• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Collision Attacks against AEZ-PRF for Authenticated Encryption AEZ

    2018-03-13 06:25:42TairongShiChenhuiJinJieGuan
    China Communications 2018年2期

    Tairong Shi*, Chenhui Jin, Jie Guan

    Information Science and Technology Institute, Science Avenue, High-Tech Zone, Zhengzhou, Henan 450001, China

    I. INTRODUCTION

    Authenticated encryption algorithm [1] combines encryption with authentication, providing both confidentiality and authenticity simultaneously and has been widely used in security protocols such as SSL/TLS [2]. In order to accelerate the development of authenticated encryption, CAESAR competition [3],a large-scale cryptographic competition like AES [4], and e-STREAM [5] supported by the US National Institute of Standards and Technology (NIST) , was launched in 2014. The goal of this competition is to find robust and efficient authenticated encryption algorithms that offer advantages over AES-GCM and are suitable for widespread adoptions. Fifty-seven candidates were submitted to the CAESAR competition. Now, 15 remaining third-round submissions are going through an intensive review, analysis and comparison progress.With excellent performance in security and efficiency, the third-round candidates were very competitive and therefore attracted many researchers [6, 7, 8].

    AEZ [9], a particularly notable authenticated encryption scheme designed by Hoang,Krovetz and Rogaway, was selected as a thirdround candidate of the ongoing CAESAR competition. The authors also defined the security notion of RAE (Robust Authenticated Encryption), and AEZ was claimed to achieve this security notion [10]. In this paper, we focus on AEZ v4.2, the latest version of AEZ, as proposed on the crypto-competition mailing list.

    When a message is transformed to protect both its confidentiality and authenticity, there may be additional information, such as a packet header that travels alongside the message or the ciphertext (at least conceptually) and must get authenticated. The additional information is noted as associated data, and this kind of authenticated encryption scheme is called authenticated-encryption with associated-data(AEAD) scheme[11].AEZ, like many entries in the CAESAR competition, is an AEAD-scheme. Three AEZ models, i.e., AEZ-core, AEZ-tiny and AEZ-prf are recommended in different message lengths. Strings of 32 bytes or more are enciphered using AEZ-core, while those of 1–31 bytes are enciphered using AEZ-tiny. The AEZ-prf is only used for the special case of enciphering the empty message. In other words, AEZ-prf is used to authenticate the associated data. AEZ claims security when its nonce is reused or misused.We focus on AEZ-prf with only associated data in the nonce-reuse setting. Collision attacks are given in both the quantum setting(using Simon’s quantum algorithm [12, 13]and the classical world.

    Simon’s quantum algorithm (the simplest quantum period finding algorithm) is very important in quantum algorithm theory. Previously, there has been considerable work in the application for the context of symmetric cryptography. Simon’s quantum algorithm was first used to break the security of the 3-round Feistel construction [14] and then to prove that the Even-Mansour construction [15] is not secure with superposition queries [16]. While Simon’s problem (that solved by Simon’s quantum algorithm) is a promise question to find a quantum period, Simon’s quantum algorithm is a quantum period finding algorithm.In this sense, collision attack on authenticated encryption can be performed with superposition queries by Simon’s quantum algorithm.Recently, Kaplan et al. [17] presented attacks on several widely used modes of operation for authentication and authenticated encryption in their security model.

    In the previous work, Kaplan et al. [17] has given a guess on the original version AEZ in quantum world, in which the nonce is not used to process the associated data. Our analysis focuses on AEZ v4.2, in which designers have made major changes and corrections compared with previous versions. In particular, our attack is more specific and captures the characteristic of AES-prf for AEZ v4.2, demonstrating the analysis in both quantum and classical settings.

    Our Contribution.

    In this paper, we initiate the collision attack of AES-prf for AEZ v4.2 in the progressing of associated data. For any associated dataAwith 256 bits, we prove that there is ans,such thatder the same key and same nonce. In this way,we use Simon’s quantum algorithm withO(n)quantum superposition queries to recover the real value ofswith a low complexity and success probability close to 1. We can also getBunder classical settings with the assumption that attackers possess the key.

    In other words, without quantum techniques, a user or sender who masters the keyKwould make use of the collision to perform a spite attack, denying the information which has been authenticated. What is more, a malicious sender can manipulate the associated data to obtain the collision of the tag and therefore can frame a forged message accepted as legitimate. That is, a potential threat has been indicated.

    Finally, we give a brief analysis of what is responsible for collision attack in conclusion. To the best of our knowledge, there is no cryptanalysis of AEZ v4.2 proposed so far.Our results can also be applied to AEZ v3,which has been published on Eurocrypt 2015,and presented as one of the honorable mentions for the best papers award [10].

    Organization.

    This paper is organized as follows. The Section 2 provides a brief description of AEZ v4.2. In the Section 3, we recall some funda-mental quantum knowledge and introduce the Simon’s quantum algorithm. In the Section 4,we deduce the collision attack against AEZ-prf in both quantum setting and classical world.We extend collision attacks to AEZ v3 in Section 5, followed by a conclusion in Section 6.

