<h1 style="box-sizing: inherit; clear: both; font-weight: 700; margin: 0px 0px 1.05em; text-rendering: optimizelegibility; font-family: Montserrat, "Helvetica Neue", sans-serif; font-size: 2.5rem; line-height: 1.225; color: rgb(26, 26, 26); font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-style: initial; text-decoration-color: initial;"><span style="font-family: arial, sans-serif;"><span style="font-size: 14px">I pray this email finds all of you well! I apologize for my previous incomplete email. Some of my recent posts regarding ParrotTalk plans & development on my new blog Callisto House LLC. You may find the origins & intention of Callisto House, described in the <a rel="nofollow" title="http://callistohouse.club/index.php/about/" target="_blank" href="http://callistohouse.club/index.php/about/">About page</a>, interesting background. The caching is getting confused, looking into that.<br><br><a rel="nofollow" title="http://callistohouse.club/index.php/2019/06/08/thoughts-of-the-great-internet-war-over-the-right-to-privacy-in-data-in-motion-encryption/" target="_blank" href="http://callistohouse.club/index.php/2019/06/08/thoughts-of-the-great-internet-war-over-the-right-to-privacy-in-data-in-motion-encryption/">Thoughts of the great internet war over the right to privacy during data-in-motion encryption</a><br></span></span><span style="font-size: 14px"><span style="font-family: arial, sans-serif;"><a rel="nofollow" title="http://callistohouse.club/index.php/2019/06/07/the-logic-behind-parrottalk/" target="_blank" href="http://callistohouse.club/index.php/2019/06/07/the-logic-behind-parrottalk/">The logic behind ParrotTalk</a></span></span><a rel="nofollow" title="http://callistohouse.club/index.php/2019/06/07/the-logic-behind-parrottalk/" target="_blank" href="http://callistohouse.club/index.php/2019/06/07/the-logic-behind-parrottalk/"><br></a><span style="font-family: arial, sans-serif;"><span style="font-size: 14px"><a rel="nofollow" title="http://callistohouse.club/index.php/2019/06/08/redesigning-parrottalk-for-automated-protocol-selection/" target="_blank" href="http://callistohouse.club/index.php/2019/06/08/redesigning-parrottalk-for-automated-protocol-selection/">PAPAS – Redesigning ParrotTalk for Automated Protocol Analyzer & Selector…</a></span></span></h1><div><span style="font-family: arial, sans-serif;"><span style="font-size: 14px">The reason I intended to write you is a request for the modernization of Cryptography assistance. In reading about TLS 1.3 [1], I read somewhere in its rfc [2], a discussion of negotiable Diffie-Hellman variants, using Elliptical algorithms. I do not believe we have such DH algorithms impl&tested, do we? There may be more specialized algorithms in use with TLS .13, as well. I have not looked deeply. As well, there is SHA512. The last item I have noticed is that the Blowfish cipher is not subclassing the hierarchy of Ciphers and so is not fully integrated into the Cryptography framework.  I am requesting that those few brilliant cryptologists who have helped to implement all of our Algorithms, take a look at new algorithms/port Blowfish and help to impl&test them, in an effort to modernize. <br><br>I truly feel that our Cryptography repository, aside from all the crap I have published, is filled with a wonderful tested implementation of many useful Cryptographic algorithms. I am hoping thaose few of you may consider this request graciously and dust off your chops. And dive in, so I may be able to implement TLS 1.3, for us. In particular, I would refer you to my blog post linked above titled PAPAS.<br></span></span><br>Also, in browsing Signal's code [3], there seems to be some interesting algorithms implemented there, including an ECPublicKey and ECPrivateKey, and an HKDF. I am considering implementing Moxie Marlinspike's double-rachet in ParrotTalk. I have no idea whether these would be useful, it seems that they may be.<br><br>I am fully engaged with PAPAS and would love to actually be able to use this new stuff without having to implement them myself. I appreciate you and all that you have done. Cryptography is baby's milk.<br><br></div><div class="protonmail_signature_block"><div class="protonmail_signature_block-user"><div>Kindly & many thanks for your consideration of participation,<br></div><div>Robert<br></div></div><div class="protonmail_signature_block-proton protonmail_signature_block-empty"><br></div></div><div><div><br></div><div><div>[1] IETF's TLS 1.3 blog -  <a href="https://www.ietf.org/blog/tls13/">https://www.ietf.org/blog/tls13/</a><br></div><div>[2] TLS 1.3 RFC - <a href="https://tools.ietf.org/html/rfc8446">https://tools.ietf.org/html/rfc8446</a><br></div><div><div>[3] libsignal-protocol-java - <a href="https://github.com/signalapp/libsignal-protocol-java">https://github.com/signalapp/libsignal-protocol-java</a></div><br></div><div>‐‐‐‐‐‐‐ Original Message ‐‐‐‐‐‐‐<br></div></div></div><div> On Sunday, June 9, 2019 5:36 PM, Robert <robert.withers@protonmail.com> wrote:<br></div><div> <br></div><blockquote class="protonmail_quote" type="cite"><div><div>Some recent posts to my blog regarding ParrotTalk :::<br></div></div><h1 style="box-sizing: inherit; clear: both; font-weight: 700; margin: 0px 0px 1.05em; text-rendering: optimizelegibility; font-family: Montserrat, "Helvetica Neue", sans-serif; font-size: 2.5rem; line-height: 1.225; color: rgb(26, 26, 26); font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-style: initial; text-decoration-color: initial;"><span style="font-family:arial, sans-serif"><span style="font-size:14px">Thoughts of the great internet war over the right to privacy during data-in-motion encryption</span></span><br></h1><div><div><a rel="noreferrer nofollow noopener" target="_blank" href="http://callistohouse.club/index.php/2019/06/07/the-logic-behind-parrottalk/">http://callistohouse.club/index.php/2019/06/07/the-logic-behind-parrottalk/</a><br></div></div><div><div><a rel="noreferrer nofollow noopener" target="_blank" href="http://callistohouse.club/index.php/2019/06/08/redesigning-parrottalk-for-automated-protocol-selection/">http://callistohouse.club/index.php/2019/06/08/redesigning-parrottalk-for-automated-protocol-selection/</a><br></div><div><a rel="noreferrer nofollow noopener" target="_blank" href="http://callistohouse.club/index.php/2019/06/08/thoughts-of-the-great-internet-war-over-the-right-to-privacy-in-data-in-motion-encryption/">http://callistohouse.club/index.php/2019/06/08/thoughts-of-the-great-internet-war-over-the-right-to-privacy-in-data-in-motion-encryption/</a><br></div></div><div class="protonmail_signature_block"><div class="protonmail_signature_block-user"><div><div><br></div></div></div></div><div><br></div><div class="protonmail_signature_block"><div class="protonmail_signature_block-user"><div>Kindly,<br></div><div>Robert<br></div></div><div class="protonmail_signature_block-proton protonmail_signature_block-empty"><br></div></div><div><br></div></blockquote><div><br></div>