Caesar Cipher
Decoding Caesar cipher messages requires understanding the reverse process of the famous Roman encryption technique, where each letter was shifted by a specific number of positions in the alphabet. Whether you've discovered an encrypted message, received a coded communication, or need to solve a cryptographic puzzle, learning how to decode Caesar cipher text opens up the fascinating world of classical cryptanalysis.
Modern Caesar cipher decoders offer powerful features like automatic shift detection and brute force decryption, making it possible to crack encoded messages even when you don't know the original shift value used during encryption.
Understanding Caesar Cipher Decryption Fundamentals
Caesar cipher decoding involves reversing the alphabet shift process used during encryption. While encoding moves letters forward in the alphabet, decoding moves them backward by the same amount. This reverse substitution reveals the original plaintext message hidden beneath the seemingly random letters.
The key challenge in Caesar cipher decryption often lies in determining the correct shift value when it's unknown. Professional decoding tools address this challenge through sophisticated analysis techniques and automated testing capabilities.
The Mathematics Behind Caesar Cipher Decoding
Understanding how to decrypt Caesar cipher messages mathematically provides precision and eliminates guesswork. The decoding formula reverses the encryption process using modular arithmetic:
Decoded Position = (Encrypted Position - Shift Value) mod 26
Where negative results require adding 26 to find the correct position. This mathematical approach ensures accurate decoding regardless of the shift value or message complexity.
Decoding Caesar cipher messages requires understanding the reverse process of the famous Roman encryption technique, where each letter was shifted by a specific number of positions in the alphabet. Whether you've discovered an encrypted message, received a coded communication, or need to solve a cryptographic puzzle, learning how to decode Caesar cipher text opens up the fascinating world of classical cryptanalysis.
Modern Caesar cipher decoders offer powerful features like automatic shift detection and brute force decryption, making it possible to crack encoded messages even when you don't know the original shift value used during encryption.
Understanding Caesar Cipher Decryption Fundamentals
Caesar cipher decoding involves reversing the alphabet shift process used during encryption. While encoding moves letters forward in the alphabet, decoding moves them backward by the same amount. This reverse substitution reveals the original plaintext message hidden beneath the seemingly random letters.
The key challenge in Caesar cipher decryption often lies in determining the correct shift value when it's unknown. Professional decoding tools address this challenge through sophisticated analysis techniques and automated testing capabilities.
The Mathematics Behind Caesar Cipher Decoding
Understanding how to decrypt Caesar cipher messages mathematically provides precision and eliminates guesswork. The decoding formula reverses the encryption process using modular arithmetic:
Decoded Position = (Encrypted Position - Shift Value) mod 26
Where negative results require adding 26 to find the correct position. This mathematical approach ensures accurate decoding regardless of the shift value or message complexity.
Decoding Caesar cipher messages requires understanding the reverse process of the famous Roman encryption technique, where each letter was shifted by a specific number of positions in the alphabet. Whether you've discovered an encrypted message, received a coded communication, or need to solve a cryptographic puzzle, learning how to decode Caesar cipher text opens up the fascinating world of classical cryptanalysis.
Modern Caesar cipher decoders offer powerful features like automatic shift detection and brute force decryption, making it possible to crack encoded messages even when you don't know the original shift value used during encryption.
Understanding Caesar Cipher Decryption Fundamentals
Caesar cipher decoding involves reversing the alphabet shift process used during encryption. While encoding moves letters forward in the alphabet, decoding moves them backward by the same amount. This reverse substitution reveals the original plaintext message hidden beneath the seemingly random letters.
The key challenge in Caesar cipher decryption often lies in determining the correct shift value when it's unknown. Professional decoding tools address this challenge through sophisticated analysis techniques and automated testing capabilities.
The Mathematics Behind Caesar Cipher Decoding
Understanding how to decrypt Caesar cipher messages mathematically provides precision and eliminates guesswork. The decoding formula reverses the encryption process using modular arithmetic:
Decoded Position = (Encrypted Position - Shift Value) mod 26
Where negative results require adding 26 to find the correct position. This mathematical approach ensures accurate decoding regardless of the shift value or message complexity.
Step-by-Step Caesar Cipher Decoding Process
Learning to decode Caesar cipher step by step builds foundational cryptanalysis skills while demonstrating the logical approach to breaking substitution ciphers.
