Download: My C.V. - Higher Technological Institute

advertisement
Talaat Abdel Latief Ibrahim El Garf
:::: Personal Data:
Birth Date:
Place of Birth:
Nationality:
Marital Status:
Home address:
E-Mail
Home Telephone:
Languages:
22-12-1953
Telwana-Menofia- Egypt
Egyptian
Married and have three sons
136 El-Tawfik city, Apt.81,
Nasr city,Cairo, Egypt
talaatelgarf@yahoo.com
0224039406 Cairo,
010-5103831
Mother Language: Arabic
English: Written: Excellent
Spoken: Very good
:::: Current Position :
 Now Associate Professor of Communications in HTI
(Higher Technological Institute) Since 2005.
:::: Academic Qualifications:
Ph.D.
Thesis Title
M.SC.
Thesis Title
DIPLOMA
B.SC.
In Electrical Engineering from the faculty of
Engineering, Ain Shams university, 1993.
Digital Communications Security Systems
“Cryptanalysis of Applied Linear and Nonlinear
Stream Ciphers”
In Electrical Engineering from the faculty of
Engineering , Ain Shams university, 1990.
Speech Security Systems “ Analysis of Stream Cipher
Systems”
In Antenna and Wave Propagation in “Adaptive
Arrays” from the Military Technical College, Cairo,
Egypt, 1980.
In Electrical Engineering (Communications), from the
Military Technical College, Cairo, Egypt, 1976.
1
:::: Teaching Experience:
 Courses taught to 10th of Ramadan City HTI (Higher Technological
Institute)











Analog and Digital Communication Systems.
Communication Systems.
Digital Communications I.
Digital Communications II.
Sampled Data Systems.
Electric Circuits.
Secure Communications.
Practical Communication Systems.
Communication Systems LAB.
Electrical Engineering LAB ( LAB A/ LAB B/ LAB C)
Graduation Projects and supervision on Practical Training.
 Courses taught to CIC (Canadian International College):
- Communication Systems I.
- Communication Systems II.
- Graduation Projects.
 Courses taught to Technical Institute of the Armed Forces:
 Modulation and Demodulation Techniques.
 Digital and Analog Communication Systems.
 Radio Communication Systems.
 Courses taught to Signal Institute of the Armed Forces:
 Antennas and Wave Propagation.
 Wireless Communications.
 Communication Security Systems.
 Courses taught to MTC (Military Technical College):
 Basic courses in the field of "Technology of
Cryptography and Telecommunications"
2
:::: Range of Experience:
30 years in Communications and Communications Security fields including:










Maintenance of Radio and Comsec Equipment.
Planning of Secured Modern communication Systems.
Analysis of Cipher Systems and Assessment of Security level.
Design and Implementation of Cipher Systems for securing Digital
Communication Systems.
Upgrading existing Cipher systems to increase their security level.
Key Management (Key Generation- Key Distribution-Key Loading- Key
Selection-Key Erase) of different Security Communication Systems.
Participated in technical researches, feasibility studies and evaluation of
variety of communication projects.
Teaching in Egyptian universities and supervision on M.SC and PhD
theses.
Teaching in MTC (Military Technical College) for the basic courses in
the field of “Communications and Cipher Technology”.
Program manager of the project” Transfer of Know-How in the field of
Cryptography” in co-operation with the French Government.
:::: Basic and advanced courses (Abroad):
 Course of study in "Technology and Operation of Cryptographic/ Phonic
Theory", Fed.Rep.of Germany, 1983.
 Training and maintenance course in "Data Encryptors ", USA, 1988.
 Advanced Cryptographic training course on" Analysis of Data
Encryptors" .
 Operation and Maintenance training course in "Radio Communications
Security",USA,1994.
 Training course in "DSP workstations",USA,1996.
 Participation with TCC(Technical Communications Corporation) experts.
in the Design and Implementation of the ARE Crypto Algorithm,
USA,1998.
 Transfer of Know-How and Customization of Comsec Algorithm
implemented in Frequency Hopping Equipment, France,1999.
3
:::: Area of special interest:




