, who used an alphabet where decrypting would shift three letters to the right. The Caesar cipher is named for
Julius Caesar, who, according to the Roman historian
Suetonius, used it with a shift of three ( becoming when encrypting, and vice versa when decrypting) to protect messages of military significance. While Caesar's was the first recorded use of this scheme, other substitution ciphers are known to have existed earlier. Suetonius writes that his nephew,
Augustus, used the cipher with a right shift of one, but it did not wrap around to the beginning of the
Latin alphabet, instead replacing with . Evidence exists that Caesar also used more complicated systems. The grammarian
Aulus Gellius refers to a (now lost) treatise on his ciphers: It is unknown how effective the Caesar cipher was at the time: there is no record of contemporary techniques for the solution of simple substitution ciphers. The earliest surviving records date to the 9th-century works of
Al-Kindi in the
Arab world with the discovery of
frequency analysis. A piece of text encrypted in a
Hebrew version of the Caesar cipher (not to be confused with
Atbash) is sometimes found on the back of Jewish
mezuzah scrolls. When each letter is replaced with the letter before it in the
Hebrew alphabet, the text reads "
YHWH, our God, YHWH", a quotation from the scroll. The
Vigenère cipher uses a Caesar cipher with a different shift at each position in the text; the value of the shift is defined using a repeating keyword. Repeating keywords (e.g., "
Complete Victory" used by the
Confederacy during the
American Civil War) introduce a cyclic pattern that might be detected with statistically advanced frequency analysis. (
See e.g. Coincidence counting.) If the keyword is as long as the message, is chosen at
random, never becomes known to anyone else, and is never reused, it is a
one-time pad cipher, impossible to break cryptographically. However, the problems involved in
distributing such a key make the one-time pad difficult to use in practice. In the 19th century, the
personal advertisements section in newspapers would sometimes be used to exchange messages encrypted using simple cipher schemes.
David Kahn (1967) describes instances of lovers engaging in secret communications enciphered using the Caesar cipher in
The Times. As late as 1915 during
World War I, the Caesar cipher was used by the Russian army as a replacement for more complicated ciphers which had proven difficult for their troops to master; German and Austrian
cryptanalysts had little difficulty in decrypting their messages. In April 2006, fugitive
Mafia boss
Bernardo Provenzano was captured in
Sicily partly because some of his messages, clumsily written in a variation of the Caesar cipher, were broken. Provenzano's cipher used numbers, so that "A" would be written as "4", "B" as "5", and so on. In 2011,
British Airways employee Rajib Karim was convicted of "terrorism offences" after using a Caesar cipher to discuss with Bangladeshi
jihadi activists plots to bomb the airline's planes or disrupt its IT systems. Although the parties had access to far better encryption techniques (Karim himself used
PGP for data storage), they chose to use their own scheme implemented in
Microsoft Excel, rejecting a more sophisticated code program called
Mujahedeen Secrets "because '
kaffirs', or non-believers, know about it, so it must be less secure". Caesar ciphers can be found today in children's toys such as
secret decoder rings. A Caesar shift of thirteen is also performed in the
ROT13 cipher, a simple method of obfuscating text widely found on
Usenet and used to obscure text (such as joke punchlines and story
spoilers), but not seriously used as a method of encryption. ==Breaking the cipher==