• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Amino Acid Encryption Method Using Genetic Algorithm for Key Generation

    2022-11-09 08:13:14AhmedSakrShamsAmenaMahmoudandMohammedZidan
    Computers Materials&Continua 2022年1期

    Ahmed S.Sakr,M.Y.Shams,Amena Mahmoud and Mohammed Zidan

    1Department of Information System,Faculty of Computers and Information,Menofia University,Egypt

    2Department of Machine learning and Information Retrieval,Faculty of Artificial Intelligence,Kafrelsheikh University,Egypt

    3Department of Computer Science,Faculty of Computers and Information,Kafrelshiekh University,Egypt

    4Hurghada Faculty of Computers and Artificial Intelligence,South Valley University,Egypt

    Abstract: In this new information era,the transfer of data and information has become a very important matter.Transferred data must be kept secured from unauthorized persons using cryptography.The science of cryptography depends not only on complex mathematical models but also on encryption keys.Amino acid encryption is a promising model for data security.In this paper,we propose an amino acid encryption model with two encryption keys.The first key is generated randomly using the genetic algorithm.The second key is called the protein key which is generated from converting DNA to a protein message.Then,the protein message and the first key are used in the modified Playfair matrix to generate the cypher message.The experimental results show that the proposed model survives against known attacks such as the Brute-force attack and the Ciphertext-only attack.In addition,the proposed model has been tested over different types of characters including white spaces and special characters,as all the data is encoded to 8-bit binary.The performance of the proposed model is compared with other models using encryption time and decryption time.The model also balances all three principles in the CIA triad.

    Keywords: Cryptography;amino acid;genetic algorithm;playfair;deep learning;DNA computing

    1 Introduction

    Internet and wireless networks offer ubiquitous channels to deliver and exchange data.Some models,such as cryptography,are used to improve the security of data transfer.Cryptography keeps data secure by ensuring that it is not understandable to unauthorized persons.There are two types of encryption: symmetric and asymmetric.

    In cryptography,messages are scrambled and become gibberish to help ensure their secrecy.Once a message is encrypted,everyone can see that there is a message,but it cannot be understood or read by anyone who does not have the decryption key.As a result,decryption keys must be very difficult to access and use,so that only the intended recipients can read encrypted messages [1-3].

    One potential model for key generation is the use of Genetic Algorithms (GA) [4].Genetic Algorithms are based on Darwin’s theory of natural selection and “survival of the fittest.”Genetic Algorithms are used to search among many solutions and find the optimal one.This model depends on randomly selecting several solutions and calculating how good each solution is.Each solution is represented by a chromosome.To calculate each solution’s degree and rank,a fitness function is used.A generation consists of a number of chromosomes.After calculating the fitness function for each suggested solution (chromosome) a generation is finished.A portion of the chromosomes is selected to be part of the next generation.New chromosomes are generated by applying crossover and mutation functions.(The best chromosomes generate the best results.)After that,the old selected chromosomes and the newly generated ones are combined to construct the new generation.These iterations continue until a pre-defined threshold is reached.In the end,the best solution is selected for the minimization or maximization function.The solution consists of the best chromosome that achieves the best results for the objective function [5-7].The encryption system then uses machine learning and DNA-based encryption to improve security.DNA-based encryption is an emerging approach for information security because of its capabilities.

    In biology,DNA is the master molecule whose structure encodes all the information needed to create and direct the chemical machinery of life.In 1953,the structure of DNA was correctly predicted by Watson and Crick.They predicted that DNA molecules consist of two long polynucleotide chains.Each of these chains is known as a DNA chain,or a DNA strand,which is made up of simple subunits,called nucleotides.Each nucleotide consists of a sugar-phosphate molecule with a nitrogen-containing side group,or base.The bases are of four types—adenine,guanine,cytosine,and thymine—corresponding to four distinct nucleotides,labeled A,G,C,and T [8-14].

    In the proposed model,Genetic Algorithms are used to generate a random key for encryption and decryption.The generated key is used to encrypt data using DNA encryption.

    The rest of this paper is organized as follows: first we discuss a review of related work,next we explain the proposed model,then we report the simulation results and performance analysis,and finally we discuss the conclusions and future work.

    2 Literature Review

    In [15] the authors significantly modify the old Playfair cipher by introducing a DNA-based and amino acid structure.In their work a plain message is converted to a sequence of DNA.They propose assigning each letter of the alphabet a corresponding codon,so that the English alphabet’s form of amino acids can go through the traditional Playfair cipher process using the secret key.