    II. DESCRIPTION OF AEZ V4.2

    AEZ v4.2 takes as argument or parameters:a keyK∈{0,1}k, a public sequence numberN∈{0,1}n, an associated dataA∈{0,1}*and authenticator lengthτ∈{0,1}*thatτdetermines how much longer a ciphertext is than its plaintext. In particular, AEZ v4.2 allows a vector-valued input, that is to say, it can authenticate a sequence of strings.

    Hereafter we are only interested in the AEZ-prf model, i.e., the processing of authenticated data without any message. In this case,AEZ turns into a variant of PMAC [18], and the security claim becomes the usual MAC security definition. Without specification, all AEZ refers to AEZ v4.2 in the rest of paragraphs.

    Step 1.DivideAintonportions:

    (A1,A2,…,An)←A.

    Step 2.Connect τ,NwithA:

    Step 3. Use AEZ-hash to hashT:

    Δ←AEZ-hash(K,T).

    Step 4.ReturnTag:TagA=(EK1(Δ⊕3·J)).

    For convenience, AEZ-prf(K,N,A,τ)is called AEZ-prf(A) for a fixed series ofK,N,τ. The function AEZ-hash(K,T) can be described as follows:

    Step1. (T1,T2,… ,Tt)←T,Δ=0. //For simplicity, we consider

    Step2. Fori=1 totdo

    Step3.Return Δ.

    A complete description of AEZ can be found in [9].

    III. PRELIMINARY

    In this section, we revisit some basics of quantum operations in advance, as well as Simon’s problem and the quantum algorithm for efficiently solving it.

    3.1 A Brief introduction of Hadamard gate

    An important transform will be used later in Simon’s quantum algorithm is the Hadamard gate [19]. It’s represented by the following matrixH:

    The Hadamard gate is one of the most useful quantum gates. It turnsinto(first column ofH), a ‘halfway’ betweenand turnsinto(second column ofH), which is also a ‘halfway’ between

    More generally, the Hadamard gateH?napplied on ann-qubit statewithx∈{0,1}nand gives

    3.2 Running functions in superposition

    Attacking specific classical cryptosystems requires a precise definition for the operations that the adversary is allowed to perform. In addition to local quantum operations, an adversary is permitted an access to a possible remote cryptographic oracle in superposition[6] of the inputs, and gains the corresponding superposition of the outputs.

    In more detail, if the encryption function is depicted byf:are twon-qubit states expressed in the computational basis, then the adversary can make standard quantum queries, runningfonmeans to apply the unitary transformation,Uf, such that

    where ⊕ is bitwise XOR.

    More generally, any superpositionis a valid input to the quantum oracle, and an adversary can receive the follow result:

    3.3 Simon’s quantum algorithm and attack strategy

    The input of Simon’s problem includes a functionf. To run Simon’s quantum algorithm, it is required that the functionfcan be queried quantum-mechanically.

    Simon’s problem:Suppose there is a multiple output Boolean functionf:and assume that there exists uniqueif and only ifThe goal is to finds.

    Heresis regarded as the period off. This problem can be solved by searching for collisions classically, but its complexity is 2n.Whereas, the Simon’s quantum algorithm is simple, it consists essentially ofO(n) repetitions of the following five quantum steps.

    Step 1. Beginning with a 2n-qubit stateone applies the Hadamard transformH?nto the first register to obtain the quantum superposition.

    Step 2.A quantum query to the functionUfmaps this to the state

    Step 3.Measure the second register in the computational basis yields a valuef(z) and collapses the first register to the state:

    Step 4.Apply the Hadamard transformH?nagain to the first register, and get:

    Step 5.Measure the state in the computational basis, and yields a random vectorywithy·s=0.

    By repeating this subroutineO(n) times,one can obtainsn-1 independent vectorsuiorthogonal toswith high probability, andscan be recovered by means of basis linear algebra. So Simon’s quantum algorithm finds the period using superposition queries with a low complexity.

    The following theorem 1 gives the compromise between the repeated times of the subroutine and the success probability of Simon’s quantum algorithm.

    For a cryptography problem, the conditions onfin Simon’s problem is not true usually. We shall consider a weak limit onfas following.

    The generalized Simon’s assumption:

    Theorem 1then the Simon’s quantum algorithm returnsswithcnqueries, with a probability

    Consequently, it ensures that we can getswith a probability exponentially close to 1.

    Note that the Simon’s quantum algorithm is nothing but a tool used tond collisions in our research, we do not need to understand it in detail.

    IV. COLLISION ATTACKS AGAINST AEZPRF FOR AEZ V4.2

    A collision occurs, if a function within a cryptographic algorithm progresses different inputs, but returns an equal output. Therefore,we take two different associated dataAandBinto consideration, and give collisions of AEZ-prfrstly.

    4.1 The collision form of AEZ-prf for AEZ v4.2

    In order to mount a powerful collision attack on AEZ-prf with the authenticator lengthτand nonceN, we consider the associated dataAwith two arbitrary blockswhere “||” is bit connection. This is illustrated by Figure 1 (which denote the generation ofτ,NasαN).

