• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Automatic Search of Impossible Differentials and Zero-Correlation Linear Hulls for ARX Ciphers

    2018-03-13 06:25:46KaiZhangJieGuanBinHu
    China Communications 2018年2期

    Kai Zhang, Jie Guan, Bin Hu

    Zhengzhou Information Science and Technology Institute, Zhengzhou 450000, China

    I. INTRODUCTION

    For the recent 20 years, large numbers of cryptographic primitives using only addition, rotation and XOR have been proposed. They are called ARX algorithms. As these operations can be implemented efficiently in software and hardware, the ARX ciphers usually have good software and hardware performance.Thus ARX algorithms are usually lightweight primitives, which is suitable for low resource devices such as sensor nodes and RFID tags.ARX ciphers have penetrated into every aspect of symmetric primitives, there are lots of famous ARX ciphers such as HIGHT[11],Threefish[12], SPECK[13], TEA family ciphers[23-25], Salsa20[16], BLAKE[18],BLAKE2[19], Skein[12] and so on.

    Although more and more ARX ciphers have appeared, compared with other ciphers,the cryptanalysis of them seems to lag behind.Among these methods, impossible differential cryptanalysis and zero-correlation linear cryptanalysis are two important and effective cryptanalytic methods to analyze ARX ciphers.

    Impossible differential cryptanalysis was independently proposed by Knudsen to attack the DEAL cipher[5] and further by Biham et al. against Skipjack[6]. The basic idea of impossible differential cryptanalysis is using the impossible differential character to retrieve the secrete key. Impossible differential cryptanalysis has proven to be very effective against a wide variety of ciphers[7-9]. The core of impossible differential cryptanalysis is the existence of impossible differential character.The longer an impossible differential character exists, the longer rounds of the cipher we may attack. So it is very meaningful to find long impossible differential characters of a cipher.

    For automatic search of impossible differentials, in Indocrypt 2003, Kim et al. proposed the u-method[28] to search the impossible differentials for block cipher structures with bijective round functions. In 2009, Luo et al. improved the u-method and proposed UID-method[29], which has fewer limitations and can collect more information to build impossible differentials. In Indocrypt 2012, Wu et al. proposed a more general automated tool for finding truncated impossible differentials for word-oriented block ciphers with bijective S-boxes[30]. However, all these automatic search methods are designed for S-box based block ciphers, for the brand new ARX ciphers,they are not applicable.

    Zero-correlation linear cryptanalysis was proposed by Andrey Bogdanov and Vincent Rijmen in 2011[1]. It is based on linear approximation whose correlation value is exactly zero. This new and novel cryptanalytic method has proven to be effective against AES,CLEFIA[1,2], TEA and XTEA[4]. The core of zero-correlation linear cryptanalysis is the existence of zero-correlation linear hull. The longer a zero-correlation linear hull exists, the longer rounds of the cipher we may attack. So finding longer zero-correlation linear hulls of a cipher is also meaningful.

    In [30], the automatic search of zero-correlation linear hulls was also introduced. Unfortunately, the new method is also designed for S-box based block ciphers, which can not be applied to ARX ciphers either.

    Our contributions

    The main purpose of this paper is to introduce an automatic search tool to explore new and longer impossible differentials and zero-correlation linear hulls for ARX ciphers.Firstly, we propose an automatic search method to explore impossible differentials and zero-correlation linear hulls whose weights of the input/output differentials (or linear masks) are low. Secondly, we introduce some techniques on extending the low weight distinguishers to high weight distinguishers, thus more and longer impossible differential distinguishers and zero-correlation linear distinguishers can be derived. Thirdly, we apply this automatic search method to three typical ARX ciphers HIGHT, LEA and SPECK to prove the high efficiency of our automatic search method in finding impossible differentials and zero-correlation linear hulls. The summary of new IDs and ZCLHs for these ciphers is concluded in the two tables below.

    Table I. Summary of new impossible differentials for some typical ARX ciphers.

    Table II. Summary of new zero-correlation linear hulls for some typical ARX ciphers.

    This paper is organized as follows. Impos-sible differential cryptanalysis and zero-correlation linear cryptanalysis are briefly introduced in section 2. Section 3 proposes two automatic search methods, which are designed for finding impossible differentials and zero-correlation linear hulls for ARX ciphers. To get longer distinguishers, the extensions of the automatic search method are also proposed.Using the method introduced in section 3, section 4 illustrates impossible differentials and zero-correlation linear hulls for three typical ARX ciphers HIGHT, LEA and SPECK. Section 5 concludes the paper.

    Fig. 1. Sketch of impossible differential cryptanalysis.

    Fig. 2. Sketch of zero-correlation linear cryptanalysis.

    II. BRIEF INTRODUCTION ON IMPOSSIBLE DIFFERENTIAL CRYPTANALYSIS AND ZEROCORRELATION LINEAR CRYPTANALYSIS

    The impossible differential cryptanalysis can be simply concluded as “use the differential path of probability zero to eliminate the wrong key candidates”. For an impossible differential path, if we partially encrypt the plaintext and decrypt the ciphertext with the right key,the differential of the impossible differential path will never occur. So when we use some guessed key bits to partially encrypt the plaintext and partially decrypt the ciphertext, if the impossible differential path occurs, the guessed key bits must be wrong, so it is possible to eliminate the wrong key candidates from the right one.

    There are mainly two steps for impossible differential cryptanalysis. One is constructing impossible differentials, the other is recovering the key. The basic skill used in constructing impossible differentials is miss-in-themiddle technique, which usually combines two differential paths of probability one to make a contradiction in the middle. The basic skill used in recovering the key is key sieving technique. When we use guessed key bits to realize partial encryption and partial decryption, all the guesses which satisfy the impossible differential character are wrong, then we can eliminate these wrong key candidates to reduce the candidate key space. By combining other techniques such as exhaustive search we can recover the correct key.

    The procedure of zero-correlation linear cryptanalysis can be simply concluded as“use linear approximation of probability 1/2 to eliminate the wrong key candidates”. Usually, the propagation of linear mask has some fixed modes in specific cipher components. In reference [1,2], Bogdanov and Rijmen illustrated how to construct linear approximation of probability 1/2 for block ciphers, which is zero-correlation linear approximation actually.Based on these zero-correlation linear approximations, we can distinguish the cipher from random permutation, which makes key recovery attack possible. To reduce the data complexity of zero-correlation linear cryptanalysis,multiple zero-correlation linear cryptanalysis and multidimensional zero-correlation linear cryptanalysis are proposed successively.

