Talaat Abdel Latief Ibrahim El Garf :::: Personal Data: Birth Date: Place of Birth: Nationality: Marital Status: Home address: E-Mail Home Telephone: Languages: 22-12-1953 Telwana-Menofia- Egypt Egyptian Married and have three sons 136 El-Tawfik city, Apt.81, Nasr city,Cairo, Egypt talaatelgarf@yahoo.com 0224039406 Cairo, 010-5103831 Mother Language: Arabic English: Written: Excellent Spoken: Very good :::: Current Position : Now Associate Professor of Communications in HTI (Higher Technological Institute) Since 2005. :::: Academic Qualifications: Ph.D. Thesis Title M.SC. Thesis Title DIPLOMA B.SC. In Electrical Engineering from the faculty of Engineering, Ain Shams university, 1993. Digital Communications Security Systems “Cryptanalysis of Applied Linear and Nonlinear Stream Ciphers” In Electrical Engineering from the faculty of Engineering , Ain Shams university, 1990. Speech Security Systems “ Analysis of Stream Cipher Systems” In Antenna and Wave Propagation in “Adaptive Arrays” from the Military Technical College, Cairo, Egypt, 1980. In Electrical Engineering (Communications), from the Military Technical College, Cairo, Egypt, 1976. 1 :::: Teaching Experience: Courses taught to 10th of Ramadan City HTI (Higher Technological Institute) Analog and Digital Communication Systems. Communication Systems. Digital Communications I. Digital Communications II. Sampled Data Systems. Electric Circuits. Secure Communications. Practical Communication Systems. Communication Systems LAB. Electrical Engineering LAB ( LAB A/ LAB B/ LAB C) Graduation Projects and supervision on Practical Training. Courses taught to CIC (Canadian International College): - Communication Systems I. - Communication Systems II. - Graduation Projects. Courses taught to Technical Institute of the Armed Forces: Modulation and Demodulation Techniques. Digital and Analog Communication Systems. Radio Communication Systems. Courses taught to Signal Institute of the Armed Forces: Antennas and Wave Propagation. Wireless Communications. Communication Security Systems. Courses taught to MTC (Military Technical College): Basic courses in the field of "Technology of Cryptography and Telecommunications" 2 :::: Range of Experience: 30 years in Communications and Communications Security fields including: Maintenance of Radio and Comsec Equipment. Planning of Secured Modern communication Systems. Analysis of Cipher Systems and Assessment of Security level. Design and Implementation of Cipher Systems for securing Digital Communication Systems. Upgrading existing Cipher systems to increase their security level. Key Management (Key Generation- Key Distribution-Key Loading- Key Selection-Key Erase) of different Security Communication Systems. Participated in technical researches, feasibility studies and evaluation of variety of communication projects. Teaching in Egyptian universities and supervision on M.SC and PhD theses. Teaching in MTC (Military Technical College) for the basic courses in the field of “Communications and Cipher Technology”. Program manager of the project” Transfer of Know-How in the field of Cryptography” in co-operation with the French Government. :::: Basic and advanced courses (Abroad): Course of study in "Technology and Operation of Cryptographic/ Phonic Theory", Fed.Rep.of Germany, 1983. Training and maintenance course in "Data Encryptors ", USA, 1988. Advanced Cryptographic training course on" Analysis of Data Encryptors" . Operation and Maintenance training course in "Radio Communications Security",USA,1994. Training course in "DSP workstations",USA,1996. Participation with TCC(Technical Communications Corporation) experts. in the Design and Implementation of the ARE Crypto Algorithm, USA,1998. Transfer of Know-How and Customization of Comsec Algorithm implemented in Frequency Hopping Equipment, France,1999. 