METHOD 1
Decoding with Known Shift Value
When you know the shift value used for encryption, Caesar cipher decoding becomes straightforward:
Set the shift value using the interactive slider
Enter the encrypted text in the input field
Observe the alphabet display showing the reverse transformation
Read the decoded output and copy the result
Example with shift value 7:
Encrypted message: "OLSSV DVYSK"
Each letter shifts backward 7 positions
O→H, L→E, S→L, S→L, V→O
Decoded result: "HELLO WORLD"
METHOD 2
Auto-Detection for Unknown Shift Values
Advanced Caesar cipher decoders include automatic shift detection capabilities that analyze the encrypted text to identify the most likely shift value. This feature uses frequency analysis and pattern recognition to determine which shift produces the most readable English text.
The auto-detect algorithm examines:
Letter frequency patterns comparing against English language statistics
Common word formations looking for recognizable English words
Bigram and trigram analysis identifying frequent letter combinations
Vowel distribution patterns ensuring natural language characteristics
STEP 3
Brute Force Caesar Cipher Decryption
When automatic detection isn't conclusive, brute force decryption systematically tests all possible shift values from 0 to 25. Modern online Caesar cipher decoders display all 25 possible decryptions simultaneously, allowing you to quickly identify the correct plaintext by visual inspection.
Brute force decryption advantages:
Guaranteed success since only 25 possibilities exist
No prior knowledge required about the encryption method
Immediate results for all possible shift values
Educational value showing how cipher weakness enables attacks
Step-by-Step Caesar Cipher Decoding Process
Learning to decode Caesar cipher step by step builds foundational cryptanalysis skills while demonstrating the logical approach to breaking substitution ciphers.
METHOD 1
Decoding with Known Shift Value
When you know the shift value used for encryption, Caesar cipher decoding becomes straightforward:
Set the shift value using the interactive slider
Enter the encrypted text in the input field
Observe the alphabet display showing the reverse transformation
Read the decoded output and copy the result
Example with shift value 7:
Encrypted message: "OLSSV DVYSK"
Each letter shifts backward 7 positions
O→H, L→E, S→L, S→L, V→O
Decoded result: "HELLO WORLD"
METHOD 2
Auto-Detection for Unknown Shift Values
Advanced Caesar cipher decoders include automatic shift detection capabilities that analyze the encrypted text to identify the most likely shift value. This feature uses frequency analysis and pattern recognition to determine which shift produces the most readable English text.
The auto-detect algorithm examines:
Letter frequency patterns comparing against English language statistics
Common word formations looking for recognizable English words
Bigram and trigram analysis identifying frequent letter combinations
Vowel distribution patterns ensuring natural language characteristics
STEP 3
Brute Force Caesar Cipher Decryption
When automatic detection isn't conclusive, brute force decryption systematically tests all possible shift values from 0 to 25. Modern online Caesar cipher decoders display all 25 possible decryptions simultaneously, allowing you to quickly identify the correct plaintext by visual inspection.
Brute force decryption advantages:
Guaranteed success since only 25 possibilities exist
No prior knowledge required about the encryption method
Immediate results for all possible shift values
Educational value showing how cipher weakness enables attacks
Step-by-Step Caesar Cipher Decoding Process
Learning to decode Caesar cipher step by step builds foundational cryptanalysis skills while demonstrating the logical approach to breaking substitution ciphers.
METHOD 1
Decoding with Known Shift Value
When you know the shift value used for encryption, Caesar cipher decoding becomes straightforward:
Set the shift value using the interactive slider
Enter the encrypted text in the input field
Observe the alphabet display showing the reverse transformation
Read the decoded output and copy the result
Example with shift value 7:
Encrypted message: "OLSSV DVYSK"
Each letter shifts backward 7 positions
O→H, L→E, S→L, S→L, V→O
Decoded result: "HELLO WORLD"
METHOD 2
Auto-Detection for Unknown Shift Values
Advanced Caesar cipher decoders include automatic shift detection capabilities that analyze the encrypted text to identify the most likely shift value. This feature uses frequency analysis and pattern recognition to determine which shift produces the most readable English text.