    The procedures of zero-correlation linear cryptanalysis also conclude the process of constructing zero-correlation linear hulls and the process of key recovering. The basic idea is using the guessed key bits to partially encrypt the plaintext and partially decrypt the cipher,if the zero-correlation linear approximation appears, the guess is wrong. We can use this thought to eliminate the wrong key candidates.

    III. AUTOMATIC ID AND ZCLH SEARCHING METHODS FOR ARX CIPHERS

    3.1 Modes operation

    During the process of encryption and decryption, each unit (bit or word) of the internal states has some properties such as the property of differential character, the property of linear mask character, XOR-balanced, ADD-balanced(i.e. balance over module addition), constant and so on. If some properties or abstracted properties can be passed down, it is possible to build some distinguishers according to these property deductions. In this section, we

    will propose a new definition “Modes Operation”, which can conclude all these properties.However, first of all, we want to illustrate

    three key problems for this new definition.

    ? Why we propose this new definition -Modes Operation?

    ? What is the relationship between Modes Operation and some earlier proposed methods such as u-method, UID method and tuple cryptanalysis?

    ? Why our method is more effective than other works for ARX ciphers?

    During our study on finding impossible differentials and zero-correlation linear hulls on ARX ciphers, we found that the earlier proposed methods are all ineffective for this kind of ciphers. For ARX ciphers, some earlier proposed impossible differentials or zero-correlation linear hulls are usually built by hand using some properties of addition, rotation and XOR operations. The efficiency of this old method is rather low and the effectiveness highly relies on the expertise of the cryptographers. And sometimes, it is impossible to test all the combinations of the input and output,even for those input/output differentials (linear masks) of some specific pattern. So we want to propose a new tool to solve this problem and realize automatic search for these two kinds of distinguishers on ARX ciphers.

    On the other hand, during our research, it is found that some earlier proposed methods such as u-method, UID method and tuple cryptanalysis are all symbolic operations. For u-method and UID method, they use matrix as a carrier to realize symbolic operation. And for tuple cryptanalysis, it just redefines the relationship for these symbols to accord with different arithmetic operations. So on a higher level, we conclude all these symbolic operations in a more general way and thus propose our automatic search method for ARX ciphers.

    Then, we will propose this new definition which we call it “Modes Operation”.

    Definition 1:If a cipher hasnbasic units for each internal state, which is denoted as (X1,X2,…,Xn). Each unit of the internal state has some specific modes such as differential, linear mask, xor balance etc. If the properties of a unit are abstracted or constructed properly,when given the modes of the internal state at timet(Mt(X1),Mt(X2),…,Mt(Xn)) and the structure of the round function, the modes of the internal state at timet+1(Mt+1(X1),Mt+1(X2),…,Mt+1(Xn)) can be deducted through simple op-erations with probability one, we call this kind of operationModes Operation.

    The modes of the internal states reflect some properties of the internal states, we can build distinguishers according to these modes.There are two items we should pay attention to when we construct modes operations. On one hand, we should choose the “mode”. This item decides the basic computing rules when passing through each component of the cipher.On the other hand, we should construct the property set (denoted as ?) and assign specific meaning to each element of the set. The constructed property set may influence the length of the distinguisher directly, so how to build an appropriate property set is an open problem.

    Here we want to note that u-method,UID method and tuple cryptanalysis can all be viewed as a specific modes operation. For modes operation, it can be seen as an open source definition, we can construct specific modes operation according to our need. Next,we will give two kinds of specific modes operations on ARX ciphers to realize automatic search of impossible differentials and zero-correlation linear hulls.

    For ARX ciphers, the basic unit for modes operation is on bit level, not on word level.For the rest of the paper, we just focus on the modes operation for ARX ciphers.

    For impossible differential cryptanalysis,the mode of an internal state bit represents some property of a differential bit. For zero-correlation linear cryptanalysis, the mode of an internal state bit represents some property of a linear mask bit.

    For impossible differential cryptanalysis,the modes represent some differential properties. For an internal state bit, the property set? includes three elements {“0”, “1” and “U”}.“0” represents the differential of an internal state bit is 0 for sure, “1” represents the differential of an internal state bit is 1 for sure and“U” represents the differential of an internal state bit is uncertain.

    For zero-correlation linear cryptanalysis,the modes represent some properties of linear mask. For an internal state bit, the property set? also includes three elements {“0”, “1” and“U”}. However, these three elements represent different meanings. Here, “0” represents the linear mask of an internal state bit is 0 for sure, “1” represents the linear mask of an internal state bit is 1 for sure and “U” represents the linear mask of an internal state bit is uncertain.

    Before taking examples to illustrate the modes operation, we introduce two basic properties on modular addition, which establish the foundations of our search method. Property 1[3] is the basic to construct the impossible differentials and property 2[4] is the basic to construct the zero-correlation linear approximations. These two properties introduced differential property and linear approximation property of module 2nrespectively.

    Property 1[3](Differential Property for Module 2n): Givenx,x’,y,y’ ben-bit values,andz=(x+y) mod 2n,z’=(x’+y’) mod 2n. If thei-th (counting from 1) toj-th bits ofx,x’,y,y’ and thei-th carryci,ci' ofx+y,x’+y’ are known, then thei-th toj-th (i<j≤n) bits of Δzcan be obtained, regardless of the values of least significanti-1 bits ofx(orx’),y(ory’).Note that if there are no differences in the least significanti-1 bits ofx+yandx’+y’, thenci=ci'.

    Property 2[4](Linear Approximation Property for Module 2n): In any linear approximationof the modular addition with a non-zero-correlation, the most significant non-zero mask bit for Γx,Γyand Γzis the same.

    Next, let us take some examples to show howModes Operationmanipulates when confronting with certain cipher components.

    As addition, XOR, rotation and branching are basic operations for ARX ciphers, we take these operations as examples to illustrate howModes Operationoperates.

    First of all, let us take a look at how the modes of the output bits are calculated when confronting with rotation, addition, branching and XOR if we consider the differential mode.For simplicity, all the input and output of these operations aren-bit word.

    For simplicity, we denote this operation as

    For simplicity, we denote this operation as

    For simplicity, we denote this operation asmore, the truth table of “⊕ ” operation used in the computation is a natural expansion of bitwise-XOR operation to fit modes operation. Actually, ifMa,Mb∈{“0”, “1”},Ma⊕Mbis just bitwise-XOR operation. If at least one of theMaorMbequals toU,which means the differential of this internal state bit is uncertain, the differential for the output of “⊕ ” is uncertain for sure, so the result is defined asUin the truth table. This supplement for the truth table makes sure the automatic search method works when confronting with all the modes situations.For simplicity, we denote this operation as

    So with the help of these operation rules in differential modes, we can get the modes of the internal states round by round.

