Encryption Simulator

Visualise how Plaintext is transformed into Ciphertext using a Caesar Cipher shift key.

+3

The key determines the 'offset' of the alphabet shift

J277 Exam Context: Even if a wireless transmission is intercepted, the data remains secure because the hacker only sees the Ciphertext. Without the Key, the data is unreadable and meaningless.