    In [16],the authors propose a novel algorithm that is composed of encryption and steganography using (DNA) sequences.Their model consists of two phases.In the first phase,the plain data is encrypted using a DNA-and amino acids-based Playfair cipher.In the second phase,the encrypted data is inserted into a DNA sequence.Their algorithm works on any binary data as it is transformed into DNA nucleotides.Then,these DNA nucleotides are converted to the amino acids structure so that they can go through the specially designed Playfair cipher and be encrypted into another DNA sequence.Then,this encrypted DNA data is randomly inserted into a reference DNA sequence to produce a faked DNA sequence whose encrypted data is hidden.

    In [17] a model and implementation for key generation using the genetic algorithm with the Needleman-Wunsch (NW) algorithm is proposed.The authors introduce a model for implementing encryption and decryption based on DNA computing using the biological operations Transcription,Translation,DNA Sequencing,and Deep Learning.They evaluate the time taken for encryption and decryption based on the size of the message.

    In [18] a Bio-Inspired Cryptosystem for encrypting data is proposed.The authors propose a system based on the Central Dogma of Molecular Biology (CDMB) for encryption and decryption.They used a Bidirectional Associative Memory Neural Network (BAMNN) for key generation.Their cryptosystem shows competent encryption and decryption times even on large data sizes when compared with other systems.

    3 Proposed Model

    The proposed encryption model contains three phases: the first phase is key generation in which genetic algorithm is used to generate a random key for encryption and decryption.In the second phase the message data is converted to amino acid throw mutable operation.in the third phase the key generated from genetic algorithm is used to encrypt amino acid data using play faire cypher.the three is discussed in detail as follows.

    3.1 First Phase:Key Generation

    Genetic algorithms will be used to generate a random key in the encryption process as follows:

    3.1.1 Initial Population(Generation 0)

    The genes of the chromosomes of the initial population will be filled using a random number function that returns (1 or 0).Each chromosome will contain 64 genes and the initial population will contain 100 chromosomes.

    3.1.2 Fitness Function

    The key in the encryption process must be random to ensure a low guessing factor,so the Run Test of Randomness will be used as the fitness function in our algorithm.

    3.1.3 Run Test of Randomness

    The Run Test of Randomness is a statistical test that is used to calculate the randomness of data.This test is based on the run.Run is basically a sequence of two types of symbols,such as 0 or 1.The test statistic can be calculated by using an approximation of the normal distribution via the following formula as shown in Eq.(1).

    where r is the number of runs,μis the expected number of runs,andσis the standard deviation of the number of runs.The values ofμandσare computed as in Eqs.(2) and (3).

    wheren1is number of zeros in our model andn2is number of ones in the proposed model.An example of how to calculate the value of randomness can be found in Fig.1.

    Figure 1:An example of how to calculate the value of randomness

    3.1.4 Selection

    The selection policy determines which individuals are to be kicked out and which are to be kept in the next generation to be mated and combined to create offspring.A selection policy based on the fitness function is applied to choose which individuals to use.

    3.1.5 Crossover

    Crossover is used to combine the genetic information of two parents’offspring to generate new offspring.The K-Point is used to determine the crossover.K-Point crossover uses more than one crossover point to produce two offspring chromosomes.Two parent chromosomes are selected and a number is generated at random because the number of crossover points is randomly selected.This is shown in Fig.2.

    Figure 2:Crossover selection

    3.1.6 Mutation

    A mutation is a small random tweak in the chromosome,to get a new solution.Bit string mutations are used as mutation operators.Bit string mutation works by selecting one or more random bits and flipping them,see Fig.3 below.

    Figure 3:Mutation process

    After choosing the best key using the fitness function,this key’s similarity to other keys from the last generation is calculated using the Needleman-Wunsch (NW) Algorithm.

    3.1.7 Needleman-Wunsch(NW)Algorithm

    The Needleman-Wunsch (NW) Algorithm is a dynamic programming application.It is used for arranging two or more sequences of characters to identify regions of similarity [17].It uses a scoring system to calculate the degree of similarity or dissimilarity between the two sequences.The greater the score,the more similar the sequences.NW is used to calculate the similarity between the chosen key and other keys from the last generation.The less similar key is selected to be the encryption key.The key generation process is summarized in Fig.4.

    3.2 Second Phase:Data Preparation

    The plain data is converted to 8-bit binary format,and then converted to a DNA Nitrogen Base sequence as shown in Tab.1.Then the DNA Nitrogen Base sequence is converted to an RNA Nitrogen Base as shown in Tab.2.The RNA Nitrogen Base is then converted to an amino acid according to RNA to Amino Acid table in [15],and then the Ambiguity number as Protein Key (PK) is extracted.The same model will be applied to the generated key.

