᠎᠎᠎          
51K

ROT-13 Data Encoder

World's simplest crypto tool
This browser-based utility applies the ROT13 encryption algorithm to your input data. All characters in the input text get shifted by 13 characters and you get a ROT13-encoded text in the output. Don't use this tool for anything serious as ROT13 is very easy to break. Created by cryptonerds from team Browserling.
We put a browser in your browser! Browserling
Check out our project Browserling – get a browser in your browser and browse while you browse.

What is a ROT-13 Data Encoder?

learn more about this tool
This online utility encodes text using the ROT13 cipher. This cipher is a special case of the Caesar shift cipher that was developed in ancient Rome. It's a substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet. In ROT13, each character is replaced by a character 13 positions to the left. For example, A becomes N, B becomes O, and so on. The method is named after Julius Caesar, who used it in his private correspondence.

ROT-13 Data Encoder examples

Click to use
Hide the Solution
In this example, we encrypt the solution to a puzzle via the ROT13 algorithm. It's useful if you want to share it on game forums but don't want people to immediately read the solution and spoil their joy of solving the puzzle.
In the room where you find the warlock's spirit there are five pushable bricks hidden in the walls. To unlock the spirit, push the third brick twice, then second brick five times and the fifth block once.
Va gur ebbz jurer lbh svaq gur jneybpx'f fcvevg gurer ner svir chfunoyr oevpxf uvqqra va gur jnyyf. Gb haybpx gur fcvevg, chfu gur guveq oevpx gjvpr, gura frpbaq oevpx svir gvzrf naq gur svsgu oybpx bapr.
Don't Use It On Digits!
This example demonstrates that ROT13 cypher doesn't work on digits. This is because it only operates on the letters of the English alphabet. As you can see, the time of the secret meeting was left un-encrypted and visible to everyone.
Secret meeting at 12:25!
Frperg zrrgvat ng 12:25!
Pro tips Master online crypto tools
You can pass input to this tool via ?input query argument and it will automatically compute output. Here's how to type it in your browser's address bar. Click to try!
https://onlinecryptotools.com/rot13-encrypt-data?input=In%20the%20room%20where%20you%20find%20the%20warlock%27s%20spirit%20there%20are%20five%20pushable%20bricks%20hidden%20in%20the%20walls.%20To%20unlock%20the%20spirit%2C%20push%20the%20third%20brick%20twice%2C%20then%20second%20brick%20five%20times%20and%20the%20fifth%20block%20once.
All crypto tools
Didn't find the tool you were looking for? Let us know what tool we are missing and we'll build it!
Quickly encrypt data using the ROT13 substitution cipher.
Quickly decrypt data that was encrypted with ROT13.
Quickly encrypt data using the ROT47 substitution cipher.
Quickly undo ROT47 encryption and find the original message.
Quickly count letters in the given text and print their distribution.
Quickly count words in the given text and print their distribution.
Coming soon These crypto tools are on the way
ROT-2 Encrypt/Decrypt
Encrypt and decrypt numbers using ROT2 cypher.
ROT-5 Encrypt/Decrypt
Encrypt and decrypt numbers using ROT5 cypher.
ROT-n Encrypt/Decrypt
Encrypt and decrypt numbers using custom ROT cypher.
Base26 Encode/Decode
Encode and decode data to/from base26 encoding.
Base32 Encode/Decode
Encode and decode data to/from base32 encoding.
Base58 Encode/Decode
Encode and decode data to/from base58 encoding.
Base62 Encode/Decode
Encode and decode data to/from base62 encoding.
Base64 Encode/Decode
Encode and decode data to/from base64 encoding.
ASCII85 Encode/Decode
Encode and decode data to/from ASCII85 encoding.
XOR Encrypt/Decrypt
Encrypt and decrypt data using the XOR algorithm.
AES Encrypt/Decrypt
Encrypt and decrypt data using the AES algorithm.
RC2 Encrypt/Decrypt
Encrypt and decrypt data using the RC2 algorithm.
RC4 Encrypt/Decrypt
Encrypt and decrypt data using the RC4 algorithm.
RC5 Encrypt/Decrypt
Encrypt and decrypt data using the RC5 algorithm.
RC6 Encrypt/Decrypt
Encrypt and decrypt data using the RC6 algorithm.
Akelarre Encrypt/Decrypt
Encrypt and decrypt data using the Akelarre algorithm.
Ake98 Encrypt/Decrypt
Encrypt and decrypt data using the Ake98 algorithm.
DES Encrypt/Decrypt
Encrypt and decrypt data using the DES algorithm.
Triple DES Encrypt/Decrypt
Encrypt and decrypt data using the 3DES algorithm.
Rabbit Encrypt/Decrypt
Encrypt and decrypt data using the Rabbit cipher.
Blowfish Encrypt/Decrypt
Encrypt and decrypt data using the Blowfish cipher.
Twofish Encrypt/Decrypt
Encrypt and decrypt data using the Twofish cipher.
KASUMI Encrypt/Decrypt
Encrypt and decrypt data using the KASUMI cipher.
Serpent Encrypt/Decrypt
Encrypt and decrypt data using the Serpent cipher.
Solitaire Encrypt/Decrypt
Encrypt and decrypt data using the Solitaire cipher.
Break a Substitution Cipher
Decode text encrypted with a simple substitution cipher.
Generate Random Numbers
Print a list of random numbers.
Generate Primes
Print a list of prime numbers.
Generate Twin Primes
Print a list of twin prime numbers.
Generate Cousin Primes
Print a list of cousin prime numbers.
Generate Prime Triplets
Print a list of prime triplets.
Generate Random Primes
Print a list of random prime numbers.
Check Prime Numbers
Check if the given numbers are prime numbers.
Create Random Passwords
Generate one or more random passwords.
Replace Message Alphabet
Rewrite the given message with a new alphabet.
Calculate Text Entropy
Compute the Shannon entropy of the given message.
Generate High Entropy Data
Create text with high Shannon entropy.
Generate Low Entropy Data
Create text with low Shannon entropy.
Analyze Random Data
Perform statistical analysis of random data.