    Fig. 3. Modes operation for rotation operation in differential mode.

    Fig. 4. Modes operation for addition operation in differential mode.

    Fig. 5. Modes operation for branching operation in differential mode.

    Next, what if the mode represents the linear mask? Similarly, we consider this problem with the same four operations – rotation, addition, branching and XOR. Also, all the input and output of these operations aren-bit word.

    For simplicity, we denote this operation as

    Fig. 6. Modes operation for XOR operation in differential mode.

    Fig. 7. Modes operation for addition operation in linear mask mode.

    For simplicity, we denote this operation as

    So with the help of these operation rules in linear mask modes, we can get the modes of the internal states round by round.

    3.2 How to construct IDs and ZCLHs using modes operation?

    Modes operation reveals some properties of the internal states, the differential mode reveals the differential status of the internal states and the linear mask mode reveals the linear mask status of the states for non-zero correlations. Given the mode of the plaintext and the mode of the ciphertext, we can use modes operation to deduce the modes of the internal states round by round in two directions. That is to say, start from the mode of the plaintext, round by round, we can get the modes of the internal states for the first few rounds. Start from the mode of the ciphertext,use the decryption algorithm, round by round,we can get the modes of the internal states for the last few rounds. If a mode contradiction appears in the middle of the internal states, an ID or a ZCLH is found. A mode contradiction means that at the same round same bit of the internal states, when we deduce the state mode from the two directions, the mode of this bit is“0” and “1” (or “1” and “0”) at the same time,which makes a contradiction.

    In this paper, we only consider the differential mode and linear mask mode for ARX ciphers. When in the differential mode, through deduction, we can get lots of truncated differential paths of probability one. When we deduce the differential modes in two directions,if a “0” mode (which means the differential of this bit is 0 for sure) meets with a “1” mode(which means the differential of this bit is 1 for sure) at the same round same bit of the internal states, a contradiction occurs thus an ID is constructed. While in the linear mask mode,the process is similar. Through deduction, we can get the linear mask modes of the internal states which have non-zero correlations. When we deduce the linear mask modes in two directions, if a “0” mode (which means the linear mask of this bit is 0 for sure) meets with a “1” mode (which means the linear mask of this bit is 1 for sure) at the same round same bit of the internal states, a contradiction occurs thus a ZCLH is constructed.

    3.3 Automatic ID and ZCLH

    searching method for ARX ciphers

    Complexity analysis

    The complexity of algorithm 1 highly relies on the number of active modes (i.e. non-zero modes).

    ? Usually, if the number of active modes for input and output are both 1, the complexity for algorithm 1 isO(n2).

    ? If we want to go through all the modes of the input and output, the computational complexity of the algorithm 1 isO(32n).For each bit, there are three choices –{0,1,U}, despite all zero cases, there are altogether (3n-1) cases for the input and the output, so the computational complexity

    Fig. 8. Modes operation for branching operation in linear mask mode.

    Fig. 9. Modes operation for XOR operation in linear mask mode.

    ? If the number of active modes for input and output arek1andk2respectively, the computational complexity is

    As for each bit, there are three cases, “0”,

    “1” and “U”.

    During our research, we just search for the single bit modes rather than all the possible input and output modes, which means the computational complexity of our algorithm isO(n2). There are two main reasons for this.Firstly, the scale of the internal states is usually very large, which makes searching the entire input and output modes impossible. Secondly,through calculating, the instance that higher weight input modes or output modes which has longer IDs (or ZCLHs) is usually based on some single-bit input and output modes, and the high weight input modes or output modes can be deduced easily using the encryption and decryption algorithm.

    In phase 1, we should adjust the thresholdNall the time. IfNis too large, there will be no output. IfNis too small, the outputs will be too many.

    In the next section 3.4, we will propose some methods to derive high weight IDs and ZCLHs which can make us get longer and more of these two kinds of distinguishers.

    Algorithm 1. Automatic ID/ZCLH searching method for ARX ciphers Input: Threshold N, modes of the input and output.Output: Longest length of the distinguisher and corresponding modes of the input and output.// Preprocessing Stage 1 M(P) and M(C) represents the modes of the plaintext and ciphertext respectively.Suppose there are totally R rounds for the target cipher and the block size is n,M(Xi) (0≤i≤R) represents the mode of the internal state at the ith round,P=X0 and C=XR.2 Set constraint on the modes of the plaintext and ciphertext. In this stage, we will dene the number of active modes. Usually, the number of active modes for the plaintext and ciphertext are both chosen to be 1.3 Substitute the operations of the round function (denoted as “RF”, the round function of the decryption algorithm is denoted as RF-1) with corresponding modes operation proposed in section 3.1. If we substitute the operations with corresponding operations in differential mode, the round function is denoted as RFD, and if we substitute the operations with corresponding operations in linear mask mode, the round function is denoted as RFL. The variants of round functions are used to calculate the modes of the internal states, thus we can calculate the modes of the internal states round by round.4 Longest Round←0// Search the longest ID and ZCLH 1 for i←1 to n do 2 set M(P):MP ji MP()1 if() 0 else j j===3 for p←1 to n do 4 set M(C):MC qp MC( )1 if( ) 0 else q q===5 for r←1 to R do 6 MPMX MX MC MX MX() ( ) ( );() ( ') ( ' ).= →= →0RF RF D L /r RRF RF D L - -1 1/Rr -7 for u, v←1 to R do 8 if there exist at least one parameter t, which makes MX MX⊕ - =9 if (u+v)>N Return {i, p, u+v}.10 then Longest Round←u+v 11 end 12 end 13 end 14 Return Longest Round.( ) ( )1 uRv tt

    Fig. 10. Modular addition in differential mode and linear mask mode.

    3.4 How to stretch IDs and ZCLHs?

    In this section, we will propose two methods –“Deduction Method” and “Verifying Method”to get more and longer impossible differentials and zero-correlation linear hulls.

    3.4.1 Deduction method

    Ifα→βis an impossible differential (zero-correlation linear hull),By using the decryption algorithm and start withα, if the modes for the following severalNrounds are all “0” or “1” modes, that is to say,without occurrence of “U” mode, we can get a high weight input differential (linear mask) and stretch the ID or ZCLH forNrounds.