    In particular, we have:

    Now we compute another associated dataand

    Fig. 1. The AEZ-prf model (no message, for associated data strings A1 ||A2).

    From 12⊕4=8 and 10⊕11=1, we know that

    4.2 Collision attack on AEZ v4.2 in quantum setting

    We now illustrate an application of Simon’s quantum algorithm to AEZ-prf concretely.According to Simon’s quantum algorithm, a function that satises the generalized Simon’s assumption should be constructed atrst. Here we define functionfor a random nonceNwith an arbitrary constantsδ∈{0,1}128. For anyx∈{0,1}128, let

    From the above analysis of collision form in Section 4.1,it is obvious to see thatwhich results thathas the identical tag withunder the same key and same nonce.

    2. The same tag is valid fornamely

    Complexity and success probability:

    Simon’s quantum algorithm makes the attack complexity almost negligible. Theorem 1 guarantees the collision attack with a success probability close to 1. Thus, the collision attack in the quantum setting is practical.

    4.3 Collision attack in classical setting

    In this section, we analyze the collision in usual classical setting. With the result thathas the same tag withtwo classical attacks on AEZ-prf exist as follows.

    Case 1:For adversary who knows theK(including message user, sender).

    As a malicious user who masters the secretK, the whitening keysL,Jare available to him. In this case, the attacker may deny the already authenticated associated dataand claiming that the untreated associated datais the associated data sent. Thus AEZ-pdf algorithm can’t facilitate non-repudiation.In our settings, we assume that the key is known. This is not necessarily true for an external attacker. However, the sender has access to the secret key and allowing the sender to create collisions is not a desirable property either. For AEZ-prf, the sender can find a collision for any given key, initialization vector(nonce) and input associated data with 256 bits, thereby compromising the authenticity component of the authenticated encryption. A malicious sender can manipulate the associated data to obtain the collision of the tag and therefore can frame a forged message accepted as legitimate.

    Case 2: For an adversary who doesn’t know theK.

    Once we find two collided associated datait is possible with a large probability thatandSo we can immediately reveals the value of 12·L⊕J. Thus we can find an collision ofwithfor anyandD2=C1⊕12·L⊕J.This means that from one collision of AEZ-prf, we can constructed a collision for any associated data with 256 bits, which is an unexpected property in the processing of authenticated data AEZ-prf.

    It should be mentioned that, the security claims of AEZ are given in the CAESAR competition submission document [9] and academic paper corresponding to this submission[10], stating that:

    “With a scheme for robust authenticated-encryption a user can select an arbitrary valueλ≥0 and then encrypt a plaintext of any length into a ciphertext that’sλcharacters longer. The scheme must provide all the privacy and authenticity possible for the requestedλ.”

    “AEZ achieves nonce-reuse misuse-resistance”.

    Clearly, through above analysis, the AEZ algorithm does not have the security properties when only authenticates the associated data in the nonce-reuse setting. with 256 bits, where

    V. COLLISION ATTACK ON AEZ-PRF FOR AEZ V3

    In this section, we extend our collision attacks to AEZ v3. For simplicity, we consider AEZ v3 only with a set of associated datawith 256 bits, then the tag is computed as:

    VI. CONCLUSIONS

    In this article, we evaluate the security of CAESAR candidate AEZ in both the post quantum world and classical world. Namely,we have constructed collision attacks on the processing of the associated data. Our results show that AEZ is not provided integrity fully which do not violate the security proof of the AEZ. In addition, a kind of deny of authenticated message is proposed, which is not a desirable property for authenticated encryption.

    We also analyze the reasons that cause those attacks. The way AEZ-prf generates tag is a little simple, while the tag only operates on the linear connection of each previous offsets. There is not enough mutual feedback in the process of authentication. Increasing some nonlinear transformation between the final inputs may be helpful to authenticated encryption.

    Although our analysis focuses only on AEZ, it is important to note that the goal of post-quantum cryptography is to resist quantum adversaries. With the advance of the competition, authenticated encryption receives more attentions and develops rapidly. More authenticated encryption algorithms might be broken following the same models. This is the part of future work.

    ACKNOWLEDGMENT

    This work was supported by the National Natural Science Foundation of China(Grant No.61572516, No.61272041 and No.61272488).

    [1] M. Bellare and C. Namprempre, “Authenticated encryption: Relations among notions and analysis of the generic composition paradigm,”Journal of Cryptology, vol. 21, no. 4, 2008, pp.469-491.

    [2] K. Hickman and T. Elgamal, “The SSL protocol,”Netscape Communications Corp, 1995. http://www.webstart.com/jed/papers/HRM/references/ssl.html, [2017-04-13].

    [3] D. J. Bernstein, “Caesar: Competition for authenticated encryption: Security, applicability, and robustness,” 2015. http://competitions.cr.yp.to/caesar.html, [2017-04-13].

    [4] J. Daemen and V. Rijmen, “The Design of Rijndael: AES-the advanced encryption standard,”Springer, Berlin, pp. 31-50, 2002.

