The Caesar Cipher

HISTORIA CRYPTOGRAPHIAE

From the battlefields of Gaul to the halls of modern cryptography — the story of the world's most famous cipher.

I Julius Caesar — The Man Behind the Code

Gaius Julius Caesar (100 – 44 BC) was a Roman general, statesman, and one of the most pivotal figures in Western history...

Caesar maintained a vast network of communications spanning thousands of kilometres...

Caesar's cipher, described by the Roman historian Suetonius...

If he had anything confidential to say, he wrote it in cipher...

— Suetonius, De Vita Caesarum, c. 121 AD

II How the Caesar Cipher Works

The Caesar cipher is a substitution cipher...

The transformation is mathematically expressed as: E(x) = (x + n) mod 26...

For example, with a shift of 3 — Caesar's preferred key — the alphabet maps like this:

✦ Interactive Cipher Demo ✦

3

Encrypted result (ciphertext)

YHQL YLGL YLFL

Plain →

Cipher →

The cipher works on letters only; spaces, punctuation, and numbers are left unchanged.

Caesar sometimes varied his approach. According to Valerius Probus...

III Historical Uses & Military Intelligence

🗡

The Gallic Wars (58–50 BC)

Caesar's primary use of the cipher was during his eight-year campaign in Gaul...

📜

Political Correspondence

Caesar used encryption in his personal letters to Cicero...

👑

Augustus Caesar's Variant

Caesar's successor Augustus used a similar system...

🔄

ROT13 — A Modern Echo

ROT13 ("rotate by 13") is a direct descendant of the Caesar cipher...

IV Breaking the Code — Frequency Analysis

For centuries, the Caesar cipher was considered reasonably secure...

The more sophisticated technique is frequency analysis...

One way to solve an encrypted message, if we know its language...

— Al-Kindi, A Manuscript on Deciphering Cryptographic Messages, c. 850 AD

This discovery effectively rendered all simple substitution ciphers obsolete...

📜

Letter Frequency in English

The most common letters are: E (12.7%), T (9.1%), A (8.2%)...

🔍

Al-Kindi's Method

Count how often each letter appears in the ciphertext...

Brute Force Attack

Because there are only 25 possible shifts, a computer can test all of them in microseconds...

V A Timeline of Cryptography

Scytale of Sparta

The Spartans use a cylindrical rod (scytale) around which a strip of leather is wound...

700 BC
58 BC

Caesar's Gallic Campaigns

Julius Caesar begins systematically encrypting his military communications...

Augustus's One-Shift Variant

Suetonius records that the Emperor Augustus used a personal cipher...

27 BC
850 AD

Al-Kindi Breaks the Cipher

The Arab scholar Al-Kindi publishes the first known systematic description of frequency analysis...

Leon Battista Alberti — Polyalphabetic Cipher

The Italian Renaissance polymath invents the cipher disk and introduces polyalphabetic substitution...

1467
1553

The Vigenère Cipher

Giovan Battista Bellaso creates a polyalphabetic cipher using a keyword...

The Enigma Machine

Germany deploys the Enigma cipher machine, which automates polyalphabetic substitution...

1920s
1976

Public-Key Cryptography

Diffie and Hellman publish the landmark paper introducing public-key cryptography...

ROT13 on the Internet

ROT13 — a Caesar cipher with a shift of 13 — becomes a standard convention on Usenet...

1980s

VI Legacy — Why It Still Matters

Today, the Caesar cipher is hopelessly insecure for any real communication...

It is the first cipher taught in virtually every computer science curriculum worldwide...

The cipher also demonstrates a timeless truth: obscurity alone is not security...

More broadly, Caesar's instinct was correct: in warfare and diplomacy, controlling information is as important as controlling territory...

🎓

Education

The Caesar cipher is the entry point to cryptography in schools and universities worldwide...

🧩

Puzzles & Games

From escape rooms to geocaching, the Caesar cipher remains a beloved puzzle mechanic...

💻

Programming

Implementing a Caesar cipher is a classic beginner programming exercise...

The study of cryptography must begin somewhere. And it almost always begins in Rome...

— Code of Rome
NUNC LUDUM INCIPE

Now that you know the history — can you crack the cipher?

🏛 Play Code of Rome