33:
171:
His interest in cryptography stems from his boyhood, as did his interest in mathematics. By junior high he was inventing his own ciphers and challenging his father, entomologist Lorin
Gillogly, to solve them.
61:
277:
who had hoped the message could prove that the dead could communicate with the living. Gillogly wrote his own software to decipher the text, which was in a variant of the
268:
website, they report that he has been called "arguably the best non-government cryptanalyst in the U.S." in the field of classical (historical) cryptosystems.
311:, 1990, Rand Corporation, co-written with Ron D. Hays, Robert M. Bell, Laural A. Hill, Matthew W. Lewis, Grant N. Marshall, Ronald Nicholas, Gordon Marlatt
485:
248:
He is best known for his work solving or debunking some of the world's most famous unsolved codes. In 1980 he wrote a paper on unusual strings in the
236:
Gillogly was one of the earliest authors of personal computer software, writing utility programs, games and a computerized cookbook published by the
65:
556:
328:
338:
323:
223:. He has written several articles about technology and cryptography, is currently the editor of the "Cipher Exchange" column for
41:
115:
561:
546:
87:
309:"The impact of response options and location in a microcomputer interview on drinking drivers' alcohol use self-reports"
94:
417:
134:
571:
541:
432:
230:
225:
101:
252:, and he received international media attention for being the first person to publicly solve parts 1-3 on the
319:
463:
83:
504:
385:
357:
265:
520:
196:
57:
509:
474:
184:
46:
17:
180:
50:
551:
108:
566:
290:
452:
8:
490:
274:
261:
237:
207:, with his dissertation titled "Performance Analysis of the Technology Chess Program".
151:
496:
390:
260:
sculpture in 1999. He also coordinates a large mailing list about the ciphers in the
220:
386:"UMGTN CMGVP TLGE RVGB : (The Solution to This Headline Is at Bottom of Story)"
468:
278:
72:
412:
525:
514:
535:
249:
155:
521:"CIA Releases Analyst’s Fascinating Tale of Cracking the Kryptos Sculpture"
479:
308:
302:
204:
475:"Interest grows in solving cryptic CIA puzzle after link to Da Vinci Code"
269:
303:
Exploratory modeling: search through spaces of computational experiments"
296:
457:
179:
programming language in 1970, and in 1977 he ported the code for "
257:
176:
71:
from the article and its talk page, especially if potentially
200:
379:
377:
375:
373:
216:
253:
370:
510:"Mission Impossible: The Code Even the CIA Can't Crack"
219:, specializing in system design and development, and
405:
533:
486:"Swedish team beats code to win 10,000 pounds"
175:Gillogly wrote a chess-playing program in the
273:In 1995 he deciphered a text enciphered by
215:Gillogly worked as a computer scientist at
64:about living persons that is unsourced or
339:"Ciphertext-Only Cryptanalysis of Enigma"
135:Learn how and when to remove this message
329:"The Beale Cipher: A Dissenting Opinion"
203:in computer science. He was advised by
14:
534:
464:"Cracking the Code of a CIA Sculpture"
314:"The Technology Chess Program", 1972,
383:
284:
26:
433:"BUSS Newsletter #21, January 1980"
150:(born 5 March 1946) is an American
24:
499:, by Jim Gillogly; November 2000,
25:
583:
557:Carnegie Mellon University alumni
446:
418:The Mathematics Genealogy Project
291:Articles by Gillogly at rand.org
243:
31:
453:"Solving the Enigma of Kryptos"
231:American Cryptogram Association
425:
13:
1:
384:Pool, Bob (5 November 1995).
363:
318:, Volume 3, pp. 145–163
166:
297:MAX: A FORTRAN Chess Player"
190:
161:
42:biography of a living person
7:
562:American technology writers
547:Recreational cryptographers
358:Cryptanalysis of the Enigma
351:
229:, and was president of the
69:must be removed immediately
10:
588:
324:Cryptograms from the Crypt
197:Carnegie Mellon University
210:
572:American cryptographers
542:Writers from California
497:"Decoding Nazi Secrets"
316:Artificial Intelligence
56:Please help by adding
345:, Volume 19, Number 4
199:in 1978, receiving a
488:, October 12, 2000,
455:, January 21, 2005,
335:, Volume 4, Number 2
305:, 1994, RAND Reprint
62:Contentious material
491:The Daily Telegraph
240:beginning in 1980.
