• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Invariant of Enhanced AES Algorithm Implementations Against Power Analysis Attacks

    2022-08-24 12:57:08NadiaMustaqimAnsariRashidHussainSheerazArifandSyedSajjadHussain
    Computers Materials&Continua 2022年7期

    Nadia Mustaqim Ansari, Rashid Hussain, Sheeraz Arifand Syed Sajjad Hussain

    1Department of Electronic Engineering, Dawood University of Engineering & Technology, Karachi, Pakistan

    2Faculty of Engineering Sciences and Technology, Hamdard University, Karachi, Pakistan

    3Faculty of Information Technology, Salim Habib University, Karachi, Pakistan

    4Faculty of Computer Sciences, SZABIST, Karachi, Pakistan

    Abstract: The security of Internet of Things (IoT) is a challenging task for researchers due to plethora of IoT networks.Side Channel Attacks (SCA)are one of the major concerns.The prime objective of SCA is to acquire the information by observing the power consumption, electromagnetic (EM)field, timing analysis, and acoustics of the device.Later, the attackers perform statistical functions to recover the key.Advanced Encryption Standard (AES)algorithm has proved to be a good security solution for constrained IoT devices.This paper implements a simulation model which is used to modify the AES algorithm using logicalmasking properties.This invariant of the AES algorithm hides the array of bits during substitution byte transformation of AES.This model is used against SCAand particularly Power Analysis Attacks(PAAs).Simulation model is designed on MATLAB simulator.Results will give better solution by hiding power profiles of the IoT devices against PAAs.In future, the lightweight AES algorithm with false key mechanisms and power reduction techniques such as wave dynamic differential logic (WDDL)will be used to safeguard IoT devices against side channel attacks by using Arduino and field programmable gate array (FPGA).

    Keywords: Side channel attacks; power analysis attacks; network security;masking; advance encryption standard

    1 Introduction

    Internet-of-things (IoT) establishes connections between billions of smart devices, performing a diverse range of purposes.Connected devices will grow to almost 31 billion in the world of IoT [1].These devices embedded with sensors, software to exchange and collect data with each other.In the early era, IoT was used only by specific people which were related to media and researchers.Day by day, most of the people taking interest in IoT.Some research areas in security of IoT devices are predictions and prevention of security issues, protected applications of the web, attacks of IoT devices,size of devices, performance of devices, power usage of devices, recognition of devices, and confirm availability at high demand.So, in 2008 first international conference was held in Switzerland on the topic of IoT.Twenty-three different countries participated in that conference and gave their input to explore the IoT world [2].

    According to a published report in 2013, revenue generation using IoT-based devices, will be more than 300 billion by the end of the 20thcentury.So, when more devices communicate with each other than network complexity and hardware security will increase.By Statista (a statistical website)the number of devices around the world used for IoT network will noticeably increase from 20.35 billion to 75.44 billion from 2017 to 2025.Now researchers are working to explore the security of constrained devices including integrated circuits, microcontrollers, sensors, and wearable gadgets,among other similar hardware.With the exponential increase of its infrastructure, there are plethora security concerns.Hardware attacks are categorized by hardware trojan, side channel analysis, fault attacks, counterfeit chips, and reverse engineering [3].

    Side channel analysis is more considerable attack for the researchers.This attack involves analyzing the external outputs of the hardware and retrieving the information.Side channel attacks(SCA) is most powerful attack against encryption, but this attack is hard to implement.Initially, SCA was implemented at the edge node level.At this level, SCA are usually non-invasive and intentionally leaked information is extracted.Untraceable is the important characteristic of non-invasive attack and the result of this property is the addition of noise to the information which is leaked and hard to secure the whole process.SCAs based on processing time or power consumption of the device rather than plaintext or ciphertext messages.This information is observed during the computation of different security protocols.The process of SCA is to recover the information processed in Advanced Encryption Standard (AES) algorithm encrypted enable device by observing the power consumption,electromagnetic (EM) field, timing analysis, and acoustics of the devices as shown in Fig.1 [4].

    Figure 1: Working of side channel analysis

    The most effective type of SCAs is power analysis attacks (PAAs) as they are easy to achieve in exercise and at relatively low cost for attackers.PAAs works on power calculation.Every PAA mechanism needs the usage of a particular power model of the IoT device for the forecast of the real power to be consumed by the device, by the observing specific procedure of the algorithm and choosing the output word for the attack because the power consumption of electronic circuits based on the bit word-processed by themselves.The power model is developed considering the logical characteristics of the data word.After that, consumption of actual power and power model are compared by using different variables.IoT devices operate at low power because they have short storage and complicated process; hence the algorithm may fail, and devices become corrupted.All mentioned reasons are very much helpful for PAA [5-7].

    Simple power analysis (SPA), Differential power analysis (DPA) and Correlation power analysis(CPA) are the main types of PAAs.In SPA, a single display shows the power trace of a cryptographic device and tries to establish the secret key based on the electrical levels over time.In DPA, statistical techniques are used to recognize differences in power traces, thus showing data leakage to guess the secretkey.Generally,in secret key.Generally, in CPAto identify the correlation between predicted output and the actual power output of an encrypted device by using the hamming weight power model [8].