    Similarly, by using the encryption algorithm and start withβ, if the modes for the follow severalMrounds are all “0” or “1”modes, that is to say, without occurrence of“U” mode, we can get a high weight output differential (linear mask) and stretch the ID(ZCLH) forMrounds.

    As the addition operation is usually the only non-linear component of an ARX cipher, some differentials or linear masks which can be passed down through addition operation with probability one may be critical in the stretching of the distinguishers. When we consider the differential of module addition, if the differential mode ofxandyare (a,0,0,…,0,0) and(b,0,0,…,0) respectively,aandbrepresent “0”mode or “1” mode. The mode ofzis (a⊕b,0,0,…,0). When we consider the linear mask of module addition, if the linear mask mode ofxis (0,0,…,0,0,1), the modes ofyandzare both(0,0,…,0,0,1). Although these observations are evident, they are useful when we stretch the impossible differentials and zero-correlation linear hulls.

    For example, for SPECK-32 algorithm,using the automatic search method, we find 5 round low weight impossible differential(To simplify the expression, we useabto representbconsecutivea). When extend the distinguisher in the encryption direction by one round, we can get 6 round high weight impossible differential

    3.4.2 Verifying method

    For differential mode, given a low weight impossible differential, if the single bit differential does not appear at the most significant bit, the bits within this word, those positions higher than the position of the single bit differential,can all be defined as “U” modes. For most cases, this method is usually applicable. However,it doesn’t always work. So when using this method, we should verify the impossible differential path to make sure the contradiction occur,so we call this method “Verifying Method”.

    For linear mask mode, given a low weight zero-correlation linear hull, if the single bit linear mask does not appear at the least significant bit, the bits within the word, those positions lower than the position of the single bit linear mask, can all be defined as “U” modes.To be sure, it needs verification too.

    For example, we find one 17 round zero-correlation linear hull for HIGHT: (e0,e1,6,7,the Verifying Method, we prove that all the 128 zero-correlation linear hulls of the form(e0,e1,6,7, 0, 0, 0, 0, 0, 0)(1U7, 0, 0, 0, 0, 0,0, 0) are all 17 round distinguishers.

    We want to note that, usually, by using the Verifying Method, we can get massive new IDs or ZCLHs from a single ID or ZCLH,which can offer more distinguishers for cryptanalysis.

    IV. SOME APPLICATIONS USING AUTOMATIC SEARCH METHOD

    4.1 Brief description on block cipher HIGHT, LEA and SPECK

    HIGHT is a lightweight block cipher proposed in CHES 2006, and then it was adopted as an ISO standard block cipher. It was designed by the Korea Information Security Agency.HIGHT has 32 rounds, with 64-bit block and 128-bit key. Its structure is a generalized Feistel network. For more details on HIGHT,we refer readers to reference [11].

    LEA is proposed by Electronics and Telecommunications Research Institute of Korea in 2013. It provides a high-speed software encryption on general-purpose processors. LEA has 128-bit block size and 128, 192, or 256-bit key size. For more details on LEA, we refer readers to reference [32].

    SPECK is an ultra-lightweight block cipher which was proposed by the U.S. National Security Agency in June 2013. SPECK family is a simple ARX-based Feistel network, which processes the input as two words. For more details on SPECK, we refer readers to reference [13].

    4.2 IDs and ZCLHs on HIGHT, LEA and SPECK

    Using the automatic search method on these ciphers, we can derive some long IDs and ZCLHs. Part of the best results are as follows.

    V. CONCLUSION

    Table IV. Impossible differentials for HIGHT.

    Impossible differential cryptanalysis and zero-correlation linear cryptanalysis are two important and effective cryptanalytic techniques nowadays. Although the impossible differential cryptanalysis and zero-correlation linear cryptanalysis for some ARX ciphers have been proposed, the findings of impossible differentials and zero-correlation linear hulls for ARX ciphers are usually manual work, which has become an obstacle in improving these two attacks. In this paper, automatic impossible differential and zero-correlation linear hull searching method has been proposed for ARX ciphers. The new searching method shows high efficiency in finding longer and more IDs and ZCLHs for ARX ciphers. In this paper, we propose a new concept calledModes Operation, which makes automatic search of IDs and ZCLHs for ARX ciphers possible.However, the automatic search method in this paper just uses two special cases of “Modes Operation”. Whether the “Modes Operation”can be extended to more circumstances is further to be studied. We expect the automatic search tool proposed in this article, especially the idea of modes operation, is not only helpful for evaluating the security of ARX ciphers against impossible differential cryptanalysis and zero-correlation linear cryptanalysis, but also useful in other cryptanalysis and other ciphers.

    Table V. Zero correlation linear hulls for HIGHT.

    Table VI. Impossible differentials for LEA.

    Table VIII. Impossible differentials for SPECK-64.

    Table IX. Zero correlation linear hulls for SPECK-64.

    ACKNOWLEDGEMENTS

    The authors would like to thank the anonymous reviewers for their helpful comments.This work was supported by the National Natural Science Foundation of China under Grant No. 61572516, 61402523, 61202491,61272041 and 61272488.

    [1] A. Bogdanov, V. Rijmen, “Zero correlation Linear Cryptanalysis of Block Ciphers,”IACR Eprint Archive Report 2011/123, March 2011.

    [2] A. Bogdanov, V. Rijmen, “Linear hulls with correlation zero and linear cryptanalysis of block ciphers,”Designs, Codes and Cryptography, vol.70, no. 3, 2014, pp. 369-383.

    [3] J. Chen, M. Wang, B. Preneel, “Impossible Differential Cryptanalysis of the Lightweight Block Ciphers TEA, XTEA and HIGHT,”Proc. AFRICACRYPT 2012, vol. 7374, 2012, pp. 117-137.

    [4] A. Bogdanov, M. Wang, “Zero correlation Linear Cryptanalysis with Reduced Data Complexity,”Proc. Fast Software Encryption-FSE 2012, vol.7549, 2012, pp. 29-48.

    [5] L. Knudsen, “DEAL – A 128-bit Block Cipher,” In:NIST AES Proposal, 1998.

    [6] E. Biham, A. Biryukov, A. Shamir, “Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials,”Proc. EUROCRYPT 1999,vol. 1592, 1999, pp. 12-23.

    [7] E. Biham, O. Dunkelman, N. Keller, “Related-Key Impossible Differential Attacks on 8-round AES-192,”Proc. CT-RSA 2006, vol. 3860, 2006, pp.21-33.