    [5] ECRYPT, European Network of Excellence in Cryptology: “The Stream Cipher Project: eSTREAM,” IST-2002-507932. http://www.ecrypt.eu.org/stream, [2017-04-13].

    [6] C. Dobrauning, M. Eichlseder and F. Mendel,“Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates,”Proc. ASIACRYPT 2015, 2015, pp. 490-509.

    [7] T. Peyrin, S. M. Sim, L. Wang,et al., “Cryptanalysis of JAMBU,”Proc. FSE 2015, 2015, pp. 264-281.

    [8] M. Salam, H. Bartlett, E. Dawson,et al.,“Investigating Cube Attack on the Authenticated Encryption Stream Cipher ACORN,”Proc ATIS 2016, 2016, pp. 15-26.

    [9] V. T. Hoang, T. Krovetz, and P. Rogaway, “AEZ v4.2: Authenticated Encryption by Enciphering,” 2016. http://competitions.cr.yp.to/round3/aezv42.pdf , [2017-04-13].

    [10] V. T. Hoang, T. Krovetz, and P. Rogaway, “Robust authenticated-encryption: AEZ and the problem that it solves,”Proc. EUROCRYPT 2015, 2015, pp.15–44.

    [11] P. Rogaway, “Authenticated-Encryption with Associated-Data,”Proc. 9th ACM conference on Computer and communications security, 2002,pp. 98-107.

    [12] D. R. Simon, “On the power of quantum computation,”SIAM Journal on Computing, vol. 26,no. 5, 1997, pp. 1474–1483.

    [13] P. W. Shor, “Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer,”SIAM Journal on Computing, vol. 26, no. 5, 1997, pp. 1484–1509.

    [14] H. Kuwakado and M. Morii, “Quantum distinguisher between the 3-round Feistel cipher and the random permutation,”Proc. International Symposium on Information Theory and its Applications, vol. 41, no. 3, 2010, pp. 2682–2685.

    [15] H. Kuwakado and M. Morii, “Security on the quantum-type Even-Mansour cipher,”Proc. International Sympsium Information Theory and its Applications, 2012, pp. 312–316.

    [16] I. Damg?rd, J. Funder, J. B. Nielsen,et al.,“Superposition attacks on cryptographic protocols,”Proc. International Conference on InformationTheoretic Security, 2013, pp. 142–161.

    [17] M. Kaplan, G. Leurent, A. Leverrier,et al., “Breaking Symmetric Cryptosystems using Quantum Period Finding,”Proc. CRYPTO 2016, 2016, pp.207-237.

    [18] PR J. Black, “A block-cipher mode of operation for parallelizable message authentication,”Proc.EUROCRYPT 2002, 2002, pp. 384–397.

    [19] M. A. Nielsen and I. L. Chuang, “Quantum Computation and Quantum Information,” Cambridge University Press, .New York, NY, USA,2011, pp. 16-20.

    [20] T. Fuhr, G. Leurent and V. Suder, “Collision Attacks against CAESAR Candidates Forgery and Key-Recovery against AEZ and Marble,”Proc.ASIACRYPT 2015, 2015, pp. 510-532.