    Researchers use countermeasures for SCA and categorize them into masking techniques, hiding techniques, and code morphing techniques.Hiding relates to the hardware of the system and masking relates to changes in the algorithm through software [9].When the function of cryptographic devices is performed then attackers perform DPA and apply statistical function on measured power consumption traces to recover the secret key [10].The security of IoT devices should achieve a certain level without an increase in area and performance overhead by using reconfigurable voltage regulators [11].Masking is a countermeasure against SCA, since it enhances the security.It can break the dependence between the power consumption and the intermediate values in the cryptographic algorithm.Following are the different types of masking schemes: Boolean masking, additive masking,multiplicative masking, mixed masking, gate level and algorithmic level masking [12].

    In this manner, the National Institute of Science and Technology (NIST) endorsed the AES,in 2001.Higher security levels and low complexity are characteristics of AES.This algorithm has proved to be a good security solution for constrained IoT devices [13].AES requires large memory size because it has 800 bytes of lookup tables, and if system wants more secure then increase the number of lookup tables as well as increase capacity.AES algorithm ensures stronger cloud-based secure storage.AES-128 offers more secure system, faster encryption speed and gives better throughput compared to another encryption algorithm.But still, improvement will further reduce hardware dependency,provide more security, and minimize overheads on the data [14].

    AES is the most powerful symmetrical algorithm against SCA and is designed based on a block cipher.It plays a vital role in securing the network from attackers.It is supported for data privacy [15].AES has four transformations:

    1.Add Round Key 2.Substitution Byte 3.Shift Rows 4.Mix Column

    Add a round key based on key extension algorithm.This algorithm runs parallel to the AES rounds and provides the key for each round.It has three functions.

    1.Rotation Word 2.Substitution Word 3.Round Constant

    One round of AES consists of 2 layers:

    1.Non-linear Layer: Substitution Byte transformation is only non-linear function in AES.

    2.Linear Layer

    a) Shift Rows is a linear part of the AES.b.Mix column is a linear part of the AES.

    As above define the substitution byte is the only non-linear function and based on the values of Substitution Box (S-BOX) for encryption and INVERSE S-BOX for the decryption process.The backbone of the cryptographic system is S-BOX because of its non-linear property.It is based on substitution-permutation networks (SPNs) and built by Galois Field for the AES and Data Encryption Standard (DES) algorithm.Attackers use‘S’boxes for differential attacks [16].Using a polymorphic variant of the Advanced Encryption Standard (P-AES) increases data safety.The values will change with each new key in P-AES and in basic AES, Substitution Bytes, Shift Rows and Mix Columns transforms have been made dependent on the keys [17].

    This research paper adequately investigates the literature on AES and their types in the IoT.Compares different encryption algorithms, then we analyze and explore the characteristics of AES which is used to provide security of different IoT devices.For prevention of SCAs on IoT devices,a proposed model is presented.This paper implements and resurrects a model which is based on enhancementofthe enhancement of the AES algorithm using logicalmasking property and demonstrates hardware attacks with countermeasure algorithms on IoT devices comprehensively.This enhanced AES invariant algorithm masks the bit array by using the masking technique in converting AES substitution bytes effectively.This model is used for SCAs and particularly PAAs.Simulation model is designed on the MATLAB simulator by using a script.Results will validate and provide a better solution by hiding the power profile of IoT devices from the AES [18].

    The rest of this research paper is organized as follows: In Section 2 methodology is present.Section 3 defines the implementation environment of the model.Section 4 shows the procedure and results.Section 5 defines the research contributions.Section 6 discusses the results obtained by implementing the proposed model.Section 7 shows the conclusions and future work of the research paper.

    2 Methodology

    In literature the expansion of demand pushes towards improving information encryption algorithms.Cryptographic algorithms are used to provide security of the IoT devices, and it helpsminimize the total implementation cost and covers various parameters such as power consumption, key size, throughput rate, and cycle rate.Symmetric lightweight and asymmetric lightweight ciphers are the types of lightweight cryptography.To cope with attacks, we have different encryption algorithms: As Tab.1, shows comparison of some encryption algorithm details which are used to secure the hardware of IoT environment.All algorithms have different pros and cons, but all mentioned algorithms, IoT devices support AES algorithm.To secure the data AES and RSA (Rivest-Shamir-Adleman) algorithm are used.DES (Data Encryption Standard) and 3DES (Triple Data Encryption Standard) isn’t secure any longer and it can be broken easily.TWOFISH and BLOWFISH are slower than AES in terms of processing time.In RC2 (Rivest Cipher), encryption operation is not equal to decryption operation.RC5 andRC6 are now outdated.CAST (Carlisle Adams and Stafford Tavares) is less secure because it is open access algorithm.IDEA (InternationalData Encryption Algorithm) has many weak keys by design.DSA (Digital Signature Algorithm) is only used for authentication of data.ECC (Elliptic Curve Cryptography) has less computational power.Speed of ELGAMAL is low because memory size of ciphertext is double as plain text.SPECK specifically used for hardware attacks such as side channel attack and LiCi used to increase efficiency,minimize area, and lowenergy consumption of the system [19-22].