    [8] O. Dunkelman, N. Keller, “An Improved Impossible Differential Attack on MISTY1,”Proc. ASIACRYPTA 2008, vol. 5350, 2008, pp. 441-454.

    [9] Y. Tsunoo, E. Tsujihara, M. Shigeri, T. Saito, T.Suzaki, H. Kubo, “Impossible Differential Cryptanalysis on CLEFIA,”Proc. Fast Software Encryption-FSE 2008, vol. 5086, 2008, pp. 398-411.

    [10] A. Shimizu, S. Miyaguchi, “Fast data encipherment algorithm FEAL,”Proc. EUROCRYPT 1987,1998, pp. 267-278 (1988).

    [11] D. Hong, J. Sung, S. Hong, et al, “HIGHT: A new block cipher suitable for low-resource device,”Proc. Cryptographic Hardware and Embedded Systems-CHES 2006, 2006, pp. 46-59.

    [12] N. Ferguson, S. Lucks, B. Schneier, D. Whiting,M. Bellare, T. Kohno, J. Callas, J. Walker, “The Skein Hash Function Family,” Submission to NIST, 2008.

    [13] R. Beaulieu, D. Shors, J. Smith, et al, “The SIMON and SPECK Families of Lightweight Block Ciphers,” Cryptology ePrint Archive, Report 2013/404, 2013.

    [14] N. Ferguson, D. Whiting, B. Schneier, et al, “Helix:Fast encryption and authentication in a single cryptographic primitive,”Proc.Fast Software Encryption-FSE 2003, 2003, pp. 330-346.

    [15] D. Whiting, B. Schneier, S. Lucks, et al, “Phelix:Fast encryption and authentication in a single cryptographic primitive,” ECRYPT Stream Cipher Project Report, 2005, 27(200): 5.

    [16] D.J. Bernstein, “The Salsa20 family of stream cipher,” New stream cipher designs, 2008, pp. 84-97.

    [17] D.J. Bernstein, “ChaCha, a variant of Salsa20,”Workshop Record of SASC, 2008.

    [18] J.P. Aumasson, L. Henzen, W. Meier, et al, “Sha-3 proposal blake,” Submission to NIST, 2008.

    [19] J.P. Aumasson, S. Neves, Z. Wilcox-O’Hearn, et al, “BLAKE2: simpler, smaller, fast as MD5,”Proc.Applied Cryptography and Network Security,2013, pp. 119-135.

    [20] D. Gligoroski, V. Kl?ma, S.J. Knapskog, et al,“Cryptographic hash function BLUE MIDNIGHT WISH,” Submission to NIST, 2009.

    [21] D.J. Bernstein, “CubeHash specification (2. B. 1) ,”Submission to NIST, 2008.

    [22] D. Gligoroski, R.S. ?degard, M. Mihova, et al,“Cryptographic hash function Edon-R’,”Proc.Security and Communication Networks-IWSCN 2009, 2009, pp. 1-9.

    [23] D.J. Wheeler, R.M. Needham, “TEA, a tiny encryption algorithm,”Proc.Fast Software Encryption-FSE 1995, 1995, pp. 363-366.

    [24] R. Needham, D. Wheeler, “eXtended Tiny Encryption Algorithm”, October 1997.

    [25] D. Wheeler, R. Needham, “XXTEA: Correction to XTEA,” Technical report, Computer Laboratory,University of Cambridge, 1998.

    [26] H. Wu, “The stream cipher HC-128,” New Stream Cipher Designs, 2008, pp. 39-47.

    [27] S. O’Neil, K. Nohl, L. Henzen, “Enrupt hash function specification,” Submission to the NIST SHA-3 competition, 2008.

    [28] J. Kim, S. Hong, J. Sung, C. Lee, S. Lee, “Impossible differential cryptanalysis for block cipher structures,”Proc.INDOCRYPT 2003, vol. 2904,2003, pp. 82-96.

    [29] Y. Luo, X. Lai, Z. Wu, et al, “A unified method for finding impossible differentials of block cipher structures,” Information Sciences, 2014, vol. 263,pp. 211-220.

    [30] S. Wu, M. Wang, “Automatic search of truncated impossible differentials for word-oriented block ciphers,”Proc.INDOCRYPT 2012, vol. 7668,2012, pp. 283-302.

    [31] C. Tezcan, “Impossible Differential Cryptanalysis of Reduced Round HIGHT,” M.Sc. Thesis. Institute of Applied Mathematics, Middle East Technical University, Ankara, TURKEY, July 2009.D

    [32] D. Hong, J.K. Lee, D.C. Kim, D. Kwon, K.H. Ryu,and D.G. Lee, “LEA: A 128-bit block cipher for fast encryption on common processors,”Proc.The 14th International Workshop Information Security Applications (WISA), 2013, pp.3–27.

    [33] L. Wen, M. Wang, A. Bogdanov, and H. Chen,“Multidimensional zero-correlation attacks on lightweight block cipher HIGHT: Improved cryptanalysis of an ISO standard,”Information Processing Letters, vol. 114, no. 6, 2014, pp. 322-330.

