Login

Please fill in your details to login.





015 encryption expedition: cracking the caesar cipher (ks3)

Join the Digital Protectors to learn how to encrypt and decrypt secret messages using the Caesar Cipher in this interactive KS3 Computing lesson.

The Digital Protector's Briefing: Keeping Secrets Safe


Since the dawn of human communication, people have needed to send secret messages. Whether it was ancient military commanders hiding battle plans or modern banks protecting your pocket money, the goal is the same: ensure that only the intended recipient can read the information. This practice is known as cryptography.

As a Digital Protector, your job is to understand how we secure data. Long before computers existed, people used physical methods to scramble their messages. One of the most famous early examples is the Caesar Cipher, named after the Roman leader Julius Caesar. He used it to send confidential messages to his generals on the battlefield.

The Caesar Cipher is an encryption algorithm based on a simple substitution method. It works by taking the standard alphabet and shifting it by a set number of places. This number is known as the key.

For example, if you use a shift key of 3, you move three letters along the alphabet. The letter 'A' becomes 'D'. The letter 'B' becomes 'E', and 'C' becomes 'F'. When you reach the end of the alphabet, you simply wrap around back to the beginning, so 'X' becomes 'A', 'Y' becomes 'B', and 'Z' becomes 'C'.

The original, readable message you want to send is called the plaintext. Once you apply the algorithm and the key, the scrambled, unreadable result is called the ciphertext. If an enemy intercepts the ciphertext but doesn't know the shift key, the message looks like total gibberish! However, if your generals know the key is 3, they can reverse the process - shifting the letters backward by 3 - to decrypt the message and reveal the plaintext.

While modern computer encryption is vastly more complex than a simple shift, the fundamental principles of using an algorithm and a secret key remain the foundation of all digital security today.


image
The Scenario

Enemy agents have intercepted a highly sensitive transmission, but fortunately, the data was encrypted! The sender used an ancient technique called a Caesar CipherI have no idea what this means to scramble the letters. As a trainee in the cyber security division, your commanding officer has tasked you with understanding this encryption method, proving you can decode the message, and preparing a briefing document for the rest of your squad.

The Persona

You are acting as The Digital Protector. A Digital Protector builds a multi-layered understanding of security. To protect modern digital systems, you first need to understand the theoretical foundations of security, including basic encryption algorithms. Today, you are looking at where it all began!

1
Understand the Theory

Cryptography is the art of writing or solving codes. The Caesar Cipher is a type of substitution cipher where each letter in the original message (the plaintext) is shifted a certain number of places down the alphabet. For example, with a shift of 1, A would be replaced by B, B would become C, and so on.

To learn more about how Julius Caesar used this to protect military secrets, you can run a safe search here: Search for Caesar's historical ciphers

2
Consult your AI Tutor

If you are struggling to picture how the shifting alphabet works, use the interactive AI prompt below to get a simple, tailored explanation.

Act as a supportive, expert computer science tutor. Explain how a Caesar cipher works. Limit your response to 3 short paragraphs. Explain this so a 12-year-old KS3 student can understand. Keep the tone encouraging, clear, and avoiding overly academic jargon. Include 1 real-world analogy. NO intro, NO outro, NO deviation from the topic, NO follow-up questions.


3
Crack the Code

You have intercepted the following encrypted message (Ciphertext):
KHOOR GLJLWDO SURWHFWRU
. You have intelligence suggesting a Shift of 3 was used to encrypt it.

1
Write the encrypted message down on a piece of scrap paper.
2
Write out the standard alphabet A-Z.
3
Shift the alphabet backward by 3 spaces to find the original plaintext letters.
4
Decode the message!

4
Create your Briefing Document

Now that you understand the mechanics of the cipher, you must create a digital artefact (a presentation slide deck or a word processed report) to train new recruits.

1
Open your presentation or word processing software.
2
Create a title page with the lesson title and your name.
3
Create a section called Plaintext vs CiphertextI have no idea what this means and explain what these two terms mean.
4
Create a section called Encryption AlgorithmI have no idea what this means and explain step-by-step how a Caesar shift works.
5
Include the message you cracked in step 3 as an example.
6
Write your own new secret message, choose a shift key (e.g., Shift 5), and include both the plaintext and your new ciphertext in your document.

Outcome
Before you submit your work to your teacher, check that you have:
Explained the difference between Plaintext and Ciphertext.
Clearly described how a Caesar Cipher shifts letters.
Successfully decoded the intercepted message.
Created and encrypted your own custom secret message.
Last modified: March 4th, 2026
The Computing Café works best in landscape mode.
Rotate your device.
Dismiss Warning