    Table 1: Comparison of cryptographic algorithms [19-22]

    Table 1: Continued

    The idea behind our design is to secure the data by using encryption algorithm.Fig.2 is the generalized flow chart of the proposed work.So, we will discuss highlighted boxes 1 and 2.First box is“Perform AES for encryption”and the second box is“Perform AES for decryption”.In this part all the transformations have different properties and different values like add round key, substitution byte,shift rows, and mix column for encryption.Inverse substitution byte, Inverse shift rows and Inverse mix column for decryption.Attackers mainly observe the power consumption at a non-linear part of the AES, i.e., Substitution Byte and Substitution Word in add round key algorithm.Both of functions based on S-BOX.

    Figure 2: General flow chart of the proposed technique

    3 Implementation Environment

    Software tools and platform used to implement proposed algorithm is described in Tab.2.

    Table 2: System specification for implants

    MATLAB is specially developed for engineers and scientists.It allows the creation or expression of matrices and mathematical tables directly.The use of toolboxes is very important.All toolboxes work together and integrate with parallel computer environments.In MATLAB several algorithms are directly accessible and used in design, interactive applications with immediate visual display with minimal time.Researchers can alter or replicate their work until they get the outcome as they want[23].AES design onmatrix.Plain text and key length, both consist ofmatrix.Similarly,MATLAB also works on a matrix so, it is easy to manipulate and use by researchers to implement AES in MATLAB and obtain desired results with graphic representation.

    4 Procedure and Results

    In this section, we have improved the characteristics of the AES algorithm by using a logical masking technique in substitution byte transformation.Here are the steps to redesign and use the AES algorithm in a special way.

    i.Enter a plain text as string value from user.

    ii.Take an input key as string value from user.

    iii.Both inputs have string properties, so, convert them into decimal numbers by using the DOUBLE ( ) function of MATLAB.

    iv.By Key Expansion Algorithm generates round keys for every round of AES simultaneously.

    v.Then run the XOR operation between the plain text and the 1st round key using the BITXOR( ) function of MATLAB.

    vi.We now have 16 distinct values.These values overwrite the S-BOX values.

    vii.We use S-BOX for the encryption process.

    viii.S-BOX is 16 x 16 array with decimal values.It means that this box has 16 rows and 16 columns in hexadecimal form start from 0 to F.

    ix.The 16 values mentioned in step no.(vi) are replaced by the values of S-BOX.

    x.Now shift rows transformation is performed by using circshift( ) function in MATLAB.

    xi.Similarly, Mix Column transformation is carried out by the Galois Field array function.

    xii.In last the output matrix performed XOR operation with round keys.

    xiii.Step no.(xii) is the last step of the 1st round.Likewise, the remaining rounds are conducted one by one and generate a new matrix using loop iterations.

    xiv.Finally, after 10th round, we have a ciphertext as shown in Fig.3.

    Figure 3: Output from the AES algorithm

    Furthermore, the algorithm converts all values into hexadecimal values as 27 is a decimal number and 1B is a hexadecimal conversion of this number.Thus, 1 and B convert addresses of rowand column.This means that 1 row and B column contain the value 175 and replaced by 27.Simultaneously, all the valuesreplaced bytheir specific rowand column.In the decryption process, we use inverse SBOX table in substitution bytes and key expansion algorithm process of AES by using reverse key mechanism.Therefore, starting with SBOX, value of 8th row and 8th column is C4 in hexadecimal and 196 in decimal, this value is generated by the mentioned steps.All input values are replaced by specific SBOX values, and the collective data are sent to the next transformations of AES, which is shift rows and mix column.To process S-box transformations, we propose to use a new SBOX lookup table which is recalculated each time when AES is performed.

    Algorithm 1:1.For i = 1 to 10 do 2.For j = 1 to 16 do 3.T(i, j)←A(i, j) *B(j)⊕C 4.Return R

    The variable i and j are used for the loop structure and R is the return value after process the equation.When we apply MATLAB code for the above flow diagram, then the output is given below:

    Algorithm 2:1.For j=1 to 10 do 2.Ciphertext = AES output⊕Round keys (j)3.For i=1 to 16 do 4.If (output values)>0 && (output values<= 128)5.Then apply logical mask for 5 6.Else apply logical mask for 0

    When we apply the proposed algorithm in the above code the result is given below:

    In Fig.4, graph shows the output values of 1stto 10thround of AES algorithm without implementation of masking property as define in algorithm 1.The graph has 16 different values with a different power level, so attackers execute statistical functions on a set of measured energy consumption tracks to retrieve the secret key.Likewise, the graph shows in Fig.5, the output of 10 rounds of the AES algorithm with the implementation of the proposed masking property as defined in Algorithm 2, in the code section of the script in MATLAB.We select two levels, i.e., 0 and 5.Level 0 shows low level of power and 5 shows high level of power in algorithm 2, the masking logic is applied so that the result displayed in Fig.5.The graph shows the output values from the 1stto 10throunds of AES.The chart has 16 different values with the same power level as the previous one, so attackers face the challenge of observing different energy consumption values.The unit of y-axis is power in watt and x-axis labels are number of rounds of AES i.e., 1, 2, 3, ....16.