    午夜亚洲福利在线播放| 国产麻豆成人av免费视频| 三级毛片av免费| 国产一级毛片在线| 久久鲁丝午夜福利片| 日韩人妻高清精品专区| 国产男人的电影天堂91| 国内精品宾馆在线| 精品久久久久久久久久久久久| 国产伦在线观看视频一区| 22中文网久久字幕| 97在线视频观看| 春色校园在线视频观看| 成人美女网站在线观看视频| 午夜福利网站1000一区二区三区| 爱豆传媒免费全集在线观看| 春色校园在线视频观看| 国产成人精品一,二区| 人体艺术视频欧美日本| 亚洲熟妇中文字幕五十中出| 国产片特级美女逼逼视频| 中文在线观看免费www的网站| 国产黄片美女视频| 精品久久久久久电影网| 高清欧美精品videossex| 亚洲av在线观看美女高潮| 黄色配什么色好看| 99久久精品热视频| 午夜福利在线观看吧| 狠狠精品人妻久久久久久综合| 特级一级黄色大片| 美女主播在线视频| 18禁在线无遮挡免费观看视频| 午夜精品国产一区二区电影 | 日韩,欧美,国产一区二区三区| 免费高清在线观看视频在线观看| 欧美日韩视频高清一区二区三区二| 麻豆乱淫一区二区| 特级一级黄色大片| 哪个播放器可以免费观看大片| 偷拍熟女少妇极品色| 一级黄片播放器| 国产在线男女| 日韩欧美精品v在线| 深爱激情五月婷婷| 男人狂女人下面高潮的视频| 成年版毛片免费区| 亚洲国产精品专区欧美| 亚洲四区av| 国产一区有黄有色的免费视频 | 一夜夜www| 啦啦啦啦在线视频资源| 国产精品.久久久| 国产不卡一卡二| av在线播放精品| 极品教师在线视频| 国产精品一区二区在线观看99 | 超碰97精品在线观看| 国产午夜精品论理片| 黄片无遮挡物在线观看| 国产免费视频播放在线视频 | 亚洲av福利一区| 一本一本综合久久| 日韩在线高清观看一区二区三区| 91av网一区二区| 视频中文字幕在线观看| 亚洲av在线观看美女高潮| 国产男女超爽视频在线观看| 久久久国产一区二区| 在线免费十八禁| 亚洲丝袜综合中文字幕| 黄片无遮挡物在线观看| 一个人观看的视频www高清免费观看| 国产91av在线免费观看| 免费观看av网站的网址| 丰满乱子伦码专区| 特大巨黑吊av在线直播| 在线天堂最新版资源| 黑人高潮一二区| 亚洲四区av| 啦啦啦韩国在线观看视频| 国产免费一级a男人的天堂| 最近最新中文字幕免费大全7| 欧美zozozo另类| 精品99又大又爽又粗少妇毛片| 国产黄片美女视频| 亚洲美女视频黄频| 国产淫片久久久久久久久| 国产成人精品一,二区| 一级毛片黄色毛片免费观看视频| 亚洲真实伦在线观看| 久久久久久久午夜电影| 亚洲欧美清纯卡通| 亚洲精品中文字幕在线视频 | 久久久精品94久久精品| 建设人人有责人人尽责人人享有的 | eeuss影院久久| 69av精品久久久久久| 特大巨黑吊av在线直播| 寂寞人妻少妇视频99o| 一边亲一边摸免费视频| 青春草国产在线视频| 久久精品国产亚洲av涩爱| 精华霜和精华液先用哪个| 国产成人a∨麻豆精品| 午夜久久久久精精品| 天堂中文最新版在线下载 | 久久99热这里只频精品6学生| 成人亚洲精品av一区二区| 一个人看的www免费观看视频| 又大又黄又爽视频免费| 欧美日韩视频高清一区二区三区二| 非洲黑人性xxxx精品又粗又长| 免费观看精品视频网站| 夜夜看夜夜爽夜夜摸| 午夜福利高清视频| 深夜a级毛片| 国产男人的电影天堂91| 欧美zozozo另类| 国产成人aa在线观看| 欧美高清性xxxxhd video| 国产免费又黄又爽又色| 特级一级黄色大片| 国产女主播在线喷水免费视频网站 | or卡值多少钱| 插阴视频在线观看视频| 高清毛片免费看| 在线天堂最新版资源| 亚洲内射少妇av| 少妇熟女欧美另类| 亚洲精品一二三| av在线蜜桃| 看非洲黑人一级黄片| 视频中文字幕在线观看| 成人性生交大片免费视频hd| 精品久久久久久久久久久久久| 青春草视频在线免费观看| 人妻制服诱惑在线中文字幕| 日韩人妻高清精品专区| 久久国产乱子免费精品| 一边亲一边摸免费视频| 嫩草影院入口| 99热这里只有是精品在线观看| 国产大屁股一区二区在线视频| 国产伦在线观看视频一区| 日韩欧美 国产精品| 国产精品av视频在线免费观看| 免费大片18禁| 日本一本二区三区精品| 亚洲精品日韩在线中文字幕| 日本爱情动作片www.在线观看| 亚洲精品乱码久久久v下载方式| 永久网站在线| 丝袜美腿在线中文| 十八禁国产超污无遮挡网站| 街头女战士在线观看网站| 成人午夜高清在线视频| 成人午夜精彩视频在线观看| 搡女人真爽免费视频火全软件| 插阴视频在线观看视频| 搞女人的毛片| 777米奇影视久久| 99热这里只有是精品在线观看| 国产黄片美女视频| 最近视频中文字幕2019在线8| 欧美 日韩 精品 国产| 99视频精品全部免费 在线| 高清av免费在线| 国产精品伦人一区二区| 精品不卡国产一区二区三区| 99九九线精品视频在线观看视频| 日本一本二区三区精品| 国产精品无大码| 丰满少妇做爰视频| 亚洲性久久影院| 日韩制服骚丝袜av| 亚洲成人久久爱视频| 人妻制服诱惑在线中文字幕| 久久精品综合一区二区三区| 成人亚洲精品av一区二区| 身体一侧抽搐| 丝袜美腿在线中文| 欧美潮喷喷水| 又大又黄又爽视频免费| 精品人妻熟女av久视频| 99视频精品全部免费 在线| 日韩强制内射视频| 十八禁国产超污无遮挡网站| 少妇被粗大猛烈的视频| 狂野欧美白嫩少妇大欣赏| 少妇熟女aⅴ在线视频| 国产精品一区二区三区四区久久| 亚洲精品456在线播放app| 大陆偷拍与自拍| 狂野欧美激情性xxxx在线观看| 亚洲久久久久久中文字幕| 1000部很黄的大片| 精品久久久久久久末码| 欧美激情国产日韩精品一区| 亚洲内射少妇av| 午夜福利成人在线免费观看| 1000部很黄的大片| 97热精品久久久久久| 80岁老熟妇乱子伦牲交| 