    3.3 Third Phase:Data Encryption Using Amino Acid Based Playfair

    Playfair is a polyalphabetic cipher,in which diagrams in plaintext are treated as single units and these units are translated into cipher text diagrams.Playfair encrypts pairs of letters,rather than encrypting single letters as a simple substitution cipher would do.The traditional Playfair algorithm is based on a 5×5 matrix of letters constructed using a key.The Playfair cipher is a great advance over simple monoalphabetic ciphers.Cryptanalysis of the Playfair cipher is much more difficult than cryptanalysis of normal simple substitution ciphers,because digraphs (pairs of letters) are being substituted instead of monographs (single letters) [15].

    In our model,the key generated from the genetic algorithm is used as a Playfair cipher key,and the alphabet is the modified amino acid alphabet.The data preparation phase and the encryption phase are summarized in Fig.5.Also,a simple example of our proposed algorithm is shown in Fig.6.The algorithm steps of the encryption process are shown as follows.

    Figure 4:The key generation processes

    Table 1:Converting 8-bit binary format to DNA

    Table 2:Converting DNA to RNA

    Algorithm 1: Algorithm of encryption process Input: Message (M),Genetic KEY (GK)Output: Protein Cypher (PC),Protein Key (PK)Begin 1.Step 1: Input Message (M),Genetic KEY (K1).2.Step 2: Convert Message (M) to 8-bit binary format (biM).3.Step 3: Convert binary Message (bim M) to DNA Nitrogen Base (MDNA).4.Step 4: Convert Message DNA Nitrogen Base (MDNA) to RNA Nitrogen Base (MRNA).5.Step 5: Convert Message RNA Nitrogen Base (MRNA) to Protein (PM) and save protein Ambiguity number as Protein Key (PK).6.Step 6: Create Playfair 5×5 matrix and use Genetic KEY (GK) as Key.7.Step 7: Use Playfair encryption process to get Protein Cypher (PC)8.Step 8: Protein Ambiguity number as Protein Key (PK) and Protein Cypher (PC).End

    Figure 5:Encryption algorithm

    Figure 6:Simple example of proposed algorithm

    4 Simulation and Performance Analysis

    This section presents the experimental results of the proposed model.In addition,a comparison between the proposed model and Genetic Algorithm with NW model [17] is included in this section.All the models were implemented on a PC with a Pentium core i7 processor,8 GB of RAM,and the Windows 10 operating system.Python was used to implement both the proposed models and the Kalsi et al.model.

    4.1 Encryption Time

    The encryption time is the amount of time each model takes to generate cypher text after generating the key.Tab.3 compares the encryption times (in milliseconds) of the proposed model and Genatic Algorithem with NW [17] model.The results show that our proposed model takes slightly more time than Genatic Algorithem with NW model,because in Genatic Algorithem (GA)with NW model the main operation is XOR but in our model the Playfair matrix takes more time to encrypt.

    Table 3:Comparison of encryption time with the characters from the proposed model with the existing scheme

    4.2 Decryption Time

    The decryption time is the amount of time each model takes to generate plain text from cypher text.Tab.4 compares the decryption time (in milliseconds) of the proposed model and Genatic Algorithem with NW [17] model.The results show that our proposed model takes slightly more time than GA with NW model,because in GA with NW [17] model the main operation is XOR but in our model the Playfair matrix takes more time to encrypt.

    Table 4:Comparison of decryption time with the characters from the proposed model with the existing scheme

    4.3 Performance Analysis

    4.3.1 Confusion and Diffusion

    Confusion means that each bit of ciphertext should depend on several bits of the key.In the proposed model,when a message is translated to protein,the process is one-to-many,because one protein can come from more than one RNA.Also,in the proposed model if we use the key and plaintext independently,the cipher text can’t be produced because it goes through several steps.

    Diffusion means that if a change happens in one character of the plaintext,it changes several characters in the ciphertext.In the proposed model,when a character of the plaintext is changed it will affect the DNA value,which in turn will affect the protein value and the cipher text.Also,in the proposed model,the same plaintext will result in different cipher text each time because we use a different key each time.

    4.3.2 Avalanche Effect

    In cryptography,the avalanche effect means that if a character in plaintext is changed slightly,the cipher text changes significantly.In the proposed model,when a character of the plaintext is changed slightly it will affect the DNA value,which in turn will give a different protein value and change the cipher text.

    4.4 Security Against Attacks

    4.4.1 Brute-Force Attack

    A brute force attack is an attempt to crack a password or username,find a hidden web page,or find the key used to encrypt a message,using a trial-and-error approach,and hoping,eventually,to guess correctly [19].

    4.4.2 Ciphertext-Only Attack

    In a ciphertext-only attack,the attacker has access to some amount of ciphertext and has some information about the plaintext.This type of attack will succeed if the attacker can get either the plaintext or the key.In the proposed system this is impossible because of the randomness of the key generated by the genetic algorithm.Also,in this model,the plaintext goes through multiple steps to become ciphertext [20].