    亚洲欧美精品综合一区二区三区| 黄片小视频在线播放| 麻豆乱淫一区二区| 9热在线视频观看99| 一本大道久久a久久精品| 亚洲成国产人片在线观看| 久久草成人影院| 国产精品免费一区二区三区在线 | 丝袜在线中文字幕| 午夜两性在线视频| 侵犯人妻中文字幕一二三四区| 亚洲午夜理论影院| av国产精品久久久久影院| 正在播放国产对白刺激| 亚洲国产中文字幕在线视频| 久久精品国产99精品国产亚洲性色 | 日本a在线网址| 又紧又爽又黄一区二区| 在线观看免费日韩欧美大片| 99re6热这里在线精品视频| av电影中文网址| 一级作爱视频免费观看| 日韩精品免费视频一区二区三区| 欧美性长视频在线观看| 国产单亲对白刺激| 色精品久久人妻99蜜桃| 大香蕉久久网| 亚洲精品久久成人aⅴ小说| 日韩欧美国产一区二区入口| 亚洲国产欧美日韩在线播放| 欧美av亚洲av综合av国产av| 大陆偷拍与自拍| 一级作爱视频免费观看| 啦啦啦在线免费观看视频4| 成人特级黄色片久久久久久久| 欧美在线黄色| 中文字幕人妻丝袜制服| 视频区图区小说| 成人影院久久| 亚洲欧美精品综合一区二区三区| 黄色女人牲交| 久久天躁狠狠躁夜夜2o2o| 婷婷丁香在线五月| 亚洲自偷自拍图片 自拍| 男人舔女人的私密视频| 国产高清激情床上av| 精品人妻1区二区| 手机成人av网站| 欧美最黄视频在线播放免费 | 欧美精品人与动牲交sv欧美| 欧美日本中文国产一区发布| 每晚都被弄得嗷嗷叫到高潮| 一级毛片高清免费大全| 成熟少妇高潮喷水视频| 国产亚洲精品久久久久5区| 久久亚洲精品不卡| 新久久久久国产一级毛片| 婷婷成人精品国产| 麻豆成人av在线观看| 国产精品99久久99久久久不卡| 成人特级黄色片久久久久久久| 欧美日韩亚洲高清精品| 天堂动漫精品| 一级作爱视频免费观看| 中文字幕高清在线视频| 精品人妻1区二区| 日韩熟女老妇一区二区性免费视频| 欧美成狂野欧美在线观看| 国产aⅴ精品一区二区三区波| 少妇 在线观看| 一区二区日韩欧美中文字幕| 亚洲国产欧美一区二区综合| 亚洲欧洲精品一区二区精品久久久| 国产精品99久久99久久久不卡| 在线观看免费视频网站a站| 91av网站免费观看| 久久中文字幕一级| 亚洲av日韩精品久久久久久密| 国产一区二区激情短视频| 久久亚洲精品不卡| 国产乱人伦免费视频| 国产99久久九九免费精品| 国产亚洲欧美精品永久| 18禁裸乳无遮挡动漫免费视频| 日本撒尿小便嘘嘘汇集6| 制服诱惑二区| 18禁裸乳无遮挡免费网站照片 | 美女高潮喷水抽搐中文字幕| www.999成人在线观看| tocl精华| 亚洲精品av麻豆狂野| 老熟妇仑乱视频hdxx| 亚洲精品国产精品久久久不卡| 一级作爱视频免费观看| 欧美乱码精品一区二区三区| 亚洲美女黄片视频| 国内毛片毛片毛片毛片毛片| 亚洲成国产人片在线观看| 免费在线观看视频国产中文字幕亚洲| 99re在线观看精品视频| 中国美女看黄片| 成人三级做爰电影| 欧美日韩精品网址| 另类亚洲欧美激情| 久久精品亚洲av国产电影网| 中文字幕av电影在线播放| 99久久人妻综合| 国产亚洲欧美在线一区二区| 亚洲色图 男人天堂 中文字幕| 人人澡人人妻人| 久久久精品区二区三区| 黄色视频不卡| 18禁黄网站禁片午夜丰满| 真人做人爱边吃奶动态| 国产亚洲精品第一综合不卡| 亚洲aⅴ乱码一区二区在线播放 | 色婷婷久久久亚洲欧美| 亚洲国产看品久久| 久久天躁狠狠躁夜夜2o2o| 久久人妻av系列| 19禁男女啪啪无遮挡网站| 久久午夜亚洲精品久久| 9191精品国产免费久久| 亚洲国产看品久久| 欧美成狂野欧美在线观看| 黄色毛片三级朝国网站| 无遮挡黄片免费观看| 男女免费视频国产| 两个人看的免费小视频| 好男人电影高清在线观看| 欧美日韩亚洲综合一区二区三区_| 久久精品国产99精品国产亚洲性色 | 免费看十八禁软件| 精品少妇久久久久久888优播| 午夜视频精品福利| 黄色视频不卡| 婷婷丁香在线五月| 成人特级黄色片久久久久久久| 亚洲精品美女久久久久99蜜臀| 嫩草影视91久久| 国产精品一区二区在线观看99| 日本撒尿小便嘘嘘汇集6| 午夜福利影视在线免费观看| 久久精品aⅴ一区二区三区四区| 这个男人来自地球电影免费观看| 亚洲精品久久午夜乱码| 亚洲全国av大片| videosex国产| 首页视频小说图片口味搜索| a级毛片黄视频| 久久天堂一区二区三区四区| 久9热在线精品视频| 亚洲中文日韩欧美视频| 亚洲欧美色中文字幕在线| 亚洲国产精品一区二区三区在线| 久久人妻av系列| 三上悠亚av全集在线观看| 成人亚洲精品一区在线观看| 一级片'在线观看视频| 亚洲欧美精品综合一区二区三区| 捣出白浆h1v1| 最新在线观看一区二区三区| 九色亚洲精品在线播放| 亚洲精品美女久久av网站| 久久久精品国产亚洲av高清涩受| 欧美不卡视频在线免费观看 | 大型av网站在线播放| 熟女少妇亚洲综合色aaa.