Communication Systems (Analog and Digital).
Speech Security Systems.
Digital Communication Security Systems.
Design and Implementation of Cipher
Communication Networks.
Systems
in
different
:::: Research Activities:
 Published (14) papers in the areas of Communications and
Communication Security.
 A member of ICT since 2005 (Information and Communications
Technology) Research Council of ASRT (Academy of Scientific Research
&Technology), “Networks and Communications Services Department”.
 A member of the Committee for preparing “The National Plan for Data
Security Projects” related to ASRT.
 Upgrade of Bulk Encryptors applied in Microwave and Data links.
 Design and Implementation of Block Cipher Systems applied in
Communication Networks.
 Design and Implementation of secure Message Handling Systems.
 Design and Implementation of test units for the maintenance of
Comsec equipment.
 Design of Software Packages for the assessment of Security Level of
Cipher Systems.
 Upgrade of modern cipher systems in Radio Frequency Hopping
Equipment.

:::: Supervised Thesis:
 Supervision on (4) M.Sc theses in the faculty of Engineering ,
Ein Shams University :
 “ Key Management of Cryptographic Systems, Automatic
Key Management”, 1995.
 “ Data Communications Ciphering Systems, Analysis of
Block Cipher Systems”, 2000.
 “Design and Implementation of a Nonlinear Stream Cipher
Algorithm”,2008
 "Secure Vocoding Techniques", 2009.
 Supervision on (2) Ph.D. theses in the faculty of Engineering,
Ein Shams University under the titles “Secure VoIP Networks”,
2012 and ” Analysis of secure hybrid speech coding systems”,
2013.
4
:::: List of publications:
 Y.A.Abou Kresha, T.A.EL GARF,
and
N.H.
Shaker,
"Security Level of
Time
Element
Speech
Scrambling Techniques" The Eighth National Radio
Science Conference, 19-21 February, 1991, Cairo,
Egypt.
Absract:
Time element Scrambling technique is considered the most
famous technique still applied in one dimensional and two
dimensional scramblers. We shall deal in this paper with the main
parameters affecting this scrambling technique including choice of
segment length, choice of frame length and choice of good
permutations. Finally we shall discuss the security level of time
element scrambling technique in the face of the varios cryptanalyst’s
attacks.
 Y.A. Abou Kresha and T.A.EL GARF "Maximum
Time Before Base Key Variation Depending on the
Message Key Length", The Eighth National Radio
Science Conference, 19-21 February, 1991, Cairo,
Egypt.
Abstract:
In this paper, we clarify the role of message key in
straightforward stream cipher systems and present a simple method to
calculate the maximum time after which the base key must be
changed depending upon the size of our message key and the required
number of plain messages to be enciphered with different parts of our
enciphering sequence.
 Y.A. Abou Kresha and T.A.EL GARF, " A New Attack
for Cryptanalyzing RKG Cryptosystems", The
Eleventh National Radio Science Conference, 22-24
march, 1994, Cairo, Egypt.
Absract:
The Running Key Generator (RKG) is the best known and
most widely used cryptosystem for synchronous stream cipher
systems. In this paper we develop a new type of cryptanalytic
attack which can break RKG faster than an exhaustive search
attack.
5
 N.Saleh and T.A.El GARF, " Analysis of Linear and
Nonlinear Synchronous Stream Ciphers", The Eleventh
National Radio Science Conference, 22-24 March, 1994,
Cairo, Egypt.
Absract:
In this paper we present new technique to analyze linear and
nonlinear synchronous strem ciphers depending on the known
plaintext approach.
 T.A. EL GARF, " Security of Modern Communications
Systems", The First International Conference of
Electrical Engineering in Military Technical College,
ICEENG98, 24-26 March, 1998, Cairo, Egypt.
Abstract:
In this paper a comparison study is presented concrning the
security aspects of modern cipher systems applied in advanced
communication systems.
 S.H. EL Ramly, T.A.EL GARF and A.H. Soliman,
" Dynamic Generation of S-Boxes In Block Cipher
Systems", The Eighteenth National Radio Science
Conference, 27-29 March 2001, Mansoura University,
Egypt.
Abstract:
Block cipher systems are widely used in cryptographic
applications. The main problem in implementing any block cipher
systems is the fixed stucture of S-boxes elements. In this paper we
