Caesar Cipher
Encrypt and decrypt text using the Caesar cipher with a customizable shift value.
The Caesar Cipher tool lets you encrypt and decrypt text by shifting each letter in the alphabet by a specified number of positions. Named after Julius Caesar who used it for military communications, this classic substitution cipher is perfect for learning about cryptography fundamentals. Adjust the shift value from 1 to 25 and toggle between encrypt and decrypt modes instantly in your browser.
How to Use
Enter your text
Type or paste the text you want to encrypt or decrypt into the input area.
Set the shift value
Use the slider to choose a shift between 1 and 25 letters for the cipher.
Choose mode and copy
Toggle encrypt or decrypt mode, then copy the transformed result to your clipboard.
Complete Guide to the Caesar Cipher
Worked Examples
Example: Encrypting with Shift 3
Given: The plaintext 'ATTACK AT DAWN' with shift 3
Step 1: A(0) + 3 = D(3), T(19) + 3 = W(22), T(19) + 3 = W(22), A(0) + 3 = D(3), C(2) + 3 = F(5), K(10) + 3 = N(13)
Step 2: Space stays as space
Step 3: A(0) + 3 = D(3), T(19) + 3 = W(22)
Step 4: D(3) + 3 = G(6), A(0) + 3 = D(3), W(22) + 3 = Z(25), N(13) + 3 = Q(16)
Result: 'ATTACK AT DAWN' becomes 'DWWDFN DW GDZQ'
Example: Decrypting with Shift 3
Given: The ciphertext 'DWWDFN DW GDZQ' with shift 3
Step 1: D(3) - 3 = A(0), W(22) - 3 = T(19), W(22) - 3 = T(19), D(3) - 3 = A(0), F(5) - 3 = C(2), N(13) - 3 = K(10)
Step 2: Space stays as space
Step 3: Continue decrypting each remaining letter by subtracting 3 from its position
Result: 'DWWDFN DW GDZQ' decrypts back to 'ATTACK AT DAWN'
Use Cases
Sending coded messages
“Create fun coded messages for friends or team members by encrypting text with a secret shift value. Share the shift number separately so only the intended recipient can decode the message. Great for birthday surprise planning or team building activities.”
Learning classical cryptography
“Use this tool as a hands-on educational aid when studying the history of encryption. Experiment with different shift values to understand how substitution ciphers work, why they are vulnerable to frequency analysis, and how they evolved into more complex modern algorithms.”
Creating puzzle games
“Design escape room clues, treasure hunts, or classroom puzzles using Caesar-encrypted messages. Players must figure out the shift value to decode the clue and advance to the next challenge. The visual mapping display helps verify solutions quickly.”
Frequently Asked Questions
?What is the Caesar cipher?
It is a substitution cipher where each letter shifts by a fixed number of positions in the alphabet, named after Julius Caesar.
?Is the Caesar cipher secure?
No. With only 25 possible shifts, it can be broken by trying all possibilities or using frequency analysis on the text.
?What shift did Caesar actually use?
Historical records suggest Julius Caesar used a shift of 3, replacing A with D, B with E, and so on.
?Does it work with numbers and symbols?
Numbers, spaces, and symbols pass through unchanged. Only alphabetic letters A through Z are shifted by the cipher.
?How do I decrypt a Caesar cipher message?
Switch to decrypt mode and use the same shift value that was used for encryption to recover the original text.
?Is this tool free to use?
Yes, it is completely free with no usage limits. Encrypt and decrypt as many messages as you want.
?Is my data private when using this tool?
Yes. All processing runs locally in your browser. No text is sent to any server or stored anywhere.
?What is ROT13?
ROT13 is a Caesar cipher with shift 13. Since the alphabet has 26 letters, applying ROT13 twice returns the original text.
Related Tools
Hash Generator
Generate MD5, SHA-1, SHA-256, and SHA-512 hashes from any text input instantly.
Password Strength Tester
Test and analyze the strength of any password with entropy calculation and detailed feedback.
Atbash Cipher
Encode and decode text using the Atbash cipher that reverses the alphabet.
Recommended Books on Ciphers & Cryptography

Codes, Ciphers and Secret Writing
Martin Gardner

Top Secret: A Handbook of Codes, Ciphers and Secret Writing
Paul B. Janeczko

Introduction to Codes and Ciphers
Jenny Kile
As an Amazon Associate we earn from qualifying purchases.
Recommended Products for Cryptography Enthusiasts

Labyrinth Cipher Wheel - Premium Escape Room Decoder Ring
Creative Escape Rooms

Mini Cipher Wheel Decoder Ring Bundle - Escape Room Props
Creative Escape Rooms

Wooden Caesar Cipher Secret Decoder Wheel - Educational STEM Game
Creative Escape Rooms
As an Amazon Associate we earn from qualifying purchases.