    4.4.3 The Known-Plaintext Attack(KPA)

    The known-plaintext attack is an attack model in which the attacker has access to both the plaintext and the ciphertext and attempts to get the key.In the proposed system the attacker can’t succeed because of the randomness of the key generated by the genetic algorithm.It gives a different key each time [21].

    4.4.4 Differential cryptanalysis Attack

    In a differential cryptanalysis attack,the attacker gets ciphertext from a set of chosen plaintext.In the proposed system this can’t happen because of the randomness of the key generated by the genetic algorithm.It gives a different key each time [22].Tab.5 outlines the implementation of the system proposed in relation to the multiple attacks with other systems.

    Table 5:Comparison of existing scheme with proposed scheme based on several attacks

    4.4.5 Achievement of CIA

    Confidentiality

    Confidentiality is keeping information away from unauthorized people.In the proposed system this is achieved as all transmitted entities and parameters are encrypted [25].

    Integrity

    Integrity is the ability to ensure that data is accurate and remains unchanged.In the proposed system this is achieved because if a change happens in the cipher text it will affect the protein value and the DNA value,and the plaintext won’t be able to be extracted [25].

    Availability

    It is important to ensure that the information concerned is always readily accessible to the authorized viewer.In the proposed system,this is achieved because it works with different plaintext size and types [25].

    5 Conclusion

    An amino acid cryptosystem has been proposed that uses genetic algorithms and amino acid cryptography for securing data.The goal of data encryption is to keep data away from unauthorized people.In our system,the input message is encoded to an 8-bit binary format and converted to an amino acid.A genetic algorithm is used to generate an encryption key and the Tun Test of Randomness is used as the fitness function.The MG algorithm is used to select the key that is the least similar to the others.The encoded message is used with Playfair using a generated key.The proposed model can survive over known attacks such as the Brute-force attack and the Ciphertext-only attack.The proposed model has been tested over different types of characters including white spaces and special characters as all the data is encoded to 8-bit binary.The performance of the proposed model is compared with other models on the basis of encryption time.The CIA principle is achieved by the proposed model.Also,using the amino acid ambiguity number gives us more security because even if the intruder knows the input of plaintext,he can’t know the real message without using the ambiguity number.

    Funding Statement: The authors received no specific funding for this study.

    Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study.