The auto-detect algorithm examines:
Letter frequency patterns comparing against English language statistics
Common word formations looking for recognizable English words
Bigram and trigram analysis identifying frequent letter combinations
Vowel distribution patterns ensuring natural language characteristics
STEP 3
Brute Force Caesar Cipher Decryption
When automatic detection isn't conclusive, brute force decryption systematically tests all possible shift values from 0 to 25. Modern online Caesar cipher decoders display all 25 possible decryptions simultaneously, allowing you to quickly identify the correct plaintext by visual inspection.
Brute force decryption advantages:
Guaranteed success since only 25 possibilities exist
No prior knowledge required about the encryption method
Immediate results for all possible shift values
Educational value showing how cipher weakness enables attacks
Advanced Caesar Cipher Decoding Techniques
Professional cryptanalysis extends beyond basic decoding to include sophisticated analysis methods that work even with partially corrupted or modified Caesar cipher text.
Frequency Analysis for Caesar Cipher Breaking
Caesar cipher frequency analysis exploits the fact that letter frequencies remain consistent even after alphabet shifting. In English text, the letter 'E' appears most frequently, followed by 'T', 'A', 'O', 'I', 'N', 'S', 'H', and 'R'.
Steps for frequency analysis decoding:
Count letter frequencies in the encrypted message
Identify the most common letter in the ciphertext
Calculate the shift by comparing with expected 'E' position
Apply the calculated shift to decode the entire message
Verify results by checking for readable English words
This method works particularly well with longer encrypted messages where frequency patterns become more apparent.
Handling Mixed Case and Special Characters
Real-world Caesar cipher decoding often involves text with mixed capitalization, numbers, and punctuation marks. Advanced decoders provide options for maintaining original formatting while applying the decryption algorithm only to alphabetic characters.
Case strategy options include:
Preserve original case maintaining uppercase and lowercase patterns
Convert to single case for simplified analysis
Ignore non-alphabetic characters during decoding process
Include foreign characters when dealing with international text
Advanced Caesar Cipher Decoding Techniques
Professional cryptanalysis extends beyond basic decoding to include sophisticated analysis methods that work even with partially corrupted or modified Caesar cipher text.
Frequency Analysis for Caesar Cipher Breaking
Caesar cipher frequency analysis exploits the fact that letter frequencies remain consistent even after alphabet shifting. In English text, the letter 'E' appears most frequently, followed by 'T', 'A', 'O', 'I', 'N', 'S', 'H', and 'R'.
Steps for frequency analysis decoding:
Count letter frequencies in the encrypted message
Identify the most common letter in the ciphertext
Calculate the shift by comparing with expected 'E' position
Apply the calculated shift to decode the entire message
Verify results by checking for readable English words
This method works particularly well with longer encrypted messages where frequency patterns become more apparent.
Handling Mixed Case and Special Characters
Real-world Caesar cipher decoding often involves text with mixed capitalization, numbers, and punctuation marks. Advanced decoders provide options for maintaining original formatting while applying the decryption algorithm only to alphabetic characters.
Case strategy options include:
Preserve original case maintaining uppercase and lowercase patterns
Convert to single case for simplified analysis
Ignore non-alphabetic characters during decoding process
Include foreign characters when dealing with international text
Advanced Caesar Cipher Decoding Techniques
Professional cryptanalysis extends beyond basic decoding to include sophisticated analysis methods that work even with partially corrupted or modified Caesar cipher text.
Frequency Analysis for Caesar Cipher Breaking
Caesar cipher frequency analysis exploits the fact that letter frequencies remain consistent even after alphabet shifting. In English text, the letter 'E' appears most frequently, followed by 'T', 'A', 'O', 'I', 'N', 'S', 'H', and 'R'.
Steps for frequency analysis decoding:
Count letter frequencies in the encrypted message
Identify the most common letter in the ciphertext
Calculate the shift by comparing with expected 'E' position
Apply the calculated shift to decode the entire message
Verify results by checking for readable English words
This method works particularly well with longer encrypted messages where frequency patterns become more apparent.
Handling Mixed Case and Special Characters
Real-world Caesar cipher decoding often involves text with mixed capitalization, numbers, and punctuation marks. Advanced decoders provide options for maintaining original formatting while applying the decryption algorithm only to alphabetic characters.