3 :::: Area of special interest: Communication Systems (Analog and Digital). Speech Security Systems. Digital Communication Security Systems. Design and Implementation of Cipher Communication Networks. Systems in different :::: Research Activities: Published (14) papers in the areas of Communications and Communication Security. A member of ICT since 2005 (Information and Communications Technology) Research Council of ASRT (Academy of Scientific Research &Technology), “Networks and Communications Services Department”. A member of the Committee for preparing “The National Plan for Data Security Projects” related to ASRT. Upgrade of Bulk Encryptors applied in Microwave and Data links. Design and Implementation of Block Cipher Systems applied in Communication Networks. Design and Implementation of secure Message Handling Systems. Design and Implementation of test units for the maintenance of Comsec equipment. Design of Software Packages for the assessment of Security Level of Cipher Systems. Upgrade of modern cipher systems in Radio Frequency Hopping Equipment. :::: Supervised Thesis: Supervision on (4) M.Sc theses in the faculty of Engineering , Ein Shams University : “ Key Management of Cryptographic Systems, Automatic Key Management”, 1995. “ Data Communications Ciphering Systems, Analysis of Block Cipher Systems”, 2000. “Design and Implementation of a Nonlinear Stream Cipher Algorithm”,2008 "Secure Vocoding Techniques", 2009. Supervision on (2) Ph.D. theses in the faculty of Engineering, Ein Shams University under the titles “Secure VoIP Networks”, 2012 and ” Analysis of secure hybrid speech coding systems”, 2013. 4 :::: List of publications: Y.A.Abou Kresha, T.A.EL GARF, and N.H. Shaker, "Security Level of Time Element Speech Scrambling Techniques" The Eighth National Radio Science Conference, 19-21 February, 1991, Cairo, Egypt. Absract: Time element Scrambling technique is considered the most famous technique still applied in one dimensional and two dimensional scramblers. We shall deal in this paper with the main parameters affecting this scrambling technique including choice of segment length, choice of frame length and choice of good permutations. Finally we shall discuss the security level of time element scrambling technique in the face of the varios cryptanalyst’s attacks. Y.A. Abou Kresha and T.A.EL GARF "Maximum Time Before Base Key Variation Depending on the Message Key Length", The Eighth National Radio Science Conference, 19-21 February, 1991, Cairo, Egypt. Abstract: In this paper, we clarify the role of message key in straightforward stream cipher systems and present a simple method to calculate the maximum time after which the base key must be changed depending upon the size of our message key and the required number of plain messages to be enciphered with different parts of our enciphering sequence. Y.A. Abou Kresha and T.A.EL GARF, " A New Attack for Cryptanalyzing RKG Cryptosystems", The Eleventh National Radio Science Conference, 22-24 march, 1994, Cairo, Egypt. Absract: The Running Key Generator (RKG) is the best known and most widely used cryptosystem for synchronous stream cipher systems. In this paper we develop a new type of cryptanalytic attack which can break RKG faster than an exhaustive search attack. 5 N.Saleh and T.A.El GARF, " Analysis of Linear and Nonlinear Synchronous Stream Ciphers", The Eleventh National Radio Science Conference, 22-24 March, 1994, Cairo, Egypt. Absract: In this paper we present new technique to analyze linear and nonlinear synchronous strem ciphers depending on the known plaintext approach. T.A. EL GARF, " Security of Modern Communications Systems", The First International Conference of Electrical Engineering in Military Technical College, ICEENG98, 24-26 March, 1998, Cairo, Egypt. Abstract: In this paper a comparison study is presented concrning the security aspects of modern cipher systems applied in advanced communication systems. S.H. EL Ramly, T.A.EL GARF and A.H. Soliman, " Dynamic Generation of S-Boxes In Block Cipher Systems", The Eighteenth National Radio Science Conference, 27-29 March 2001, Mansoura University, Egypt. Abstract: Block cipher systems are widely used in cryptographic applications. The main problem in implementing any block cipher systems is the fixed stucture of S-boxes elements. In this paper we present a new method to build up dynamic look up tables (S-boxes) changing with every change of the secret key in addition to an evaluation criterion of block ciphers. This new approach will lead to build up more secure block cipher systems and consequently solve the problem of the fixed sructure block ciphers. 