Many microcontrollers nowadays have AES hardware built into them that will run at 10s (or maybe even 100s of MB/s), so ideally you are looking for an application where that is not sufficient. The primary way that FPGAs can out-do normal processors is in doing many things in parallel (as you can stamp out multiple processing engines to do the same, or different, things a the same time). A multi-channel system performing several independent streams of encryption/decryption might be a suitable project which would make use of this. You could demonstrate in hardware with a couple of development boards with one performing encryption and the other decryption.
Alternatively (if your studies are more geared towards security analysis), you could implement something which offers a different type of key security (so the microcontroller gets the FPGA to perform cryptographic operations, and its software never gets to see the keys), by hanging an FPGA off the side of a microcontroller (using SPI for example). Trusted Platform Modules (TPMs) already exist which give this functionality, so it would be "only" an educational project. Comparing the potential attack paths involving the micro and/or FPGA which might reveal the key would be instructive. When the keys are in the microcontroller, they are often easier to defend against a physical attacker, but an attacker who can get code to run on the micro has an easier time. With the FPGA "TPM", this is harder (although this attacker can still ask the FPGA to do all the cryptographic operations the original software could!). A physical attacker may have different options (for example, reading the keys out of the flash chip the FPGA uses).