512:, April 20, 2009,
299:, 1970, RAND Paper
293:, 1970–1994
275:Robert H. Thouless
262:Voynich Manuscript
238:Software Toolworks
195:He graduated from
183:" from Fortran to
152:computer scientist
477:, June 11, 2005,
391:Los Angeles Times
285:Selected articles
221:computer security
148:James J. Gillogly
145:
144:
137:
119:
45:needs additional
16:(Redirected from
579:
523:, June 5, 2013,
440:
439:
437:
429:
423:
422:
413:"James Gillogly"
409:
403:
402:
400:
398:
381:
341:, October 1995,
140:
133:
129:
126:
120:
118:
84:"James Gillogly"
77:
58:reliable sources
35:
34:
27:
21:
587:
586:
582:
581:
580:
578:
577:
576:
532:
531:
469:Washington Post
449:
444:
443:
435:
431:
430:
426:
411:
410:
406:
396:
394:
382:
371:
366:
354:
287:
279:playfair cipher
246:
213:
193:
169:
164:
141:
130:
124:
121:
78:
76:
55:
36:
32:
23:
22:
15:
12:
11:
5:
585:
575:
574:
569:
564:
559:
554:
549:
544:
530:
529:
526:Wired Magazine
518:
515:Wired Magazine
507:
494:
483:
472:
461:
448:
447:External links
445:
442:
441:
424:
404:
368:
367:
365:
362:
361:
360:
353:
350:
349:
348:
347:
346:
336:
331:, April 1980,
326:
321:
312:
306:
300:
286:
283:
245:
242:
226:The Cryptogram
212:
209:
192:
189:
168:
165:
163:
160:
143:
142:
66:poorly sourced
39:
37:
30:
9:
6:
4:
3:
2:
584:
573:
570:
568:
565:
563:
560:
558:
555:
553:
552:Living people
550:
548:
545:
543:
540:
539:
537:
528:
527:
522:
519:
517:
516:
511:
508:
506:
502:
498:
495:
493:
492:
487:
484:
482:
481:
476:
473:
471:
470:
466:, July 1999,
465:
462:
460:
459:
454:
451:
450:
434:
428:
420:
419:
414:
408:
393:
392:
387:
380:
378:
376:
374:
369:
359:
356:
355:
344:
340:
337:
334:
330:
327:
325:
322:
320:
317:
313:
310:
307:
304:
301:
298:
295:
294:
292:
289:
288:
282:
280:
276:
271:
270:
267:
263:
259:
255:
251:
250:Beale Ciphers
244:Cryptanalysis
241:
239:
234:
232:
228:
227:
222:
218:
208:
206:
202:
198:
188:
186:
182:
181:Colossal Cave
178:
173:
159:
157:
156:cryptographer
153:
149:
139:
136:
128:
117:
114:
110:
107:
103:
100:
96:
93:
89:
86: –
85:
81:
80:Find sources:
74:
70:
67:
63:
59:
53:
52:
48:
43:
38:
29:
28:
19:
524:
513:
500:
489:
480:The Guardian
478:
467:
456:
438:. p. 2.
427:
416:
407:
395:. Retrieved
389:
342:
332:
315:
272:
247:
235:
224:
214:
205:Allen Newell
194:
174:
170:
147:
146:
131:
122:
112:
105:
98:
91:
79:
68:
51:verification
44:
567:1946 births
501:NOVA Online
343:Cryptologia
333:Cryptologia
536:Categories
458:Wired News
364:References
264:. On the
167:Early life
95:newspapers
191:Education
162:Biography
47:citations
397:11 March
352:See also
125:May 2009
73:libelous
18:Gillogly
258:Kryptos
177:Fortran
109:scholar
211:Career
111:
104:
97:
90:
82:
436:(PDF)
201:Ph.D.
116:JSTOR
102:books
40:This
399:2018
217:RAND
154:and
88:news
49:for
505:PBS
503:,
266:PBS
256:'s
254:CIA
538::
415:.
388:.
372:^
281:.
233:.
187:.
158:.
60:.
421:.
401:.
185:C
138:)
132:(
127:)
123:(
113:·
106:·
99:·
92:·
75:.
54:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.