    Figure 4: (Continued)

    Figure 4: Result of Algorithm 1

    Figure 5: (Continued)

    Figure 5: Result of Algorithm 2

    5 Research Contributions

    This paper is extended version of“Invariant of AES algorithm implementations against side channel attacks in IoT devices”, which was presented in ICCOINS 2021 conference and published in IEEE Xplore.In this paper, we work on hiding the power traces of encrypted text using masking technique and get result from the simulation model design on MATLAB.The basic design of simulation was performed in published paper.This paper was based on proposal of generalize AES implementation on MATLAB.

    6 Discussion

    Attackers analyze different values per differential power analysis (DPA) and retrieve the key.Moreover, this process takes a long time.Thousands of patterns are analyzed by DPA, but attackers perform this activity.Thus, with the help of the proposed algorithm attackers cannot analyze the power and fail to retrieve the key.Also, many researchers provide better solutions against PAAs with different masking techniques like Boolean masking.Results will provide a better solution than that available in the literature to protect IoT device infrastructure against side channel attacks.Temperature and humidity data from the DHT11 and DHT22 sensors will be used as a preliminary experimental configuration.During the attack scenario stages, we will consider clock sampling, which is the vulnerable parameter of the sensor through the correlation analysis.During the counter-measures phase, the data from DHT11 and DHT22 sensors will go through industry standard for encrypting and decrypting hex strings using AES-128.This analysis will be used as a benchmark for the proposed method.

    7 Conclusions and Future Work

    This paper implements and resurrects a model which is based on the enhancement of the AES algorithm using logical masking property and demonstrates hardware attacks with countermeasure algorithms on IoT devices comprehensively.This enhanced AES invariant algorithm masks the bit array by using the masking technique in converting AES substitution bytes effectively.The model is used for SCAs and PAAs.The simulation model is designed on the MATLAB simulator by using a script.All the results of AES rounds shows that different values occur in each round.These values can be easily analyzed by the attacker with the help of PAA attack.When we apply algorithm 2 on MATLAB, all the different values give an equal power level and hide the different power level.The results will validate and provide a better solution by masking the power profile of IoT devices with respect to SCA.

    When we apply algorithm 2 in MATLAB, all the different values have the same value and hide the different power.This analysis will provide a reference point for the proposed method.In the future,thelightweight AES algorithmwith the proposedfalse keymechanism and powerreduction technique such as wave dynamic differential logic (WDDL) will be used to safeguard IoT devices against side channel attacks by using Arduino and field programmable field array (FPGA).

    The results have been implemented using 128-bit AES codes available on GitHub Community Forum and the MATLAB function and codes available online for the initial implementation [24].

    Acknowledgement:This paper is an extended version of “Invariant of AES algorithm implementations against side channel attacks in IoT devices”, which was presented at ICCOINS 2021 conference and published in IEEE Xplore.This work was carried out with the support of Y.Weize and S.Kose,“A Lightweight Masked AES Implementation for Securing IoT Against CPA Attacks,”IEEE Transactions on Circuits and System, vol.64, no.11, pp.2934-2944, 2017.This work is an extension of author’s PhD.Research proposal from Hamdard University.The results have been implemented using Advanced Encryption Standard (AES) 128-Bit codes available GitHub Community Forum and MATLAB Function and codes available online for the purpose of initial implementation.

    Funding Statement:This work partially supported by theResearch Committee ofHamdard University,Karachi Pakistan (www.hamdard.edu.pk) and partially supported by the Office of Research Innovation & Commercialization (ORIC) of the Dawood University of Engineering & Technology Karachi Pakistan (www.duet.edu.pk).

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the recent study.