    国产中年淑女户外野战色| 欧美色视频一区免费| 久久6这里有精品| 日本免费a在线| 午夜亚洲福利在线播放| 久久久久久久精品吃奶| 国产精品久久久久久人妻精品电影| 日日干狠狠操夜夜爽| 亚洲aⅴ乱码一区二区在线播放| 俺也久久电影网| 黄色片一级片一级黄色片| 两个人看的免费小视频| 女同久久另类99精品国产91| 国产日本99.免费观看| 91麻豆av在线| 婷婷精品国产亚洲av| 啦啦啦免费观看视频1| 免费看美女性在线毛片视频| 婷婷丁香在线五月| 亚洲欧美日韩东京热| 日本与韩国留学比较| 露出奶头的视频| 欧美日韩福利视频一区二区| 麻豆一二三区av精品| 亚洲成人久久性| 国产精品一区二区三区四区久久| 黄色片一级片一级黄色片| 99精品在免费线老司机午夜| 国产免费一级a男人的天堂| 亚洲精品色激情综合| 国产成人影院久久av| 亚洲第一电影网av| 日韩中文字幕欧美一区二区| 欧美黑人欧美精品刺激| 国产美女午夜福利| 成人永久免费在线观看视频| 一a级毛片在线观看| 狠狠狠狠99中文字幕| www国产在线视频色| 一本综合久久免费| 在线视频色国产色| 一个人观看的视频www高清免费观看| 欧美一级毛片孕妇| 日本成人三级电影网站| 国产精品久久久人人做人人爽| 久久6这里有精品| 午夜福利成人在线免费观看| 午夜两性在线视频| 日本精品一区二区三区蜜桃| 好男人在线观看高清免费视频| 观看免费一级毛片| 一进一出抽搐gif免费好疼| 国产高清视频在线观看网站| 三级毛片av免费| 波多野结衣巨乳人妻| 中文字幕av成人在线电影| 久久香蕉国产精品| 日本黄色片子视频| 色老头精品视频在线观看| eeuss影院久久| 我要搜黄色片| 国产久久久一区二区三区| 老司机在亚洲福利影院| 男女床上黄色一级片免费看| 一级作爱视频免费观看| 亚洲午夜理论影院| 欧美av亚洲av综合av国产av| 日本 欧美在线| 成人18禁在线播放| 国产精品久久久久久久电影 | 亚洲在线观看片| 精品国产亚洲在线| or卡值多少钱| 日韩欧美在线二视频| 一个人看的www免费观看视频| 成人三级黄色视频| 午夜福利在线在线| 国产精品永久免费网站| 色av中文字幕| 免费一级毛片在线播放高清视频| 老司机深夜福利视频在线观看| 看片在线看免费视频| 国产乱人伦免费视频| 日韩免费av在线播放| 国产精品久久久人人做人人爽| 99精品欧美一区二区三区四区| 97超视频在线观看视频| 午夜久久久久精精品| 久久久国产精品麻豆| 久久久久久久午夜电影| 亚洲精品国产精品久久久不卡| 少妇的逼好多水| 免费人成视频x8x8入口观看| www.www免费av| 国产成人欧美在线观看| 午夜精品一区二区三区免费看| 国产熟女xx| 亚洲 国产 在线| 在线免费观看的www视频| 偷拍熟女少妇极品色| 在线免费观看不下载黄p国产 | 90打野战视频偷拍视频| 久久精品91无色码中文字幕| 在线免费观看不下载黄p国产 | xxxwww97欧美| 少妇人妻一区二区三区视频| 淫秽高清视频在线观看| 色精品久久人妻99蜜桃| 免费大片18禁| 亚洲熟妇熟女久久| 久久久精品欧美日韩精品| 国产精品久久久人人做人人爽| 欧美中文综合在线视频| 色综合欧美亚洲国产小说| 亚洲av成人精品一区久久| 天天一区二区日本电影三级| 国产免费一级a男人的天堂| 精品国产三级普通话版| 国产精品爽爽va在线观看网站| 日韩欧美精品免费久久 | 精品一区二区三区视频在线 | 精品国产三级普通话版| 18禁在线播放成人免费| 国产精品嫩草影院av在线观看 | 五月伊人婷婷丁香| 老鸭窝网址在线观看| 久久久久久久亚洲中文字幕 | 麻豆国产97在线/欧美| xxxwww97欧美| 国产精品1区2区在线观看.| 日韩欧美三级三区| 亚洲一区高清亚洲精品| 全区人妻精品视频| 香蕉丝袜av| 亚洲精品乱码久久久v下载方式 | 91麻豆av在线| 久久久久久人人人人人| 亚洲黑人精品在线| 成人一区二区视频在线观看| 3wmmmm亚洲av在线观看| 久久久色成人| 欧美日韩瑟瑟在线播放| 国产成年人精品一区二区| 热99re8久久精品国产| 国产伦一二天堂av在线观看| 黄片小视频在线播放| 精品熟女少妇八av免费久了| 国产毛片a区久久久久| 亚洲,欧美精品.| 黄色片一级片一级黄色片| 99国产精品一区二区三区| www.