Case strategy options include:
Preserve original case maintaining uppercase and lowercase patterns
Convert to single case for simplified analysis
Ignore non-alphabetic characters during decoding process
Include foreign characters when dealing with international text
Practical Caesar Cipher Decoding Examples
Understanding Caesar cipher decoding theory becomes clearer through hands-on examples that demonstrate different scenarios and challenges commonly encountered in cryptanalysis.
Auto-Detection Success Story
Encrypted message: "WKH TXLFN EURZQ IRA" Using auto-detect functionality:
The algorithm analyzes letter frequencies and identifies that 'K' and 'R' appear multiple times. Testing against English patterns, it determines shift value 3 produces the most coherent result:
W→T, K→H, H→E (forming "THE")
T→Q, X→U, L→I, F→C, N→K (forming "QUICK")
Decoded result: "THE QUICK BROWN FOX"
Brute Force Decryption Analysis
Encrypted message: "YHIR VHFUHW ZRUOG"
When auto-detection is inconclusive, brute force decryption reveals all possibilities:
Shift 0: "YHIR VHFUHW ZRUOG" (no change)
Shift 1: "XGQH UGETGV YQTNF" (gibberish)
Shift 2: "WFPG TFDSTS XPSME" (gibberish)
Shift 3: "VERY SECRET WORLD" (readable English!)
The correct shift value 3 becomes immediately apparent among the results.
Handling Corrupted Text
Sometimes Caesar cipher messages contain errors or missing characters. Advanced decoding techniques can still recover the original message through context analysis and partial matching.
Corrupted input: "WKH T?LFN EU?ZQ IRA" Even with missing characters, pattern recognition and frequency analysis can determine the shift value and reconstruct the likely original message.
Practical Caesar Cipher Decoding Examples
Understanding Caesar cipher decoding theory becomes clearer through hands-on examples that demonstrate different scenarios and challenges commonly encountered in cryptanalysis.
Auto-Detection Success Story
Encrypted message: "WKH TXLFN EURZQ IRA" Using auto-detect functionality:
The algorithm analyzes letter frequencies and identifies that 'K' and 'R' appear multiple times. Testing against English patterns, it determines shift value 3 produces the most coherent result:
W→T, K→H, H→E (forming "THE")
T→Q, X→U, L→I, F→C, N→K (forming "QUICK")
Decoded result: "THE QUICK BROWN FOX"
Brute Force Decryption Analysis
Encrypted message: "YHIR VHFUHW ZRUOG"
When auto-detection is inconclusive, brute force decryption reveals all possibilities:
Shift 0: "YHIR VHFUHW ZRUOG" (no change)
Shift 1: "XGQH UGETGV YQTNF" (gibberish)
Shift 2: "WFPG TFDSTS XPSME" (gibberish)
Shift 3: "VERY SECRET WORLD" (readable English!)
The correct shift value 3 becomes immediately apparent among the results.
Handling Corrupted Text
Sometimes Caesar cipher messages contain errors or missing characters. Advanced decoding techniques can still recover the original message through context analysis and partial matching.
Corrupted input: "WKH T?LFN EU?ZQ IRA" Even with missing characters, pattern recognition and frequency analysis can determine the shift value and reconstruct the likely original message.
Practical Caesar Cipher Decoding Examples
Understanding Caesar cipher decoding theory becomes clearer through hands-on examples that demonstrate different scenarios and challenges commonly encountered in cryptanalysis.
Auto-Detection Success Story
Encrypted message: "WKH TXLFN EURZQ IRA" Using auto-detect functionality:
The algorithm analyzes letter frequencies and identifies that 'K' and 'R' appear multiple times. Testing against English patterns, it determines shift value 3 produces the most coherent result:
W→T, K→H, H→E (forming "THE")
T→Q, X→U, L→I, F→C, N→K (forming "QUICK")
Decoded result: "THE QUICK BROWN FOX"
Brute Force Decryption Analysis
Encrypted message: "YHIR VHFUHW ZRUOG"
When auto-detection is inconclusive, brute force decryption reveals all possibilities:
Shift 0: "YHIR VHFUHW ZRUOG" (no change)
Shift 1: "XGQH UGETGV YQTNF" (gibberish)
Shift 2: "WFPG TFDSTS XPSME" (gibberish)
Shift 3: "VERY SECRET WORLD" (readable English!)
The correct shift value 3 becomes immediately apparent among the results.
Handling Corrupted Text
Sometimes Caesar cipher messages contain errors or missing characters. Advanced decoding techniques can still recover the original message through context analysis and partial matching.