    国产三级中文精品| 两性午夜刺激爽爽歪歪视频在线观看| 国产精品麻豆人妻色哟哟久久 | 免费在线观看成人毛片| 日本爱情动作片www.在线观看| 久久这里只有精品中国| 精品人妻视频免费看| 日本成人三级电影网站| 青春草视频在线免费观看| 久久久色成人| 国产成人精品婷婷| 久久人人精品亚洲av| 国产女主播在线喷水免费视频网站 | 麻豆乱淫一区二区| 免费大片18禁| 亚洲av免费在线观看| 国产av在哪里看| 三级经典国产精品| 欧美最黄视频在线播放免费| 亚洲一区高清亚洲精品| 卡戴珊不雅视频在线播放| 成年女人永久免费观看视频| 男人舔女人下体高潮全视频| 1000部很黄的大片| 熟妇人妻久久中文字幕3abv| 特大巨黑吊av在线直播| 午夜激情欧美在线| 日韩欧美精品免费久久| 噜噜噜噜噜久久久久久91| 日日撸夜夜添| 久久欧美精品欧美久久欧美| 人体艺术视频欧美日本| 看黄色毛片网站| 久久久久久久久久久丰满| 国产亚洲欧美98| 国产亚洲精品久久久com| 最近视频中文字幕2019在线8| 亚洲av男天堂| 国产精品一区二区性色av| 国产伦在线观看视频一区| 99热这里只有精品一区| 麻豆国产av国片精品| 一级二级三级毛片免费看| 日韩中字成人| 欧美日韩一区二区视频在线观看视频在线 | 12—13女人毛片做爰片一| 小蜜桃在线观看免费完整版高清| 精品久久久久久成人av| 午夜爱爱视频在线播放| 国产成人a∨麻豆精品| 天堂√8在线中文| 黄片无遮挡物在线观看| 国语自产精品视频在线第100页| 如何舔出高潮| 亚洲欧美中文字幕日韩二区| 性色avwww在线观看| av视频在线观看入口| 国产一区二区激情短视频| 欧美bdsm另类| 寂寞人妻少妇视频99o| 91狼人影院| 国产大屁股一区二区在线视频| 高清毛片免费观看视频网站| 又粗又爽又猛毛片免费看| 欧美性感艳星| 在线播放国产精品三级| 亚洲欧美成人综合另类久久久 | 99热6这里只有精品| 麻豆国产av国片精品| 嫩草影院入口| 国产精品爽爽va在线观看网站| 精品国产三级普通话版| 男的添女的下面高潮视频| 久久久久国产网址| 午夜视频国产福利| 日本在线视频免费播放| 一级黄片播放器| 午夜福利视频1000在线观看| 观看美女的网站| 综合色av麻豆| 在线观看一区二区三区| 亚洲精品亚洲一区二区| 在线天堂最新版资源| 岛国毛片在线播放| 久久久久久久久中文| 男女那种视频在线观看| 中出人妻视频一区二区| 精品一区二区三区视频在线| 午夜福利在线观看吧| 搡老妇女老女人老熟妇| 嫩草影院精品99| 亚洲自偷自拍三级| 久久精品久久久久久噜噜老黄 | 久久精品人妻少妇| 欧美日韩一区二区视频在线观看视频在线 | 深夜精品福利| 男女做爰动态图高潮gif福利片| 欧美bdsm另类| 国产三级在线视频| 亚洲av中文av极速乱| 不卡一级毛片| 日本成人三级电影网站| 天天一区二区日本电影三级| 18+在线观看网站| 国产色婷婷99| 男女那种视频在线观看| 精品久久久久久久久久久久久| 成熟少妇高潮喷水视频| 桃色一区二区三区在线观看| 美女 人体艺术 gogo| 亚洲国产色片| 狂野欧美白嫩少妇大欣赏| 简卡轻食公司| 国产真实乱freesex| 久久午夜亚洲精品久久| 亚洲高清免费不卡视频| а√天堂www在线а√下载| 免费搜索国产男女视频| 嫩草影院新地址| 校园人妻丝袜中文字幕| 国产精品女同一区二区软件| 国产高清视频在线观看网站| 日韩欧美一区二区三区在线观看| 最新中文字幕久久久久| 久久国产乱子免费精品| 欧美日韩精品成人综合77777| 国产三级在线视频| 国产 一区精品| 黄片无遮挡物在线观看| 国产精品福利在线免费观看| 2021天堂中文幕一二区在线观| 日产精品乱码卡一卡2卡三| 国产av在哪里看| 成人毛片a级毛片在线播放| 12—13女人毛片做爰片一| 人妻夜夜爽99麻豆av| av在线蜜桃| 国产女主播在线喷水免费视频网站 | 一区二区三区高清视频在线| 免费观看在线日韩| h日本视频在线播放| 黄色配什么色好看| 亚洲欧美日韩东京热| 亚洲最大成人中文| 看免费成人av毛片| 三级经典国产精品| 美女脱内裤让男人舔精品视频 | 午夜福利在线在线| 国产三级中文精品| 精品人妻视频免费看| 成人国产麻豆网| 免费av毛片视频| 国产亚洲91精品色在线| 免费不卡的大黄色大毛片视频在线观看 | 色哟哟·www| 亚洲欧洲日产国产| 日本爱情动作片www.