色视频.com| 十八禁人妻一区二区| 欧美一级毛片孕妇| 欧美av亚洲av综合av国产av| 亚洲成人精品中文字幕电影| 99精品欧美一区二区三区四区| 99久久无色码亚洲精品果冻| 美女高潮的动态| 国产高清videossex| 91在线观看av| 12—13女人毛片做爰片一| 黄片小视频在线播放| 一边摸一边抽搐一进一小说| 91麻豆av在线| 韩国av一区二区三区四区| 久久久久久人人人人人| 美女黄网站色视频| 91久久精品国产一区二区成人 | 久久国产精品人妻蜜桃| 一个人看的www免费观看视频| 国产一区二区在线观看日韩 | 成人18禁在线播放| 国产精品98久久久久久宅男小说| 国产一区二区在线av高清观看| 欧美3d第一页| 国产99白浆流出| 久久久精品欧美日韩精品| 国产精品 欧美亚洲| 91久久精品电影网| 嫩草影院入口| 欧美乱色亚洲激情| 有码 亚洲区| 婷婷丁香在线五月| 久久久久久九九精品二区国产| 国产伦人伦偷精品视频| 国产伦精品一区二区三区四那| 97人妻精品一区二区三区麻豆| 俺也久久电影网| 亚洲成av人片在线播放无| 国产精品av视频在线免费观看| 国产欧美日韩一区二区精品| 一个人看的www免费观看视频| 国产成人福利小说| 国产在视频线在精品| 欧美又色又爽又黄视频| 久久性视频一级片| 亚洲av五月六月丁香网| 天天添夜夜摸| 国产色婷婷99| 九九久久精品国产亚洲av麻豆| 精品熟女少妇八av免费久了| 中文亚洲av片在线观看爽| 天天添夜夜摸| 国产精品电影一区二区三区| 精品国产美女av久久久久小说| 国产成人av教育| 国产乱人伦免费视频| 琪琪午夜伦伦电影理论片6080| 亚洲久久久久久中文字幕| 亚洲中文字幕一区二区三区有码在线看| 18禁在线播放成人免费| 欧美大码av| 国产三级在线视频| 亚洲人成电影免费在线| 亚洲国产高清在线一区二区三| 国产精品女同一区二区软件 | 欧美另类亚洲清纯唯美| 免费在线观看影片大全网站| 亚洲国产精品成人综合色| 日韩大尺度精品在线看网址| 男女做爰动态图高潮gif福利片| 三级毛片av免费| 波野结衣二区三区在线 | 国内精品久久久久精免费| 在线视频色国产色| 亚洲人成电影免费在线| 亚洲精品在线美女| 老鸭窝网址在线观看| 亚洲中文日韩欧美视频| 精品乱码久久久久久99久播| 亚洲人成网站在线播| 大型黄色视频在线免费观看| 久久九九热精品免费| 国产成+人综合+亚洲专区| 亚洲精品色激情综合| 欧美成人免费av一区二区三区| 午夜福利高清视频| 午夜精品在线福利| 女同久久另类99精品国产91| 亚洲黑人精品在线| 韩国av一区二区三区四区| 日本精品一区二区三区蜜桃| av黄色大香蕉| 一区福利在线观看| 久久精品国产99精品国产亚洲性色| av在线蜜桃| 99久久无色码亚洲精品果冻| 日本熟妇午夜| 国产精品自产拍在线观看55亚洲| 啦啦啦观看免费观看视频高清| 久久精品国产自在天天线| 热99re8久久精品国产| 亚洲成人免费电影在线观看| 午夜福利在线观看吧| 亚洲无线观看免费| 久久久久久大精品| 窝窝影院91人妻| 午夜免费观看网址| 国产精品永久免费网站| 亚洲美女黄片视频| xxxwww97欧美| 国产精品影院久久| 三级毛片av免费| 日本黄色视频三级网站网址| 夜夜爽天天搞| 特级一级黄色大片| 国产精品三级大全| 国产在线精品亚洲第一网站| 日韩欧美一区二区三区在线观看| 特大巨黑吊av在线直播| 欧美av亚洲av综合av国产av| tocl精华| 99久久九九国产精品国产免费| 中文字幕熟女人妻在线| 色尼玛亚洲综合影院| 色在线成人网| 夜夜夜夜夜久久久久| 一进一出抽搐gif免费好疼| www.www免费av| www日本在线高清视频| 中文字幕熟女人妻在线| 久久久久久久久中文| 97超视频在线观看视频| 亚洲精品乱码久久久v下载方式 | 看免费av毛片| 十八禁网站免费在线| 精品久久久久久成人av| 2021天堂中文幕一二区在线观| 久久久国产成人免费| 又紧又爽又黄一区二区| 一区二区三区免费毛片| 亚洲av二区三区四区| 少妇裸体淫交视频免费看高清| 一级毛片高清免费大全| 丰满乱子伦码专区| av专区在线播放| 日韩欧美三级三区| 久久伊人香网站| 亚洲精品一区av在线观看| 精品熟女少妇八av免费久了| 12—13女人毛片做爰片一| 嫁个100分男人电影在线观看| 欧美日韩精品网址| 亚洲国产精品成人综合色| 国产精品99久久久久久久久| 国内毛片毛片毛片毛片毛片| 