| 在线观看66精品国产| 99国产精品免费福利视频| 美女 人体艺术 gogo| 亚洲午夜理论影院| 成人av一区二区三区在线看| 视频区欧美日本亚洲| 久久午夜亚洲精品久久| 9色porny在线观看| 99久久人妻综合| 亚洲国产精品一区二区三区在线| 精品久久久久久久久久免费视频 | 国产野战对白在线观看| 中国美女看黄片| 窝窝影院91人妻| 男女午夜视频在线观看| 久久亚洲真实| 亚洲精品久久午夜乱码| 国产亚洲精品第一综合不卡| 国产黄色免费在线视频| 黄色毛片三级朝国网站| 国产高清激情床上av| 99香蕉大伊视频| 老司机亚洲免费影院| 国产主播在线观看一区二区| 精品熟女少妇八av免费久了| 亚洲午夜精品一区,二区,三区| 深夜精品福利| 大码成人一级视频| 国产欧美日韩一区二区三区在线| 久久天躁狠狠躁夜夜2o2o| 在线观看免费高清a一片| 纯流量卡能插随身wifi吗| 91成年电影在线观看| 视频区图区小说| 窝窝影院91人妻| 91在线观看av| 国产亚洲av高清不卡| 妹子高潮喷水视频| 丁香欧美五月| 美女高潮喷水抽搐中文字幕| 一夜夜www| 国产熟女午夜一区二区三区| 十分钟在线观看高清视频www| 日日摸夜夜添夜夜添小说| 成年人午夜在线观看视频| 黑人巨大精品欧美一区二区蜜桃| 久久精品国产亚洲av香蕉五月 | 一本综合久久免费| 成人国产一区最新在线观看| 国产有黄有色有爽视频| 欧美一级毛片孕妇| 丰满饥渴人妻一区二区三| 99精国产麻豆久久婷婷| 黄色丝袜av网址大全| 亚洲精品在线观看二区| 两性夫妻黄色片| 欧美 亚洲 国产 日韩一| 99精品欧美一区二区三区四区| 久久久精品国产亚洲av高清涩受| 在线观看www视频免费| 亚洲九九香蕉| 黄色毛片三级朝国网站| 丰满的人妻完整版| 亚洲精品乱久久久久久| 久久久久久免费高清国产稀缺| 免费观看人在逋| 精品少妇久久久久久888优播| 美女午夜性视频免费| 亚洲一卡2卡3卡4卡5卡精品中文| 久久国产精品影院| 大陆偷拍与自拍| 淫妇啪啪啪对白视频| 99re在线观看精品视频| 日本vs欧美在线观看视频| 丰满饥渴人妻一区二区三| 日本a在线网址| 国产1区2区3区精品| 国产精品国产av在线观看| 国产亚洲欧美98| 欧美亚洲日本最大视频资源| 日韩人妻精品一区2区三区| 中文字幕高清在线视频| 国产欧美日韩精品亚洲av| 亚洲第一欧美日韩一区二区三区| 久久久久久人人人人人| 91国产中文字幕| 又黄又爽又免费观看的视频| 大陆偷拍与自拍| 我的亚洲天堂| 国产精品国产av在线观看| 亚洲一区高清亚洲精品| 国产精品影院久久| 69精品国产乱码久久久| 欧美亚洲日本最大视频资源| 最近最新中文字幕大全免费视频| 国产亚洲精品一区二区www | 成年人午夜在线观看视频| 国产成人精品在线电影| 精品国内亚洲2022精品成人 | 日本一区二区免费在线视频| 不卡一级毛片| 人成视频在线观看免费观看| 成人永久免费在线观看视频| 欧美日韩中文字幕国产精品一区二区三区 | 黄色女人牲交| 婷婷丁香在线五月| 极品少妇高潮喷水抽搐| 欧美成狂野欧美在线观看| 午夜激情av网站| 亚洲精品国产精品久久久不卡| 久久精品国产99精品国产亚洲性色 | 国产成人免费观看mmmm| 成人av一区二区三区在线看| 香蕉国产在线看| 欧美日韩精品网址| 久久人妻熟女aⅴ| 中文字幕高清在线视频| 亚洲成av片中文字幕在线观看| 欧美日韩亚洲国产一区二区在线观看 | 美女高潮到喷水免费观看| 国产精品永久免费网站| 一区福利在线观看| 国产亚洲欧美精品永久| 亚洲第一av免费看| 成年女人毛片免费观看观看9 | 欧美亚洲 丝袜 人妻 在线| 757午夜福利合集在线观看| 女性生殖器流出的白浆| 久久久久久久久免费视频了| 国产欧美日韩一区二区三| 精品久久蜜臀av无| videos熟女内射| tocl精华| 美女视频免费永久观看网站| 两性夫妻黄色片| 一边摸一边抽搐一进一出视频| 久久国产精品大桥未久av| 一级毛片女人18水好多| 