015. encryption expedition: cracking the caesar cipher (ks3)
Explore the history of cryptography and learn the basics of encryption by cracking the ancient Caesar cipher.
How do you send a secret message over the internet without anyone else reading it? The answer is encryption - the art of scrambling data. In this lesson, we will travel back in time to Ancient Rome to explore one of the oldest secret codes in history, the Caesar cipher. You will learn how to encrypt your own messages and attempt to crack the codes of others.
Secrets of the Roman Empire: The Caesar Cipher
The Need for Secrets
Imagine you are a general in Ancient Rome. You need to send a vital message to your troops across the country, but the messenger might be captured by the enemy. If you write the message in plain text, your plans are ruined. This is where cryptography comes in. Cryptography is the art of writing or solving codes, and one of the most famous early examples is the Caesar cipher, named after Julius Caesar himself. He used it to protect his military secrets. Today, as a Digital Protector, understanding how these historical codes work is the first step to mastering modern cybersecurity.
How the Cipher Works
The Caesar cipher is a type of substitution cipher. This means every letter in the original message (called the plaintext) is replaced by another letter to create the secret message (called the ciphertext).
To use the cipher, you need a shift key. This is a number that tells you how many places down the alphabet to move. For example, with a shift key of 3, the letter A becomes D, the letter B becomes E, and so on. When you reach the end of the alphabet, you simply wrap around back to the beginning, so Z would become C. The process of scrambling the message is called encryption, and the process of turning it back into readable text is called decryption.
The Digital Protector's Mission
While a Caesar cipher was brilliant two thousand years ago, modern computers can crack it in a fraction of a second. However, the basic principle of using an algorithm and a key to scramble data is still how we protect everything from our text messages to our online bank accounts. By learning to encrypt and decrypt these classic codes, you are building the logical thinking skills needed to defend our digital world.
Comprehension Questions
Make sure you have read the passage carefully. Grab yourself a piece of lined paper and put your name, class and date at the top. Attempt the questions following questions making sure to answer in full sentences.
Knowledge, recall, identification
1
What is the name of the ancient Roman leader who used this cipher to protect his secrets?
2
Define the term plaintext as it is used in the passage.
3
What specific type of cipher is the Caesar cipher classified as?
Analysis & Interpretation
4
Explain how a shift key is used to alter the letters in a message.
5
If you encrypt a message and reach the letter Z, explain what happens to the alphabet sequence.
6
Contrast the process of encryption with the process of decryption.
Synthesis & Creation
7
Using a shift key of 2, encrypt the three-letter word "CAT". Show your working.
8
Create a short, one-sentence rule explaining how someone would decrypt a message if they knew it was encrypted with a shift of 3.
9
Imagine you are a Roman messenger. Write a short explanation of why keeping the shift key a secret is just as important as the method itself.
Evaluation & Justification
10
To what extent is the Caesar cipher a secure method for protecting information on the modern internet?
11
Evaluate why the basic principles of this ancient cipher are still relevant to studying modern cybersecurity.
12
Justify why a modern Digital Protector needs to understand how to both create and crack codes.
Plugged Task: Incident Response Team

You have intercepted a suspicious, scrambled message on the school's network. It reads: "WKLV LV D WDUJHWHG DWWDFN". You need to create a one-page Digital Incident Report documenting the breach, explaining the method used to scramble it, and ultimately cracking the code to reveal the plaintext message.
The Persona
You are working as The Digital Protector. Your mindset is focused on digital security and safety. You understand that defending a network requires knowing exactly how attackers hide their tracks and scramble their data.
1
Create your digital artefact
Open a word processing application and create a new document. Add a title, your name, and the date.
2
Research the underlying mechanics
Before cracking the code, you must understand how the alphabet wraps around in a Caesar cipher. Use this search, "Search Google: Caesar cipher alphabet wrap around", to find the answer and write a one-sentence summary in your report.
3
Consult your AI specialist
To crack a code without the key, you will need to use a "brute force" method. Generate an explanation of what this is to include in your Incident Report.
Act as a senior cybersecurity analyst. Explain how a brute force attack is used to crack a Caesar cipher. Keep the explanation strictly under 75 words. The target audience is a 12-year-old KS3 student. Use an encouraging, educational tone avoiding complex jargon. Only provide the requested explanation. NO intro, NO outro, NO deviation from the topic, NO follow-up questions
4
Prepare your decryption tool
Navigate to an online decryption suite to begin your code-breaking.
1
Go to CyberChef and search for "ROT13" in the operations panel.
2
Drag the "ROT13" operation into the recipe box. Note: ROT13 is just a Caesar cipher where you can change the "Amount" (the shift key).
5
Execute the brute force attack
Paste the intercepted ciphertext into the input box and test different shift amounts.
1
Input the text: "WKLV LV D WDUJHWHG DWWDFN".
2
Change the shift "Amount" one by one (1, 2, 3...) until the output box reveals a readable English sentence.
6
Finalise the Incident Report
Compile all your findings into your document to complete the task.
1
Record the decrypted message.
2
Record the exact shift key required to crack it.
3
Paste your AI-generated explanation of brute-forcing.
Outcome
A completed one-page Incident Report document.
A clear explanation of the alphabet wrap-around mechanic.
A successful decryption of the intercepted message.
Identification of the correct shift key used.
Inclusion of a clear, AI-generated definition of a brute force attack.
Unplugged Task: The Cipher Disk Architect
To truly master encryption as The Digital Protector, you will now design and build a physical decryption tool: a Caesar Cipher Disk. This will allow you to encrypt and decrypt messages instantly without needing a computer.
1
Prepare your components
On a piece of card or paper, draw two circles: one large circle (the outer wheel) and one slightly smaller circle (the inner wheel).
2
Calibrate the alphabet
Carefully write the alphabet (A-Z) around the edge of both circles. Ensure the letters are spaced evenly so that when you place the small circle on top of the large one, the letters can align perfectly.
3
Assemble the tool
Cut out both circles. Place the smaller circle exactly in the centre of the larger one. Use a split pin (or a pencil point) to poke a hole through the middle of both, allowing the inner wheel to spin freely.
4
Test the encryption
To encrypt a message with a shift of 5:
1
Rotate the inner wheel until the inner 'A' matches the outer 'F' (the 5th letter after A).
2
To find the ciphertext for any letter, look at the letter on the inner wheel and find its partner on the outer wheel.
3
Use your disk to encrypt the word "SECURE".
5
Documentation
On the back of your disk, write a short "Protector's Note" explaining why having a physical "key" (the shift number) is the most important part of keeping the message safe from intercepted messengers.
Last modified: April 16th, 2026