国产伦一二天堂av在线观看| 超碰av人人做人人爽久久 | 天堂动漫精品| 淫妇啪啪啪对白视频| 男人舔女人下体高潮全视频| 欧美日韩亚洲国产一区二区在线观看| 国产真实伦视频高清在线观看 | 在线观看午夜福利视频| 可以在线观看毛片的网站| 欧美区成人在线视频| 最近最新中文字幕大全电影3| 男女那种视频在线观看| 亚洲美女黄片视频| 国产精品嫩草影院av在线观看 | 欧美黄色片欧美黄色片| 免费在线观看成人毛片| 国产视频一区二区在线看| 欧美性猛交╳xxx乱大交人| 国产av一区在线观看免费| 欧美又色又爽又黄视频| 国产精品嫩草影院av在线观看 | 亚洲aⅴ乱码一区二区在线播放| 真人做人爱边吃奶动态| 久久久久久久久大av| 亚洲人成伊人成综合网2020| 久久精品91蜜桃| 欧美zozozo另类| 麻豆一二三区av精品| 91麻豆精品激情在线观看国产| 狂野欧美白嫩少妇大欣赏| 国产精品98久久久久久宅男小说| 床上黄色一级片| www.熟女人妻精品国产| 人妻夜夜爽99麻豆av| 亚洲欧美日韩卡通动漫| 久久久久久久久中文| 欧美黑人欧美精品刺激| 免费看日本二区| 国产免费一级a男人的天堂| 欧美激情在线99| 成人一区二区视频在线观看| 亚洲成人中文字幕在线播放| 老鸭窝网址在线观看| 淫妇啪啪啪对白视频| 亚洲成人精品中文字幕电影| 久久亚洲真实| 久久久久久久亚洲中文字幕 | 国产主播在线观看一区二区| 亚洲国产色片| 国内精品一区二区在线观看| АⅤ资源中文在线天堂| 蜜桃亚洲精品一区二区三区| 欧美三级亚洲精品| 免费观看人在逋| 免费观看精品视频网站| 一a级毛片在线观看| 非洲黑人性xxxx精品又粗又长| 熟妇人妻久久中文字幕3abv| 久久中文看片网| 在线播放国产精品三级| 色吧在线观看| 欧美一级a爱片免费观看看| 五月玫瑰六月丁香| 免费人成在线观看视频色| 长腿黑丝高跟| 国产欧美日韩精品一区二区| 最近视频中文字幕2019在线8| 亚洲国产日韩欧美精品在线观看 | 波野结衣二区三区在线 | 欧美日韩瑟瑟在线播放| 嫩草影院入口| 日本成人三级电影网站| a在线观看视频网站| 国产精品久久久久久久电影 | 神马国产精品三级电影在线观看| 欧美黄色淫秽网站| 少妇丰满av| 亚洲久久久久久中文字幕| 草草在线视频免费看| 欧美中文综合在线视频| 美女黄网站色视频| 国产精品电影一区二区三区| or卡值多少钱| 亚洲欧美日韩东京热| 69av精品久久久久久| 免费无遮挡裸体视频| 天天躁日日操中文字幕| 黄色成人免费大全| 男人和女人高潮做爰伦理| 91久久精品电影网| e午夜精品久久久久久久| 亚洲成人精品中文字幕电影| 一卡2卡三卡四卡精品乱码亚洲| 国产不卡一卡二| 欧美中文综合在线视频| 亚洲,欧美精品.| 怎么达到女性高潮| 精品久久久久久久毛片微露脸| 国产亚洲精品av在线| 免费大片18禁| 国产精品99久久99久久久不卡| 中国美女看黄片| 亚洲 欧美 日韩 在线 免费| 精品熟女少妇八av免费久了| 日本与韩国留学比较| 欧美成人免费av一区二区三区| 国产主播在线观看一区二区| 国产成人a区在线观看| 亚洲熟妇熟女久久| 搡老熟女国产l中国老女人| 亚洲欧美一区二区三区黑人| 国产精品99久久99久久久不卡| 99riav亚洲国产免费| 999久久久精品免费观看国产| 欧美日韩一级在线毛片| 色在线成人网| 国内久久婷婷六月综合欲色啪| 久久中文看片网| 99热精品在线国产| 国产精品三级大全| 啦啦啦观看免费观看视频高清| 香蕉av资源在线| 亚洲在线自拍视频| 天堂动漫精品| 亚洲人成网站高清观看| 国产高清视频在线观看网站| 亚洲成av人片在线播放无| 精品免费久久久久久久清纯| 在线观看免费视频日本深夜| 可以在线观看的亚洲视频| 国产三级在线视频| 日本三级黄在线观看| 丰满人妻一区二区三区视频av | 国产精品一及| 国产激情偷乱视频一区二区| 免费大片18禁| 麻豆成人av在线观看| tocl精华| 成人国产一区最新在线观看| 亚洲第一欧美日韩一区二区三区| 国产私拍福利视频在线观看| 麻豆一二三区av精品| 日本免费a在线| 婷婷精品国产亚洲av| 黄片大片在线免费观看| 日韩精品青青久久久久久| 久久草成人影院| 国产免费av片在线观看野外av| 午夜精品一区二区三区免费看| 麻豆国产97在线/欧美| 欧美日韩国产亚洲二区| 精品久久久久久久末码| 悠悠久久av| av片东京热男人的天堂| 