ROT13 Decoder

Decode ROT13 encoded text instantly — reveal hidden spoilers, puzzle answers, and obfuscated content.

💡 ROT13 is self-inverse — encoding and decoding use the exact same operation. Apply ROT13 again to re-encode.

How ROT13 Decoding Works

ROT13 decoding is identical to ROT13 encoding — because 26 letters in the alphabet divided by 13 equals 2, applying the rotation twice returns exactly to the original. This elegant property means a ROT13 decoder is the same function as the encoder, just with a different label on the button.

To decode ROT13 text, each letter is simply shifted back 13 positions: A↔N, B↔O, C↔P, D↔Q, E↔R, F↔S, G↔T, H↔U, I↔V, J↔W, K↔X, L↔Y, M↔Z. All non-letter characters remain unchanged. This tool instantly reveals hidden forum spoilers, puzzle solutions, email obfuscation, and any other ROT13-encoded content.

ROT13 is commonly encountered on Reddit, old Usenet newsgroups, programming puzzles, security CTF (Capture The Flag) challenges, and ASCII art signatures. Some email clients also used it to hide email addresses from simple scrapers.

FAQ

Why is ROT13 used if it provides no real security?
ROT13 is not used for security — it's used for casual content hiding. On forums and social media, it hides spoilers or offensive jokes behind a deliberate action required to read them. The key benefit is that it's immediately reversible by anyone who knows what ROT13 is, making it a "polite" spoiler tag rather than a real cipher.
Where will I encounter ROT13 encoded text?
Common places: Reddit spoiler tags (before native spoiler support existed), old Usenet/newsgroup posts, programming puzzles and CTF challenges, some obfuscated JavaScript or configuration files, and joke "encryption" in old Unix fortune cookie files and similar programs.