日韩欧美三级三区| 亚洲国产精品成人久久小说| 少妇的逼水好多| 国产乱人视频| av又黄又爽大尺度在线免费看| 国产在视频线精品| 老女人水多毛片| 色综合色国产| 日韩不卡一区二区三区视频在线| av在线播放精品| 99久国产av精品| 一级黄片播放器| 午夜免费观看性视频| 天天躁夜夜躁狠狠久久av| 国产精品三级大全| 性色avwww在线观看| 成人国产麻豆网| 亚洲国产精品成人综合色| 亚洲精品456在线播放app| 在线播放无遮挡| 亚洲精品日韩在线中文字幕| 噜噜噜噜噜久久久久久91| 啦啦啦啦在线视频资源| 国产成人一区二区在线| 免费看a级黄色片| 久久6这里有精品| 观看免费一级毛片| 精品熟女少妇av免费看| 亚洲国产欧美在线一区| 欧美xxxx黑人xx丫x性爽| 久久精品国产鲁丝片午夜精品| 成人高潮视频无遮挡免费网站| 国产极品天堂在线| or卡值多少钱| 午夜爱爱视频在线播放| 亚洲av成人精品一区久久| 国内精品美女久久久久久| 亚洲精品色激情综合| 在现免费观看毛片| 中文字幕久久专区| 亚洲精品aⅴ在线观看| 亚洲熟妇中文字幕五十中出| 久久韩国三级中文字幕| 成年av动漫网址| 99re6热这里在线精品视频| 国产精品一区二区三区四区久久| 极品少妇高潮喷水抽搐| 日韩不卡一区二区三区视频在线| 免费看日本二区| ponron亚洲| 丰满少妇做爰视频| 看十八女毛片水多多多| 校园人妻丝袜中文字幕| 日韩在线高清观看一区二区三区| 色哟哟·www| 国产乱人偷精品视频| 久久99精品国语久久久| 国产麻豆成人av免费视频| 精品国产露脸久久av麻豆 | 特大巨黑吊av在线直播| 自拍偷自拍亚洲精品老妇| 亚洲精品日本国产第一区| 国产精品1区2区在线观看.| 青春草亚洲视频在线观看| 国产免费又黄又爽又色| 丰满人妻一区二区三区视频av| 久热久热在线精品观看| 国产午夜精品久久久久久一区二区三区| 欧美日韩国产mv在线观看视频 | 午夜免费观看性视频| 七月丁香在线播放| 直男gayav资源| 亚洲成人精品中文字幕电影| 少妇熟女欧美另类| 午夜日本视频在线| 乱系列少妇在线播放| 精品国产露脸久久av麻豆 | 少妇的逼水好多| 免费不卡的大黄色大毛片视频在线观看 | 精品熟女少妇av免费看| 国语对白做爰xxxⅹ性视频网站| 日韩国内少妇激情av| 夫妻午夜视频| 久久久a久久爽久久v久久| 黄片wwwwww| 国产视频内射| 国内少妇人妻偷人精品xxx网站| 最近手机中文字幕大全| 亚洲成人av在线免费| 日本免费a在线| 欧美变态另类bdsm刘玥| 精品午夜福利在线看| 亚洲国产精品国产精品| 99久久精品热视频| 亚洲图色成人| 看非洲黑人一级黄片| 国产精品一二三区在线看| 成人毛片a级毛片在线播放| 欧美成人一区二区免费高清观看| 女人久久www免费人成看片| 免费看美女性在线毛片视频| 天堂av国产一区二区熟女人妻| 在线观看一区二区三区| 亚洲国产成人一精品久久久| 五月伊人婷婷丁香| 国产美女午夜福利| 成年女人看的毛片在线观看| 日本一二三区视频观看| 高清午夜精品一区二区三区| 国语对白做爰xxxⅹ性视频网站| 精品酒店卫生间| 精品一区在线观看国产| 久久久久久久久中文| 国产男人的电影天堂91| 成人综合一区亚洲| 国产成人精品婷婷| 免费人成在线观看视频色| 国产 亚洲一区二区三区 | 国产69精品久久久久777片| 天天躁夜夜躁狠狠久久av| 2021少妇久久久久久久久久久| 国产男女超爽视频在线观看| 免费观看无遮挡的男女| 免费无遮挡裸体视频| 日韩成人av中文字幕在线观看| 97超碰精品成人国产| 麻豆国产97在线/欧美| 乱码一卡2卡4卡精品| 搡女人真爽免费视频火全软件| 亚洲国产成人一精品久久久| 国产真实伦视频高清在线观看| 97精品久久久久久久久久精品| 在线天堂最新版资源| 国产精品久久视频播放| 成人亚洲欧美一区二区av| 国产精品久久久久久av不卡| 夫妻性生交免费视频一级片| 精品久久久精品久久久| 你懂的网址亚洲精品在线观看| 亚洲国产精品成人综合色| 国产一区二区三区综合在线观看 | 一级a做视频免费观看| 国产日韩欧美在线精品| 久久人人爽人人爽人人片va| 亚洲天堂国产精品一区在线| 午夜日本视频在线| 日韩av在线大香蕉| 亚洲丝袜综合中文字幕| 男女边吃奶边做爰视频| 秋霞伦理黄片| 精品一区在线观看国产| 午夜免费男女啪啪视频观看| 激情 狠狠 欧美| 免费av观看视频| 丰满乱子伦码专区| 中国美白少妇内射xxxbb| 国产精品爽爽va在线观看网站| 赤兔流量卡办理| 国产一区二区亚洲精品在线观看| 亚洲人成网站在线观看播放| 成人漫画全彩无遮挡| 91精品一卡2卡3卡4卡| 欧美另类一区| 亚洲精品一二三| 国产精品日韩av在线免费观看| av专区在线播放| 日日撸夜夜添| 国产视频内射| 神马国产精品三级电影在线观看| 国产亚洲一区二区精品| 亚洲熟女精品中文字幕| 国产色婷婷99| 国产国拍精品亚洲av在线观看| 中文字幕久久专区| 成人特级av手机在线观看| a级一级毛片免费在线观看| 一边亲一边摸免费视频| 久久久欧美国产精品| 男女国产视频网站| 国产伦一二天堂av在线观看| 久久6这里有精品| 99久久九九国产精品国产免费| 国产黄片视频在线免费观看| 黄色配什么色好看| 欧美成人一区二区免费高清观看| 永久网站在线| 最近2019中文字幕mv第一页| 亚洲精品,欧美精品| 久久精品久久久久久久性| 日韩欧美精品v在线| 国产单亲对白刺激| 看非洲黑人一级黄片| 内地一区二区视频在线| 国产精品国产三级国产av玫瑰| 久久久a久久爽久久v久久| 日韩欧美三级三区| 成人欧美大片| 日本猛色少妇xxxxx猛交久久| 啦啦啦韩国在线观看视频| 丰满人妻一区二区三区视频av| 国产综合懂色| 亚州av有码| 免费人成在线观看视频色| 色综合站精品国产| 亚洲,欧美,日韩| 