在线观看| 日日干狠狠操夜夜爽| 国产精品久久视频播放| 18禁裸乳无遮挡免费网站照片| 亚洲最大成人手机在线| 欧美xxxx性猛交bbbb| 亚洲人与动物交配视频| 乱系列少妇在线播放| 国产黄色视频一区二区在线观看 | 亚洲婷婷狠狠爱综合网| 国产片特级美女逼逼视频| 可以在线观看的亚洲视频| 麻豆精品久久久久久蜜桃| 亚洲三级黄色毛片| 国产精品一区二区三区四区免费观看| 夫妻性生交免费视频一级片| 身体一侧抽搐| 亚洲精品久久久久久婷婷小说 | 欧美日本视频| 久久精品国产亚洲av涩爱 | 久久久久久伊人网av| 日韩中字成人| 搡女人真爽免费视频火全软件| 亚洲欧美成人综合另类久久久 | 亚洲激情五月婷婷啪啪| 国产高清不卡午夜福利| 少妇高潮的动态图| 99视频精品全部免费 在线| 高清午夜精品一区二区三区 | 精品久久久久久久久久免费视频| 欧美另类亚洲清纯唯美| 国产精品蜜桃在线观看 | 老女人水多毛片| 亚洲不卡免费看| 女的被弄到高潮叫床怎么办| 国产91av在线免费观看| 校园春色视频在线观看| 尤物成人国产欧美一区二区三区| 日韩大尺度精品在线看网址| 波多野结衣巨乳人妻| 欧美日韩国产亚洲二区| 日韩国内少妇激情av| 国产精品一区二区性色av| 99久久久亚洲精品蜜臀av| 日本免费一区二区三区高清不卡| 日韩精品青青久久久久久| 国产av在哪里看| 最新中文字幕久久久久| 免费电影在线观看免费观看| 成年女人永久免费观看视频| 日日干狠狠操夜夜爽| 禁无遮挡网站| 一级黄片播放器| 老司机福利观看| 天堂影院成人在线观看| 精品久久久久久久久久免费视频| 国产精品野战在线观看| 两性午夜刺激爽爽歪歪视频在线观看| 欧美不卡视频在线免费观看| 三级国产精品欧美在线观看| 亚洲自拍偷在线| 3wmmmm亚洲av在线观看| 99热只有精品国产| av在线天堂中文字幕| 久久韩国三级中文字幕| 一本一本综合久久| 麻豆精品久久久久久蜜桃| 欧美成人免费av一区二区三区| 国产大屁股一区二区在线视频| av专区在线播放| 亚洲在久久综合| 国产极品精品免费视频能看的| 国产 一区精品| 日韩欧美精品v在线| 日本色播在线视频| 成人国产麻豆网| 我的女老师完整版在线观看| 亚洲欧美成人综合另类久久久 | 久久久久久九九精品二区国产| 天天躁夜夜躁狠狠久久av| 日产精品乱码卡一卡2卡三| 村上凉子中文字幕在线| 亚洲综合色惰| 日韩三级伦理在线观看| 天天躁夜夜躁狠狠久久av| 天堂中文最新版在线下载 | 在线观看午夜福利视频| 午夜老司机福利剧场| 六月丁香七月| 日本欧美国产在线视频| 非洲黑人性xxxx精品又粗又长| 久久精品国产99精品国产亚洲性色| 天天躁夜夜躁狠狠久久av| 国语自产精品视频在线第100页| 三级男女做爰猛烈吃奶摸视频| 91av网一区二区| 又粗又硬又长又爽又黄的视频 | 国产亚洲av嫩草精品影院| 欧美3d第一页| 99热这里只有是精品50| 黄色一级大片看看| 国产爱豆传媒在线观看| 国产精品av视频在线免费观看| 97在线视频观看| 禁无遮挡网站| 亚洲精品456在线播放app| 欧美潮喷喷水| 欧美一区二区精品小视频在线| 亚洲一级一片aⅴ在线观看| 精品免费久久久久久久清纯| 亚洲欧美清纯卡通| 国产精品一区www在线观看| 欧美成人免费av一区二区三区| 国产在线男女| 国语自产精品视频在线第100页| 日日啪夜夜撸| 国产精品免费一区二区三区在线| 日本爱情动作片www.在线观看| 国产成人影院久久av| 男人狂女人下面高潮的视频| 国产精品电影一区二区三区| .国产精品久久| 日韩欧美精品v在线| 国产男人的电影天堂91| 免费人成视频x8x8入口观看| 三级毛片av免费| 国产在视频线在精品| 亚洲人成网站在线观看播放| 中文字幕av在线有码专区| 九九爱精品视频在线观看| 亚洲欧美日韩高清专用| 有码 亚洲区| 日韩精品有码人妻一区| 99久久久亚洲精品蜜臀av| 国产精品福利在线免费观看| 久久久久久伊人网av| 两个人视频免费观看高清| 国产成人aa在线观看| 久久人妻av系列| 亚洲欧美日韩东京热| 日韩精品青青久久久久久| 精品午夜福利在线看| 国模一区二区三区四区视频| 欧美成人精品欧美一级黄| 亚洲欧美成人精品一区二区| 天堂中文最新版在线下载 | 欧美日本视频| 美女脱内裤让男人舔精品视频 | 99在线人妻在线中文字幕| 欧美在线一区亚洲| 亚洲一区高清亚洲精品| 国产av麻豆久久久久久久| 日本-黄色视频高清免费观看| 亚洲欧洲国产日韩| 亚洲av第一区精品v没综合| 狂野欧美白嫩少妇大欣赏| 国产日韩欧美在线精品| 欧美不卡视频在线免费观看| 久久99精品国语久久久| 亚洲国产欧美人成| 亚洲四区av| 在线播放国产精品三级| 国产探花极品一区二区| 人人妻人人澡欧美一区二区| 国产一区二区亚洲精品在线观看| 18禁裸乳无遮挡免费网站照片| 亚洲av电影不卡..