午夜a级毛片| 国产 一区 欧美 日韩| 国产国拍精品亚洲av在线观看 | 小蜜桃在线观看免费完整版高清| 久久久精品欧美日韩精品| 国内精品一区二区在线观看| 国产亚洲精品久久久com| 97碰自拍视频| 色综合欧美亚洲国产小说| 久久中文看片网| 丁香六月欧美| 久久6这里有精品| 女同久久另类99精品国产91| 别揉我奶头~嗯~啊~动态视频| 免费看a级黄色片| 成人亚洲精品av一区二区| 亚洲av美国av| 啦啦啦韩国在线观看视频| 18禁在线播放成人免费| 女同久久另类99精品国产91| 无人区码免费观看不卡| 日本 av在线| 一级毛片女人18水好多| 免费看美女性在线毛片视频| 国产视频一区二区在线看| 国产精品美女特级片免费视频播放器| 国产真人三级小视频在线观看| 国产aⅴ精品一区二区三区波| 欧美日韩中文字幕国产精品一区二区三区| 久久久久国产精品人妻aⅴ院| 久久久久九九精品影院| 午夜福利在线在线| 在线播放国产精品三级| 午夜福利免费观看在线| 精品福利观看| 欧美日韩一级在线毛片| 国产不卡一卡二| 亚洲在线观看片| 偷拍熟女少妇极品色| 欧美日韩综合久久久久久 | or卡值多少钱| 亚洲专区国产一区二区| 51国产日韩欧美| 日韩 欧美 亚洲 中文字幕| 夜夜躁狠狠躁天天躁| 免费观看人在逋| 一区二区三区激情视频| 美女高潮的动态| 免费电影在线观看免费观看| 亚洲成av人片在线播放无| 色精品久久人妻99蜜桃| 日韩精品青青久久久久久| 内地一区二区视频在线| 国产一区二区激情短视频| 久久久久国产精品人妻aⅴ院| 久久午夜亚洲精品久久| 在线视频色国产色| 亚洲欧美日韩高清在线视频| 日本a在线网址| 国产极品精品免费视频能看的| 国产亚洲欧美98| 久久中文看片网| 欧美日韩国产亚洲二区| 国产亚洲av嫩草精品影院| 人人妻,人人澡人人爽秒播| 在线播放国产精品三级| 乱人视频在线观看| 在线天堂最新版资源| 色视频www国产| 日韩欧美三级三区| 无限看片的www在线观看| 国产亚洲av嫩草精品影院| 日韩成人在线观看一区二区三区| 精品一区二区三区av网在线观看| 男女之事视频高清在线观看| 国产免费一级a男人的天堂| 特大巨黑吊av在线直播| 床上黄色一级片| 激情在线观看视频在线高清| 亚洲人与动物交配视频| 国产精品久久久人人做人人爽| 在线国产一区二区在线| 18禁裸乳无遮挡免费网站照片| 91字幕亚洲| 国产久久久一区二区三区| 成人特级av手机在线观看| 波野结衣二区三区在线 | 悠悠久久av| 校园春色视频在线观看| 国产三级黄色录像| 变态另类成人亚洲欧美熟女| 97超级碰碰碰精品色视频在线观看| 欧美午夜高清在线| 国产亚洲精品一区二区www| 日本一二三区视频观看| 成人三级黄色视频| 窝窝影院91人妻| 嫩草影院入口| 女人高潮潮喷娇喘18禁视频| 亚洲人成网站高清观看| 亚洲欧美日韩卡通动漫| 国产乱人视频| 午夜久久久久精精品| 欧美一区二区亚洲| 成年女人看的毛片在线观看| 91麻豆av在线| 欧美日韩中文字幕国产精品一区二区三区| 一级黄色大片毛片| 国产视频内射| 亚洲精品美女久久久久99蜜臀| 国产精品国产高清国产av| 国产麻豆成人av免费视频| 香蕉av资源在线| 又黄又粗又硬又大视频| 别揉我奶头~嗯~啊~动态视频| 草草在线视频免费看| 91九色精品人成在线观看| 亚洲av免费高清在线观看| 久久精品国产自在天天线| 中文字幕高清在线视频| 黄片大片在线免费观看| 搡老岳熟女国产| 看片在线看免费视频| www.www免费av| 村上凉子中文字幕在线| 久久久精品大字幕| 亚洲国产精品成人综合色| 久久久久亚洲av毛片大全| 日本一本二区三区精品| 亚洲av第一区精品v没综合| 国产高潮美女av| 法律面前人人平等表现在哪些方面| 精品久久久久久久毛片微露脸| 亚洲精品在线美女| 欧美日韩亚洲国产一区二区在线观看| a级毛片a级免费在线| 国产老妇女一区| 亚洲欧美精品综合久久99| 97超视频在线观看视频| 久久久久国产精品人妻aⅴ院| 少妇人妻精品综合一区二区 | 18禁在线播放成人免费| 日本黄色视频三级网站网址| 欧美另类亚洲清纯唯美| 噜噜噜噜噜久久久久久91| 亚洲精品在线美女| 久久草成人影院| 亚洲无线在线观看| 欧美区成人在线视频| 婷婷丁香在线五月| 国产一区二区三区在线臀色熟女| 国产一区二区三区视频了| 国产精品永久免费网站| 一夜夜www|