6 T.A.Elgarf, A.Zekry and Eman Mahmoud,” Security of vocoding techniques”,AEIC 2010, 21-23 December 2010,El Azhar University, Cairo, Egypt. Abstract: This paper includes two main parts, the first deals with the design and implementation of LPC-10 Vocoder where some improvements are applied to the existing standard FS 1015 LPC-10 algorithm to increase the resulting speech quality. Speech signal is subdivided into 40 msec windows with 10 msec overlap used to remove discontinuity between any two adjacent windows. The accuracy of pitch estimation is improved by applying some preprocessing steps. The second part of this paper deals with the design and implementation of a proposed nonlinear steam cipher algorithm to encrypt the output of the LPC Vocoder. We applied the standard NIST package to assess the randomness properties and security parameters of the proposed algorithm. Other security parameters of the algorithm are calculated like key diversity, period and linear complexity. T.A.Elgarf, H.Elsheikh and A.Zekry, ” A new approach for designing key-dependent S-box defined over GF(24) in AES”, proc.of IEEE 2011 International Conference on Information and Computer Applications (ICICA), Dubai, UAE, March 18-20, 2011, pp.149-155 . (Also published in International Journal of Computer Theory and Engineering (IJCTE)Vol. 4, April 2012) Abstract: In this paper a new approach for designing S-box in Advanced Encryption Standard (AES) is proposed. The proposed S-box is constructed from small S-boxes defined over GF (24) instead of GF (28) as in traditional AES. Rijndael Algorithm (RA), as one of AES standards, is modified by applying the new approach. The Modified Rijndael Algorithm (MRA) is constructed by replacing the S-box of RA by small S-boxes, and the key expansion procedure of RA is modified consequently. The MRA is tested using avalanche effect and strict avalanche criterion (SAC) to evaluate security. The performance evaluation is calculated and proved that MRA is more suitable for the applications that require security and QoS such as voice over IP (VoIP). 7 T.A.Elgarf, Hanem M. El-Sheikh, Omayma A.ElMohsen, and Abdelhalim Zekry, „Efficient Hardware Implementation Technique for key-dependent S-box defined over GF(24) in AES” proc. of IEEE 2011 International Conference of Information Theory and Information Security (ICITIS 2011), November 4-6, 2011 Hangzhou, zchina, pp. 309-314. Also, chosen for the best paper award in this coference (ICITIS 2011). Eman M.Mahmoud, Abdelhafez, Talaat Abdellatief El garf and Abdelhalim Zekry „ Implementation and evaluation of variable bit rates CELP Coder, ICCES ( International Conference on Computer Engineering and Systems), Cairo, Egypt, November 2012. Abstract: This paper describes the implementation of variable bit rate speech coder and tests the behavior and the quality of it. Eman M.Mahmoud, Abdelhafez, Talaat Abdellatief El garf and Abdelhalim Zekry „ Dynamic AES-128 with key-Depndent S-box” IJERA (International Journal of Engineering Research and Applications)3,No.1 January 2013: 1660-1670. Abstract: This paper describes a new dynamic AES algorithm to increase the cryptanalysis hacking immunity. Eman M.Mahmoud, Abdelhafez, Talaat Abdellatief El garf and Abdelhalim Zekry „Enhancing Channel Coding using AES Block Cipher”, (IJCA) International Journal of Computer Applications 61, No.6, 2013, pp. 28:33, January, 2013. Absract: This paper describes a new efficient method to improve channel coding gain in speech codec. 8 T.A Elgarf, Eslam Samy and Mohamed Fouad, „Evaluation Criterion to asses the quality performance 0f advanced hybrid speech coding techniques”, International Journal of Computer Science and Technology(IJCST), vol. 4, Issue 3, pp. 7-12, September 2013. T.A.Elgarf, M.A.Rashed, H.A Elmotaafy and I.F.Tarrad, „The effect of weight factor on the performance of G.729A speech coder”, International journal of Engineering Science&Emerging Technologies, Vol.6, Issue 1, pp. 1-8, August 2013. 9