在线观看| 尾随美女入室| 色噜噜av男人的天堂激情| 综合色丁香网| 欧美丝袜亚洲另类| 成人午夜精彩视频在线观看| 在线a可以看的网站| 久久这里只有精品中国| 一个人观看的视频www高清免费观看| 欧美丝袜亚洲另类| 日韩欧美在线乱码| 永久网站在线| 亚洲一级一片aⅴ在线观看| 欧美成人一区二区免费高清观看| 久久久国产成人精品二区| 国产精品99久久久久久久久| 日日啪夜夜撸| 噜噜噜噜噜久久久久久91| 亚洲国产色片| 最近最新中文字幕大全电影3| 九九在线视频观看精品| 男女做爰动态图高潮gif福利片| 一夜夜www| 久久草成人影院| 特级一级黄色大片| 久久人人精品亚洲av| 乱人视频在线观看| 一级黄片播放器| 午夜视频国产福利| 久久精品人妻少妇| 国产视频首页在线观看| 国产精品一二三区在线看| 麻豆成人av视频| 3wmmmm亚洲av在线观看| 免费人成视频x8x8入口观看| 亚洲av电影不卡..在线观看| 婷婷亚洲欧美| 在线观看一区二区三区| 国产精华一区二区三区| 国产在视频线在精品| 在线天堂最新版资源| 国产成年人精品一区二区| 午夜精品在线福利| 国产又黄又爽又无遮挡在线| 国产高潮美女av| 国产一区二区亚洲精品在线观看| 亚洲欧美中文字幕日韩二区| 99久久精品一区二区三区| 男女啪啪激烈高潮av片| 综合色av麻豆| 国产精品美女特级片免费视频播放器| 精品久久久久久久人妻蜜臀av| 男人舔奶头视频| 狂野欧美激情性xxxx在线观看| 麻豆乱淫一区二区| 成人永久免费在线观看视频| 人人妻人人澡欧美一区二区| 欧美一区二区亚洲| 蜜桃亚洲精品一区二区三区| 天天一区二区日本电影三级| 国产精品av视频在线免费观看| 精品久久久久久久末码| 国产午夜精品一二区理论片| 一个人看的www免费观看视频| 亚洲精品日韩av片在线观看| 91久久精品国产一区二区成人| 亚洲久久久久久中文字幕| 国产精品.久久久| 日韩制服骚丝袜av| 亚洲精品国产av成人精品| 日韩大尺度精品在线看网址| 又粗又爽又猛毛片免费看| 99九九线精品视频在线观看视频| 免费看日本二区| 久久久久久久久久久免费av| 男人舔女人下体高潮全视频| 亚洲精品久久国产高清桃花| 黄色欧美视频在线观看| 99国产极品粉嫩在线观看| 美女内射精品一级片tv| 亚洲在线自拍视频| 亚洲精品乱码久久久久久按摩| 久久久精品欧美日韩精品| 极品教师在线视频| 日本黄色视频三级网站网址| 国产黄a三级三级三级人| 日韩一区二区三区影片| 国产毛片a区久久久久| 日韩欧美一区二区三区在线观看| 日本欧美国产在线视频| 欧美变态另类bdsm刘玥| 精华霜和精华液先用哪个| videossex国产| a级一级毛片免费在线观看| 欧美日韩在线观看h| 国产精品久久视频播放| 观看免费一级毛片| 亚洲精品自拍成人| 欧美一区二区亚洲| 直男gayav资源| 我的老师免费观看完整版| 国产精品日韩av在线免费观看| 免费看av在线观看网站| 在线a可以看的网站| 国产成人福利小说| 欧美丝袜亚洲另类| av福利片在线观看| 97在线视频观看| 国产91av在线免费观看| 成年女人看的毛片在线观看| 狂野欧美激情性xxxx在线观看| 晚上一个人看的免费电影| 日本黄色视频三级网站网址| 噜噜噜噜噜久久久久久91| 国产精品久久电影中文字幕| 国产免费一级a男人的天堂| 少妇裸体淫交视频免费看高清| 高清在线视频一区二区三区 | 国产在视频线在精品| 22中文网久久字幕| av视频在线观看入口| 国产色爽女视频免费观看| 神马国产精品三级电影在线观看| 夜夜爽天天搞| 亚洲人成网站在线观看播放| 精品国产三级普通话版| 久99久视频精品免费| 国内精品一区二区在线观看| 长腿黑丝高跟| 国产精品伦人一区二区| 免费观看在线日韩| 久久人人精品亚洲av| 免费大片18禁| 乱码一卡2卡4卡精品| 12—13女人毛片做爰片一| 亚洲七黄色美女视频| 美女被艹到高潮喷水动态| 欧美bdsm另类| 国产人妻一区二区三区在| 老熟妇乱子伦视频在线观看| 久久久久久久午夜电影| 亚洲精品乱码久久久v下载方式| 男的添女的下面高潮视频| 久久6这里有精品| 99久久精品一区二区三区| 男女下面进入的视频免费午夜| 国产亚洲av嫩草精品影院| 两性午夜刺激爽爽歪歪视频在线观看| 国产精品,欧美在线| a级毛色黄片| 在线观看免费视频日本深夜| 舔av片在线| 中文在线观看免费www的网站| 亚洲精品成人久久久久久| 最近2019中文字幕mv第一页| 国产精品.