Corrupted input: "WKH T?LFN EU?ZQ IRA" Even with missing characters, pattern recognition and frequency analysis can determine the shift value and reconstruct the likely original message.
Choosing the Right Caesar Cipher Decoding Method
Different decoding scenarios call for different approaches, and understanding when to use each method maximizes efficiency and success rates.
When to Use Auto-Detection
Auto-detect Caesar cipher shift works best with:
Messages longer than 50 characters providing sufficient frequency data
Standard English text without excessive abbreviations or technical terms
Clean input with minimal numbers or special characters
Unknown shift values where manual testing would be time-consuming
When to Use Brute Force Decryption
Brute force methods excel in scenarios involving:
Short messages where frequency analysis lacks sufficient data
Mixed language content that confuses auto-detection algorithms
Verification purposes to confirm auto-detection results
Educational demonstrations showing all possible decryptions
When to Use Manual Shift Setting
Manual decoding with known shift values is ideal for:
Educational exercises where the shift is provided
Systematic analysis comparing multiple related messages
Verification of other methods confirming automated results
Specific cipher variants using non-standard shift patterns
Choosing the Right Caesar Cipher Decoding Method
Different decoding scenarios call for different approaches, and understanding when to use each method maximizes efficiency and success rates.
When to Use Auto-Detection
Auto-detect Caesar cipher shift works best with:
Messages longer than 50 characters providing sufficient frequency data
Standard English text without excessive abbreviations or technical terms
Clean input with minimal numbers or special characters
Unknown shift values where manual testing would be time-consuming
When to Use Brute Force Decryption
Brute force methods excel in scenarios involving:
Short messages where frequency analysis lacks sufficient data
Mixed language content that confuses auto-detection algorithms
Verification purposes to confirm auto-detection results
Educational demonstrations showing all possible decryptions
When to Use Manual Shift Setting
Manual decoding with known shift values is ideal for:
Educational exercises where the shift is provided
Systematic analysis comparing multiple related messages
Verification of other methods confirming automated results
Specific cipher variants using non-standard shift patterns
Choosing the Right Caesar Cipher Decoding Method
Different decoding scenarios call for different approaches, and understanding when to use each method maximizes efficiency and success rates.
When to Use Auto-Detection
Auto-detect Caesar cipher shift works best with:
Messages longer than 50 characters providing sufficient frequency data
Standard English text without excessive abbreviations or technical terms
Clean input with minimal numbers or special characters
Unknown shift values where manual testing would be time-consuming
When to Use Brute Force Decryption
Brute force methods excel in scenarios involving:
Short messages where frequency analysis lacks sufficient data
Mixed language content that confuses auto-detection algorithms
Verification purposes to confirm auto-detection results
Educational demonstrations showing all possible decryptions
When to Use Manual Shift Setting
Manual decoding with known shift values is ideal for:
Educational exercises where the shift is provided
Systematic analysis comparing multiple related messages
Verification of other methods confirming automated results
Specific cipher variants using non-standard shift patterns
Common Caesar Cipher Decoding Challenges
Successful Caesar cipher decoding requires awareness of potential obstacles and effective strategies for overcoming them.
Short Message Limitations
Caesar cipher decoding becomes more difficult with shorter encrypted messages because frequency analysis lacks sufficient data. Messages under 20 characters may require brute force examination of all possible shifts to identify the correct plaintext.
Non-English Text Complications
Caesar cipher decoders optimized for English may struggle with text in other languages due to different letter frequency patterns. When decoding non-English Caesar ciphers, consider:
Language-specific frequency tables
Different common letter patterns
Accent marks and special characters
Cultural context for word recognition
Multiple Shift Values
While classical Caesar cipher uses a single shift value throughout the message, some modern variations employ multiple shifts. These hybrid systems require more sophisticated decoding approaches beyond standard Caesar cipher analysis.
Common Caesar Cipher Decoding Challenges
Successful Caesar cipher decoding requires awareness of potential obstacles and effective strategies for overcoming them.
Short Message Limitations
Caesar cipher decoding becomes more difficult with shorter encrypted messages because frequency analysis lacks sufficient data. Messages under 20 characters may require brute force examination of all possible shifts to identify the correct plaintext.