present a new method to build up dynamic look up tables (S-boxes)
changing with every change of the secret key in addition to an
evaluation criterion of block ciphers. This new approach will lead to
build up more secure block cipher systems and consequently solve the
problem of the fixed sructure block ciphers.
6
 T.A.Elgarf, A.Zekry and Eman Mahmoud,” Security of
vocoding techniques”,AEIC 2010, 21-23 December
2010,El Azhar University, Cairo, Egypt.
Abstract:
This paper includes two main parts, the first deals with the design and
implementation of LPC-10 Vocoder where some improvements are applied to
the existing standard FS 1015 LPC-10 algorithm to increase the resulting speech
quality. Speech signal is subdivided into 40 msec windows with 10 msec
overlap used to remove discontinuity between any two adjacent windows. The
accuracy of pitch estimation is improved by applying some preprocessing steps.
The second part of this paper deals with the design and implementation of a
proposed nonlinear steam cipher algorithm to encrypt the output of the LPC
Vocoder. We applied the standard NIST package to assess the randomness
properties and security parameters of the proposed algorithm. Other security
parameters of the algorithm are calculated like key diversity, period and linear
complexity.
 T.A.Elgarf, H.Elsheikh and A.Zekry, ” A new approach
for designing key-dependent S-box defined over GF(24)
in AES”, proc.of IEEE 2011 International Conference
on Information and Computer Applications (ICICA),
Dubai, UAE, March 18-20, 2011, pp.149-155 .
(Also published in International Journal of Computer
Theory and Engineering (IJCTE)Vol. 4, April 2012)
Abstract:
In this paper a new approach for designing S-box in Advanced Encryption Standard
(AES) is proposed. The proposed S-box is constructed from small S-boxes defined over GF
(24) instead of GF (28) as in traditional AES. Rijndael Algorithm (RA), as one of AES
standards, is modified by applying the new approach. The Modified Rijndael Algorithm
(MRA) is constructed by replacing the S-box of RA by small S-boxes, and the key expansion
procedure of RA is modified consequently. The MRA is tested using avalanche effect and
strict avalanche criterion (SAC) to evaluate security. The performance evaluation is calculated
and proved that MRA is more suitable for the applications that require security and QoS such
as voice over IP (VoIP).
7
 T.A.Elgarf, Hanem M. El-Sheikh, Omayma A.ElMohsen, and Abdelhalim Zekry, „Efficient Hardware
Implementation Technique for key-dependent S-box
defined over GF(24) in AES” proc. of IEEE 2011
International Conference of Information Theory and
Information Security (ICITIS 2011), November 4-6,
2011 Hangzhou, zchina, pp. 309-314.
 Also, chosen for the best paper award in this coference
(ICITIS 2011).
 Eman M.Mahmoud, Abdelhafez, Talaat Abdellatief El
garf and Abdelhalim Zekry „ Implementation and
evaluation of variable bit rates CELP Coder, ICCES (
International Conference on Computer Engineering
and Systems), Cairo, Egypt, November 2012.
Abstract:
This paper describes the implementation of variable bit rate speech coder and
tests the behavior and the quality of it.
 Eman M.Mahmoud, Abdelhafez, Talaat Abdellatief El
garf and Abdelhalim Zekry „ Dynamic AES-128 with
key-Depndent S-box” IJERA (International Journal of
Engineering Research and Applications)3,No.1 January
2013: 1660-1670.
Abstract:
This paper describes a new dynamic AES algorithm to increase the
cryptanalysis hacking immunity.
 Eman M.Mahmoud, Abdelhafez, Talaat Abdellatief El
garf and Abdelhalim Zekry „Enhancing Channel
Coding using AES Block Cipher”, (IJCA) International
Journal of Computer Applications 61, No.6, 2013, pp.
28:33, January, 2013.
Absract:
This paper describes a new efficient method to improve channel coding gain in
speech codec.
8
 T.A Elgarf, Eslam Samy and Mohamed Fouad,
„Evaluation Criterion to asses the quality performance
0f advanced hybrid speech coding techniques”,
International Journal of Computer Science and
Technology(IJCST), vol. 4, Issue 3, pp. 7-12, September
2013.
 T.A.Elgarf, M.A.Rashed, H.A Elmotaafy and
I.F.Tarrad, „The effect of weight factor on the
performance of G.729A speech coder”, International
journal
of
Engineering
Science&Emerging
Technologies, Vol.6, Issue 1, pp. 1-8, August 2013.
9
Download