一区二区三区四区激情视频| 成人亚洲欧美一区二区av| 最近手机中文字幕大全| 国产爱豆传媒在线观看| 色视频www国产| av国产免费在线观看| 免费黄网站久久成人精品| 九九久久精品国产亚洲av麻豆| 国产在视频线在精品| 菩萨蛮人人尽说江南好唐韦庄| 又爽又黄a免费视频| 日韩三级伦理在线观看| 精品久久久久久久人妻蜜臀av| 搡老乐熟女国产| 熟妇人妻久久中文字幕3abv| 美女内射精品一级片tv| 永久网站在线| 少妇熟女欧美另类| 少妇被粗大猛烈的视频| 最近最新中文字幕大全电影3| 国产成人精品婷婷| 97超碰精品成人国产| 一级二级三级毛片免费看| 亚洲最大成人中文| 国语对白做爰xxxⅹ性视频网站| 日本黄大片高清| 欧美xxxx性猛交bbbb| 久久99蜜桃精品久久| 欧美日韩亚洲高清精品| 免费电影在线观看免费观看| 久久久精品免费免费高清| av在线天堂中文字幕| 国产一区二区三区综合在线观看 | 国产高清国产精品国产三级 | 亚洲人成网站在线观看播放| 欧美一区二区亚洲| 国产精品.久久久| 午夜免费激情av| 国产高潮美女av| 青春草国产在线视频| 精品久久久久久久久亚洲| 久久精品国产亚洲av天美| 久久久成人免费电影| 天堂网av新在线| 国产视频首页在线观看| 国产毛片a区久久久久| 日韩欧美精品免费久久| 久久热精品热| 如何舔出高潮| 免费不卡的大黄色大毛片视频在线观看 | 97人妻精品一区二区三区麻豆| 欧美高清性xxxxhd video| 久久久久久久久久黄片| 80岁老熟妇乱子伦牲交| 天天躁夜夜躁狠狠久久av| 麻豆乱淫一区二区| 黄片wwwwww| 免费黄频网站在线观看国产| 久久久精品94久久精品| 国内精品一区二区在线观看| 亚洲国产最新在线播放| 亚洲精品aⅴ在线观看| 韩国高清视频一区二区三区| 日韩伦理黄色片| 国产高清三级在线| 青春草亚洲视频在线观看| 99久久九九国产精品国产免费| 一区二区三区免费毛片| 久久热精品热| 成人亚洲精品av一区二区| 亚洲欧美成人综合另类久久久| 国产成人精品一,二区| 亚洲最大成人av| www.av在线官网国产| 婷婷色综合www| 男女啪啪激烈高潮av片| 日韩一区二区三区影片| 亚洲真实伦在线观看| 亚洲精品日本国产第一区| 国产一级毛片七仙女欲春2| 天美传媒精品一区二区| 国产色爽女视频免费观看| 日日撸夜夜添| 老师上课跳d突然被开到最大视频| 美女主播在线视频| 欧美极品一区二区三区四区| 91aial.com中文字幕在线观看| 97精品久久久久久久久久精品| 欧美精品一区二区大全| 好男人在线观看高清免费视频| 国产精品久久久久久久电影| 六月丁香七月| 熟妇人妻久久中文字幕3abv| 日本免费a在线| 伊人久久精品亚洲午夜| 午夜亚洲福利在线播放| av在线亚洲专区| 乱人视频在线观看| 亚洲无线观看免费| 国国产精品蜜臀av免费| 国产激情偷乱视频一区二区| 夫妻午夜视频| 小蜜桃在线观看免费完整版高清| 国产精品日韩av在线免费观看| 欧美变态另类bdsm刘玥| 日韩强制内射视频| 亚洲国产日韩欧美精品在线观看| 一级二级三级毛片免费看| 欧美+日韩+精品| 国产精品精品国产色婷婷| 高清视频免费观看一区二区 | 日本熟妇午夜| 一本一本综合久久| 哪个播放器可以免费观看大片| 亚洲av成人精品一区久久| 免费看美女性在线毛片视频| 夜夜看夜夜爽夜夜摸| 国产亚洲一区二区精品| 在线免费观看的www视频| 日韩成人伦理影院| 午夜老司机福利剧场| 男人舔奶头视频| 日本三级黄在线观看| 久久久精品94久久精品| av天堂中文字幕网| 国产成人aa在线观看| 精品国产三级普通话版| 国产成人精品一,二区| 一级毛片久久久久久久久女| 欧美日韩一区二区视频在线观看视频在线 | 亚洲精品影视一区二区三区av| 22中文网久久字幕| 99久久人妻综合| 丰满乱子伦码专区| 色网站视频免费| 国产成人aa在线观看| 国产精品av视频在线免费观看| 午夜视频国产福利| 在线观看免费高清a一片| 久久久亚洲精品成人影院| 国产91av在线免费观看| 丰满乱子伦码专区| av福利片在线观看| 99热这里只有是精品在线观看| 日韩大片免费观看网站| 尾随美女入室| 国产在视频线精品| 国产精品国产三级专区第一集| 亚洲天堂国产精品一区在线| 免费大片18禁| 精品一区二区三区人妻视频| 国产精品久久久久久久久免| 日韩av免费高清视频| 国产黄片美女视频| 99热全是精品| 亚洲精品乱久久久久久| 亚洲欧美日韩东京热| 午夜爱爱视频在线播放| 久久99热这里只有精品18| 久久亚洲国产成人精品v| 国产亚洲av嫩草精品影院| 日韩欧美精品v在线| 欧美97在线视频| 色播亚洲综合网| 日韩人妻高清精品专区| 日韩欧美国产在线观看| 日本免费a在线| 亚洲精品aⅴ在线观看| av一本久久久久| 免费av不卡在线播放| 国产视频内射| 亚洲av成人av| 大香蕉久久网| 亚洲人与动物交配视频| 我的女老师完整版在线观看| 日韩国内少妇激情av| 国产片特级美女逼逼视频| 精品久久久久久久久亚洲| 亚洲丝袜综合中文字幕| 国模一区二区三区四区视频| 91aial.com中文字幕在线观看| 日韩视频在线欧美| 欧美成人a在线观看| 久久99精品国语久久久| 久久久a久久爽久久v久久| av在线播放精品| 亚洲精品亚洲一区二区| 男女那种视频在线观看| 欧美性感艳星| 国产男女超爽视频在线观看| 国产亚洲精品久久久com| 亚洲精品成人久久久久久| 波多野结衣巨乳人妻| 少妇猛男粗大的猛烈进出视频 | 在线观看一区二区三区| 免费av观看视频| 国产精品熟女久久久久浪| 亚洲欧洲国产日韩| 日韩成人伦理影院| 男人爽女人下面视频在线观看| 日韩制服骚丝袜av| 内射极品少妇av片p| 亚洲欧美一区二区三区国产| 亚洲一级一片aⅴ在线观看| 免费大片黄手机在线观看| 久久国产乱子免费精品|