亚洲av美国av| 亚洲情色 制服丝袜| 日韩 欧美 亚洲 中文字幕| x7x7x7水蜜桃| 亚洲 国产 在线| 国产色视频综合| 老司机在亚洲福利影院| 亚洲av日韩在线播放| 精品久久久精品久久久| 美女高潮到喷水免费观看| 制服人妻中文乱码| 欧美午夜高清在线| 黄色丝袜av网址大全| 国产在线观看jvid| 成年女人毛片免费观看观看9 | 日本a在线网址| 国内久久婷婷六月综合欲色啪| 波多野结衣av一区二区av| 人成视频在线观看免费观看| 久久国产亚洲av麻豆专区| 中文字幕人妻丝袜一区二区| 两个人看的免费小视频| 亚洲精品一二三| 国产精品久久电影中文字幕 | 中文字幕人妻熟女乱码| 午夜两性在线视频| 高清毛片免费观看视频网站 | 麻豆乱淫一区二区| av网站免费在线观看视频| 91九色精品人成在线观看| 国产欧美亚洲国产| 9色porny在线观看| 在线免费观看的www视频| 在线播放国产精品三级| av在线播放免费不卡| 日本vs欧美在线观看视频| 大型黄色视频在线免费观看| 操出白浆在线播放| 伊人久久大香线蕉亚洲五| 亚洲熟女精品中文字幕| 老司机靠b影院| 国产精品 国内视频| 国产精品乱码一区二三区的特点 | 亚洲精品美女久久久久99蜜臀| 国产aⅴ精品一区二区三区波| 亚洲全国av大片| 日韩大码丰满熟妇| 真人做人爱边吃奶动态| 日韩欧美一区二区三区在线观看 | 国产精品免费大片| 精品一区二区三区视频在线观看免费 | 欧美精品av麻豆av| 国产99白浆流出| 人人妻人人澡人人爽人人夜夜| 国产成人一区二区三区免费视频网站| 久久人人爽av亚洲精品天堂| 成在线人永久免费视频| 狠狠婷婷综合久久久久久88av| 亚洲中文日韩欧美视频| 国产av精品麻豆| 丝袜美足系列| 丝袜美腿诱惑在线| 中文字幕精品免费在线观看视频| 亚洲欧美一区二区三区黑人| 色婷婷久久久亚洲欧美| 亚洲五月天丁香| 手机成人av网站| 天天操日日干夜夜撸| 成年人午夜在线观看视频| 亚洲av熟女| a级毛片黄视频| 交换朋友夫妻互换小说| 一级黄色大片毛片| tocl精华| 欧美+亚洲+日韩+国产| 视频区图区小说| 伊人久久大香线蕉亚洲五| 无人区码免费观看不卡| 精品亚洲成a人片在线观看| 日本撒尿小便嘘嘘汇集6| videos熟女内射| 欧美黄色淫秽网站| 亚洲精品久久成人aⅴ小说| 欧美国产精品一级二级三级| 亚洲av美国av| 免费一级毛片在线播放高清视频 | 亚洲专区国产一区二区| 久久天躁狠狠躁夜夜2o2o| 亚洲专区国产一区二区| 欧美日韩成人在线一区二区| 午夜视频精品福利| 日韩一卡2卡3卡4卡2021年| av天堂在线播放| 两人在一起打扑克的视频| 亚洲欧美色中文字幕在线| 十分钟在线观看高清视频www| 日韩成人在线观看一区二区三区| 亚洲综合色网址| 日韩精品免费视频一区二区三区| 搡老乐熟女国产| 亚洲第一青青草原| 99精品在免费线老司机午夜| 成人手机av| 少妇粗大呻吟视频| 性少妇av在线| 成年动漫av网址| 黑人猛操日本美女一级片| 亚洲,欧美精品.| 黄片播放在线免费| 热99久久久久精品小说推荐| 中文字幕色久视频| 亚洲av成人不卡在线观看播放网| 在线观看免费日韩欧美大片| 成年人午夜在线观看视频| 日韩熟女老妇一区二区性免费视频| 国产aⅴ精品一区二区三区波| 十八禁高潮呻吟视频| 制服诱惑二区| 91九色精品人成在线观看| 国产又爽黄色视频| 18禁黄网站禁片午夜丰满| av电影中文网址| 中文字幕人妻丝袜一区二区| 极品人妻少妇av视频| 国产精品免费视频内射| 捣出白浆h1v1| 欧美国产精品一级二级三级| 中文亚洲av片在线观看爽 | 精品少妇久久久久久888优播| 男人舔女人的私密视频| 母亲3免费完整高清在线观看| 精品国内亚洲2022精品成人 | 又大又爽又粗| 在线观看www视频免费| 男人操女人黄网站| 日韩欧美国产一区二区入口| 成熟少妇高潮喷水视频| 精品国产美女av久久久久小说| 久久人妻av系列| av有码第一页| 搡老熟女国产l中国老女人| 最近最新中文字幕大全免费视频| 亚洲中文字幕日韩| 在线观看免费午夜福利视频| 精品亚洲成a人片在线观看| 欧美日韩亚洲国产一区二区在线观看 | 美女高潮到喷水免费观看| 嫩草影视91久久| 国产欧美日韩一区二区精品| 人人妻,人人澡人人爽秒播| 亚洲成a人片在线一区二区| 丁香欧美五月| 成人影院久久| 欧美黄色片欧美黄色片| 日日夜夜操网爽| 日韩欧美免费精品| 97人妻天天添夜夜摸| 