Non-English Text Complications
Caesar cipher decoders optimized for English may struggle with text in other languages due to different letter frequency patterns. When decoding non-English Caesar ciphers, consider:
Language-specific frequency tables
Different common letter patterns
Accent marks and special characters
Cultural context for word recognition
Multiple Shift Values
While classical Caesar cipher uses a single shift value throughout the message, some modern variations employ multiple shifts. These hybrid systems require more sophisticated decoding approaches beyond standard Caesar cipher analysis.
Common Caesar Cipher Decoding Challenges
Successful Caesar cipher decoding requires awareness of potential obstacles and effective strategies for overcoming them.
Short Message Limitations
Caesar cipher decoding becomes more difficult with shorter encrypted messages because frequency analysis lacks sufficient data. Messages under 20 characters may require brute force examination of all possible shifts to identify the correct plaintext.
Non-English Text Complications
Caesar cipher decoders optimized for English may struggle with text in other languages due to different letter frequency patterns. When decoding non-English Caesar ciphers, consider:
Language-specific frequency tables
Different common letter patterns
Accent marks and special characters
Cultural context for word recognition
Multiple Shift Values
While classical Caesar cipher uses a single shift value throughout the message, some modern variations employ multiple shifts. These hybrid systems require more sophisticated decoding approaches beyond standard Caesar cipher analysis.
Educational Benefits of Caesar Cipher Decoding
Learning Caesar cipher decoding provides valuable insights into cryptanalysis principles that apply to more advanced encryption systems.
Building Analytical Thinking Skills
Caesar cipher decoding exercises develop:
Pattern recognition abilities identifying recurring structures
Logical reasoning skills testing hypotheses systematically
Mathematical understanding applying modular arithmetic concepts
Problem-solving persistence working through multiple approaches
Understanding Cryptographic Weaknesses
Studying how to break Caesar cipher reveals fundamental security principles:
Key space limitations demonstrating why 25 possibilities aren't secure
Frequency analysis vulnerabilities showing pattern preservation problems
Brute force attack feasibility illustrating computational complexity concepts
Historical context connecting classical and modern cryptography
Educational Benefits of Caesar Cipher Decoding
Learning Caesar cipher decoding provides valuable insights into cryptanalysis principles that apply to more advanced encryption systems.
Building Analytical Thinking Skills
Caesar cipher decoding exercises develop:
Pattern recognition abilities identifying recurring structures
Logical reasoning skills testing hypotheses systematically
Mathematical understanding applying modular arithmetic concepts
Problem-solving persistence working through multiple approaches
Understanding Cryptographic Weaknesses
Studying how to break Caesar cipher reveals fundamental security principles:
Key space limitations demonstrating why 25 possibilities aren't secure
Frequency analysis vulnerabilities showing pattern preservation problems
Brute force attack feasibility illustrating computational complexity concepts
Historical context connecting classical and modern cryptography
Educational Benefits of Caesar Cipher Decoding
Learning Caesar cipher decoding provides valuable insights into cryptanalysis principles that apply to more advanced encryption systems.
Building Analytical Thinking Skills
Caesar cipher decoding exercises develop:
Pattern recognition abilities identifying recurring structures
Logical reasoning skills testing hypotheses systematically
Mathematical understanding applying modular arithmetic concepts
Problem-solving persistence working through multiple approaches
Understanding Cryptographic Weaknesses
Studying how to break Caesar cipher reveals fundamental security principles:
Key space limitations demonstrating why 25 possibilities aren't secure
Frequency analysis vulnerabilities showing pattern preservation problems
Brute force attack feasibility illustrating computational complexity concepts
Historical context connecting classical and modern cryptography
FAQ
Frequently Asked Questions
How can I decode a Caesar cipher when I don't know the shift value?
What's the difference between auto-detect and brute force Caesar cipher decoding?
Why does my Caesar cipher decoder show multiple readable results?
What should I do when Caesar cipher decoding produces unreadable results?
Which programming languages require Pascal Case naming conventions?
FAQ
Frequently Asked Questions
How can I decode a Caesar cipher when I don't know the shift value?
What's the difference between auto-detect and brute force Caesar cipher decoding?
Why does my Caesar cipher decoder show multiple readable results?
What should I do when Caesar cipher decoding produces unreadable results?
Which programming languages require Pascal Case naming conventions?
FAQ