From the battlefields of Gaul to the halls of modern cryptography — the story of the world's most famous cipher.
Gaius Julius Caesar (100 – 44 BC) was a Roman general, statesman, and one of the most pivotal figures in Western history...
Caesar maintained a vast network of communications spanning thousands of kilometres...
Caesar's cipher, described by the Roman historian Suetonius...
If he had anything confidential to say, he wrote it in cipher...
— Suetonius, De Vita Caesarum, c. 121 AD
The Caesar cipher is a substitution cipher...
The transformation is mathematically expressed as: E(x) = (x + n) mod 26...
For example, with a shift of 3 — Caesar's preferred key — the alphabet maps like this:
Encrypted result (ciphertext)
Plain →
Cipher →
The cipher works on letters only; spaces, punctuation, and numbers are left unchanged.
Caesar sometimes varied his approach. According to Valerius Probus...
Caesar's primary use of the cipher was during his eight-year campaign in Gaul...
Caesar used encryption in his personal letters to Cicero...
Caesar's successor Augustus used a similar system...
ROT13 ("rotate by 13") is a direct descendant of the Caesar cipher...
For centuries, the Caesar cipher was considered reasonably secure...
The more sophisticated technique is frequency analysis...
One way to solve an encrypted message, if we know its language...
— Al-Kindi, A Manuscript on Deciphering Cryptographic Messages, c. 850 AD
This discovery effectively rendered all simple substitution ciphers obsolete...
The most common letters are: E (12.7%), T (9.1%), A (8.2%)...
Count how often each letter appears in the ciphertext...
Because there are only 25 possible shifts, a computer can test all of them in microseconds...
The Spartans use a cylindrical rod (scytale) around which a strip of leather is wound...
Julius Caesar begins systematically encrypting his military communications...
Suetonius records that the Emperor Augustus used a personal cipher...
The Arab scholar Al-Kindi publishes the first known systematic description of frequency analysis...
The Italian Renaissance polymath invents the cipher disk and introduces polyalphabetic substitution...
Giovan Battista Bellaso creates a polyalphabetic cipher using a keyword...
Germany deploys the Enigma cipher machine, which automates polyalphabetic substitution...
Diffie and Hellman publish the landmark paper introducing public-key cryptography...
ROT13 — a Caesar cipher with a shift of 13 — becomes a standard convention on Usenet...
Today, the Caesar cipher is hopelessly insecure for any real communication...
It is the first cipher taught in virtually every computer science curriculum worldwide...
The cipher also demonstrates a timeless truth: obscurity alone is not security...
More broadly, Caesar's instinct was correct: in warfare and diplomacy, controlling information is as important as controlling territory...
The Caesar cipher is the entry point to cryptography in schools and universities worldwide...
From escape rooms to geocaching, the Caesar cipher remains a beloved puzzle mechanic...
Implementing a Caesar cipher is a classic beginner programming exercise...
The study of cryptography must begin somewhere. And it almost always begins in Rome...
— Code of Rome