╔═══════════════════════════════════════════════════════╗
║                                                       ║
║    ████████╗██╗  ██╗███████╗                          ║
║    ╚══██╔══╝██║  ██║██╔════╝                          ║
║       ██║   ███████║█████╗                            ║
║       ██║   ██╔══██║██╔══╝                            ║
║       ██║   ██║  ██║███████╗                          ║
║       ╚═╝   ╚═╝  ╚═╝╚══════╝                          ║
║     ██████╗██╗██████╗ ██╗  ██╗███████╗██████╗         ║
║    ██╔════╝██║██╔══██╗██║  ██║██╔════╝██╔══██╗        ║
║    ██║     ██║██████╔╝███████║█████╗  ██████╔╝        ║
║    ██║     ██║██╔═══╝ ██╔══██║██╔══╝  ██╔══██╗        ║
║    ╚██████╗██║██║     ██║  ██║███████╗██║  ██║        ║
║     ╚═════╝╚═╝╚═╝     ╚═╝  ╚═╝╚══════╝╚═╝  ╚═╝        ║
║              ██████╗  ██████╗  ██████╗ ███╗   ███╗    ║
║              ██╔══██╗██╔═══██╗██╔═══██╗████╗ ████║    ║
║              ██████╔╝██║   ██║██║   ██║██╔████╔██║    ║
║              ██╔══██╗██║   ██║██║   ██║██║╚██╔╝██║    ║
║              ██║  ██║╚██████╔╝╚██████╔╝██║ ╚═╝ ██║    ║
║              ╚═╝  ╚═╝ ╚═════╝  ╚═════╝ ╚═╝     ╚═╝    ║
║                                                       ║
║          ~ encode, decode, conceal, reveal ~          ║
╚═══════════════════════════════════════════════════════╝

Welcome to the Cipher Room, where messages hide in plain sight. Choose your method of concealment.

ROT13
Classic letter rotation
Caesar
Shift by any amount
Atbash
Mirror alphabet
Morse Code
Dots and dashes
Reverse
Mirror message
Binary
Ones and zeros
L33T
H4X0R speak
Pig Latin
Ildchay's odecay
🔐 TODAY'S SECRET MESSAGE (ROT13 encoded)
Gur fznyy jro uvqrf gernfherf gur nytbevguz pnaabg vaqrk.
Decode it to reveal today's hidden wisdom

About Ciphers

Cryptography has fascinated humans for millennia. From Caesar's military dispatches to the Enigma machine, we've always sought ways to communicate in secret.

These simple ciphers aren't secure by modern standards—they're meant for fun, for passing notes, for the joy of shared secrets. Real security requires mathematics far beyond what letters can show.

But there's still magic in watching a message transform, in knowing that what looks like nonsense holds meaning for those who know the key.