久久久| 亚洲欧洲日产国产| 国产久久久一区二区三区| 国产女主播在线喷水免费视频网站 | 日本免费a在线| 日本一本二区三区精品| 自拍偷自拍亚洲精品老妇| 在线观看午夜福利视频| 国内精品久久久久精免费| 免费观看a级毛片全部| 亚洲国产色片| 三级经典国产精品| a级毛片免费高清观看在线播放| 国产乱人偷精品视频| 最好的美女福利视频网| 欧美成人一区二区免费高清观看| 亚洲人成网站在线观看播放| 国产蜜桃级精品一区二区三区| 一进一出抽搐动态| 国内精品一区二区在线观看| 九色成人免费人妻av| 亚洲av电影不卡..在线观看| 观看美女的网站| 国产在视频线在精品| 久久人人精品亚洲av| 在现免费观看毛片| 伊人久久精品亚洲午夜| 哪里可以看免费的av片| 一卡2卡三卡四卡精品乱码亚洲| 国产女主播在线喷水免费视频网站 | 美女内射精品一级片tv| 麻豆一二三区av精品| 免费不卡的大黄色大毛片视频在线观看 | 99久久成人亚洲精品观看| 波多野结衣高清无吗| 亚洲精品国产av成人精品| av福利片在线观看| 18禁在线播放成人免费| 天堂网av新在线| 亚洲熟妇中文字幕五十中出| 亚洲精品影视一区二区三区av| 国产探花极品一区二区| 国产成年人精品一区二区| 高清毛片免费看| 五月伊人婷婷丁香| 国产视频内射| 久久久久久九九精品二区国产| 在线观看午夜福利视频| 久久亚洲国产成人精品v| 亚洲一级一片aⅴ在线观看| 国产一级毛片在线| 久久欧美精品欧美久久欧美| 一本一本综合久久| 变态另类成人亚洲欧美熟女| 天美传媒精品一区二区| 波多野结衣巨乳人妻| 波多野结衣高清作品| 校园春色视频在线观看| 日本五十路高清| 人妻少妇偷人精品九色| 成人特级黄色片久久久久久久| 少妇猛男粗大的猛烈进出视频 | 亚洲三级黄色毛片| 日韩欧美一区二区三区在线观看| 欧美成人免费av一区二区三区| av在线观看视频网站免费| 精品人妻熟女av久视频| 日本黄色视频三级网站网址| 久久韩国三级中文字幕| 欧美日韩国产亚洲二区| 九九热线精品视视频播放| 中文字幕久久专区| 丰满人妻一区二区三区视频av| 人妻久久中文字幕网| 国产真实伦视频高清在线观看| 99热6这里只有精品| 成人毛片60女人毛片免费| 一本一本综合久久| 高清午夜精品一区二区三区 | av在线亚洲专区| 麻豆国产97在线/欧美| 精品久久久久久久久久免费视频| 搡女人真爽免费视频火全软件| 欧美成人免费av一区二区三区| 91aial.com中文字幕在线观看| 成年免费大片在线观看| 国产精品久久久久久亚洲av鲁大| 国产人妻一区二区三区在| 午夜福利在线观看免费完整高清在 | 最近2019中文字幕mv第一页| 91久久精品电影网| 男人和女人高潮做爰伦理| 亚洲国产高清在线一区二区三| 亚洲精品国产av成人精品| 小说图片视频综合网站| 亚洲婷婷狠狠爱综合网| 人妻制服诱惑在线中文字幕| 99九九线精品视频在线观看视频| 可以在线观看毛片的网站| 精品午夜福利在线看| 老女人水多毛片| 久久精品国产清高在天天线| 中文字幕人妻熟人妻熟丝袜美| 男女做爰动态图高潮gif福利片| 中文字幕免费在线视频6| 黄片wwwwww| 成年av动漫网址| 国产高清激情床上av| 亚洲第一电影网av| 亚洲欧洲国产日韩| 成熟少妇高潮喷水视频| 久久精品夜夜夜夜夜久久蜜豆| 精品99又大又爽又粗少妇毛片| 26uuu在线亚洲综合色| 蜜桃久久精品国产亚洲av| 久久婷婷人人爽人人干人人爱| 亚洲图色成人| 日日撸夜夜添| 尤物成人国产欧美一区二区三区| 久久久久久久久大av| av黄色大香蕉| 免费不卡的大黄色大毛片视频在线观看 | 亚洲欧美成人精品一区二区| 噜噜噜噜噜久久久久久91| 亚洲性久久影院| 少妇裸体淫交视频免费看高清| 国产伦一二天堂av在线观看| 观看美女的网站| 大香蕉久久网| 天天躁日日操中文字幕| 精品不卡国产一区二区三区| 午夜老司机福利剧场| 全区人妻精品视频| 毛片女人毛片| 日本黄色视频三级网站网址| 一区二区三区免费毛片| 欧美不卡视频在线免费观看| 校园人妻丝袜中文字幕|