一区二区三区精品91| 国产精品综合久久久久久久免费 | 亚洲精品粉嫩美女一区| 咕卡用的链子| 亚洲国产欧美一区二区综合| 黄色 视频免费看| 99久久精品国产亚洲精品| 日韩 欧美 亚洲 中文字幕| 亚洲精品国产色婷婷电影| 99国产精品免费福利视频| 亚洲欧美一区二区三区久久| 亚洲国产精品一区二区三区在线| 日韩中文字幕欧美一区二区| 免费在线观看亚洲国产| 亚洲国产看品久久| 国产日韩一区二区三区精品不卡| 91成年电影在线观看| 两性午夜刺激爽爽歪歪视频在线观看 | 1024视频免费在线观看| 每晚都被弄得嗷嗷叫到高潮| tocl精华| 国产99白浆流出| 久久精品aⅴ一区二区三区四区| 亚洲av熟女| av电影中文网址| 欧美日韩中文字幕国产精品一区二区三区 | 亚洲精品国产一区二区精华液| www.自偷自拍.com| 青草久久国产| 国产亚洲精品久久久久久毛片 | 精品久久久精品久久久| 午夜福利在线免费观看网站| 啦啦啦在线免费观看视频4| 日韩欧美一区二区三区在线观看 | 亚洲va日本ⅴa欧美va伊人久久| 国产精品二区激情视频| av网站在线播放免费| 丝瓜视频免费看黄片| 久久久国产成人免费| 天堂俺去俺来也www色官网| 交换朋友夫妻互换小说| 久久精品亚洲熟妇少妇任你| 黄色视频,在线免费观看| 亚洲中文日韩欧美视频| 19禁男女啪啪无遮挡网站| 精品国产乱子伦一区二区三区| 亚洲熟妇中文字幕五十中出 | 91在线观看av| 俄罗斯特黄特色一大片| 亚洲av片天天在线观看| 国产精品自产拍在线观看55亚洲 | 国产精品av久久久久免费| 欧美乱码精品一区二区三区| 久久国产精品大桥未久av| 午夜91福利影院| 黄色视频,在线免费观看| 天天躁日日躁夜夜躁夜夜| 亚洲av日韩精品久久久久久密| 国精品久久久久久国模美| 99re6热这里在线精品视频| 91大片在线观看| 一二三四社区在线视频社区8| 亚洲av成人一区二区三| av超薄肉色丝袜交足视频| 老汉色∧v一级毛片| 99热网站在线观看| 欧美老熟妇乱子伦牲交| 韩国av一区二区三区四区| a级毛片在线看网站| 男人舔女人的私密视频| 亚洲国产中文字幕在线视频| 大香蕉久久网| 777久久人妻少妇嫩草av网站| 在线观看日韩欧美| 一级a爱片免费观看的视频| 淫妇啪啪啪对白视频| 久久人妻福利社区极品人妻图片| 国产视频一区二区在线看| 国产成人av教育| 另类亚洲欧美激情| 亚洲中文日韩欧美视频| 1024视频免费在线观看| 老熟女久久久| www.精华液| 亚洲av日韩精品久久久久久密| 激情在线观看视频在线高清 | 无遮挡黄片免费观看| 国产精品一区二区免费欧美| 丝袜美腿诱惑在线| 国产一区二区三区视频了| 少妇的丰满在线观看| 亚洲久久久国产精品| 女性被躁到高潮视频| 男人操女人黄网站| 一a级毛片在线观看| 日日夜夜操网爽| 国产成人精品久久二区二区91| ponron亚洲| 夫妻午夜视频| 午夜福利在线免费观看网站| 亚洲中文字幕日韩| 国产97色在线日韩免费| 亚洲男人天堂网一区| 久久精品亚洲精品国产色婷小说| 男人的好看免费观看在线视频 | 黄色视频不卡| 下体分泌物呈黄色| 视频区图区小说| 亚洲精品久久成人aⅴ小说| 国产成人免费无遮挡视频| 欧美日韩亚洲综合一区二区三区_| 动漫黄色视频在线观看| 中出人妻视频一区二区| 国产欧美日韩精品亚洲av| 一边摸一边抽搐一进一出视频| 亚洲人成电影免费在线| 午夜福利乱码中文字幕| 在线国产一区二区在线| 免费女性裸体啪啪无遮挡网站| 黄色 视频免费看| 熟女少妇亚洲综合色aaa.| 久久久久久久午夜电影 | 免费看a级黄色片| 国产精品欧美亚洲77777| 国产精品.久久久| 国产成+人综合+亚洲专区| 亚洲色图 男人天堂 中文字幕| 国产淫语在线视频| 在线观看免费高清a一片| 超色免费av| 国产成人系列免费观看| 国产1区2区3区精品| 中亚洲国语对白在线视频| 涩涩av久久男人的天堂| 50天的宝宝边吃奶边哭怎么回事| 99国产精品一区二区蜜桃av | 人人妻人人澡人人看| 亚洲视频免费观看视频| 又黄又粗又硬又大视频| 亚洲人成电影免费在线| 国产91精品成人一区二区三区| 香蕉久久夜色| 99精品久久久久人妻精品| 丰满的人妻完整版| 热99国产精品久久久久久7| 免费在线观看黄色视频的| 80岁老熟妇乱子伦牲交| 精品久久久精品久久久| 麻豆国产av国片精品| 日韩欧美一区视频在线观看| 好看av亚洲va欧美ⅴa在| 国产欧美日韩一区二区精品|