# ROT-13 Data Encoder

World's simplest crypto tool
This browser-based utility applies the ROT13 encryption algorithm to your input data. All characters in the input text get shifted by 13 characters and you get a ROT13-encoded text in the output. Don't use this tool for anything serious as ROT13 is very easy to break. Created by cryptonerds from team Browserling.

We put a browser in your browser!
Browserling

Check out our project Browserling – get a browser in your browser and browse while you browse.

A link to this tool, including input, options and all chained tools.

Can't convert.

## What is a ROT-13 Data Encoder?

learn more about this tool
This online utility encodes text using the ROT13 cipher. This cipher is a special case of the Caesar shift cipher that was developed in ancient Rome. It's a substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet. In ROT13, each character is replaced by a character 13 positions to the left. For example, A becomes N, B becomes O, and so on. The method is named after Julius Caesar, who used it in his private correspondence.

## ROT-13 Data Encoder examples

Click to useHide the Solution

In this example, we encrypt the solution to a puzzle via the ROT13 algorithm. It's useful if you want to share it on game forums but don't want people to immediately read the solution and spoil their joy of solving the puzzle.

In the room where you find the warlock's spirit there are five pushable bricks hidden in the walls. To unlock the spirit, push the third brick twice, then second brick five times and the fifth block once.

Va gur ebbz jurer lbh svaq gur jneybpx'f fcvevg gurer ner svir chfunoyr oevpxf uvqqra va gur jnyyf. Gb haybpx gur fcvevg, chfu gur guveq oevpx gjvpr, gura frpbaq oevpx svir gvzrf naq gur svsgu oybpx bapr.

Don't Use It On Digits!

This example demonstrates that ROT13 cypher doesn't work on digits. This is because it only operates on the letters of the English alphabet. As you can see, the time of the secret meeting was left un-encrypted and visible to everyone.

Secret meeting at 12:25!

Frperg zrrgvat ng 12:25!

Pro tips
Master online crypto tools

You can pass input to this tool via

__?input__query argument and it will automatically compute output. Here's how to type it in your browser's address bar. Click to try!
https://onlinecryptotools.com/rot13-encrypt-data

__?input__=In%20the%20room%20where%20you%20find%20the%20warlock%27s%20spirit%20there%20are%20five%20pushable%20bricks%20hidden%20in%20the%20walls.%20To%20unlock%20the%20spirit%2C%20push%20the%20third%20brick%20twice%2C%20then%20second%20brick%20five%20times%20and%20the%20fifth%20block%20once.
All crypto tools

Quickly encrypt data using the ROT13 substitution cipher.

Quickly decrypt data that was encrypted with ROT13.

Quickly encrypt data using the ROT47 substitution cipher.

Quickly undo ROT47 encryption and find the original message.

Quickly count letters in the given text and print their distribution.

Quickly count words in the given text and print their distribution.

Coming soon
These crypto tools are on the way

ROT-2 Encrypt/Decrypt

Encrypt and decrypt numbers using ROT2 cypher.

ROT-5 Encrypt/Decrypt

Encrypt and decrypt numbers using ROT5 cypher.

ROT-n Encrypt/Decrypt

Encrypt and decrypt numbers using custom ROT cypher.

Base26 Encode/Decode

Encode and decode data to/from base26 encoding.

Base32 Encode/Decode

Encode and decode data to/from base32 encoding.

Base58 Encode/Decode

Encode and decode data to/from base58 encoding.

Base62 Encode/Decode

Encode and decode data to/from base62 encoding.

Base64 Encode/Decode

Encode and decode data to/from base64 encoding.

ASCII85 Encode/Decode

Encode and decode data to/from ASCII85 encoding.

XOR Encrypt/Decrypt

Encrypt and decrypt data using the XOR algorithm.

AES Encrypt/Decrypt

Encrypt and decrypt data using the AES algorithm.

RC2 Encrypt/Decrypt

Encrypt and decrypt data using the RC2 algorithm.

RC4 Encrypt/Decrypt

Encrypt and decrypt data using the RC4 algorithm.

RC5 Encrypt/Decrypt

Encrypt and decrypt data using the RC5 algorithm.

RC6 Encrypt/Decrypt

Encrypt and decrypt data using the RC6 algorithm.

Akelarre Encrypt/Decrypt

Encrypt and decrypt data using the Akelarre algorithm.

Ake98 Encrypt/Decrypt

Encrypt and decrypt data using the Ake98 algorithm.

DES Encrypt/Decrypt

Encrypt and decrypt data using the DES algorithm.

Triple DES Encrypt/Decrypt

Encrypt and decrypt data using the 3DES algorithm.

Rabbit Encrypt/Decrypt

Encrypt and decrypt data using the Rabbit cipher.

Blowfish Encrypt/Decrypt

Encrypt and decrypt data using the Blowfish cipher.

Twofish Encrypt/Decrypt

Encrypt and decrypt data using the Twofish cipher.

KASUMI Encrypt/Decrypt

Encrypt and decrypt data using the KASUMI cipher.

Serpent Encrypt/Decrypt

Encrypt and decrypt data using the Serpent cipher.

Solitaire Encrypt/Decrypt

Encrypt and decrypt data using the Solitaire cipher.

Break a Substitution Cipher

Decode text encrypted with a simple substitution cipher.

Generate Random Numbers

Print a list of random numbers.

Generate Primes

Print a list of prime numbers.

Generate Twin Primes

Print a list of twin prime numbers.

Generate Cousin Primes

Print a list of cousin prime numbers.

Generate Prime Triplets

Print a list of prime triplets.

Generate Random Primes

Print a list of random prime numbers.

Check Prime Numbers

Check if the given numbers are prime numbers.

Create Random Passwords

Generate one or more random passwords.

Replace Message Alphabet

Rewrite the given message with a new alphabet.

Calculate Text Entropy

Compute the Shannon entropy of the given message.

Generate High Entropy Data

Create text with high Shannon entropy.

Generate Low Entropy Data

Create text with low Shannon entropy.

Analyze Random Data

Perform statistical analysis of random data.

Subscribe!
Never miss an update

Cool!

Notifications
We'll let you know when we add this tool

Cool!