston Debate League for resources, like this guide for a full-class multi-perspective debate.
This can also be a simpler activity in which each group presents its case. Each group can first share its reasons for supporting its position. Then, the government and business groups can share their reason they are against the civil liberties position, and the civil liberties groups could have the opportunity to respond. Each position gets its turn to hear the reasons others are against its position and gets the opportunity to defend itself.
The Take It Further prompts include an opportunity for students to reflect on their learning through the debate activity.