• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Improved RC6 Block Cipher Based on Data Dependent Rotations

    2022-11-09 08:17:18OsamaFaragallahIbrahimElashryAhmedAlGhamdiWalidElShafaiElRabaieFathiAbdElSamieHalaElsayedandMohamedElaskily
    Computers Materials&Continua 2022年1期

    Osama S.Faragallah,Ibrahim F.Elashry,Ahmed AlGhamdi,Walid El-Shafai,S.El-Rabaie,Fathi E.Abd El-Samie,Hala S.El-sayed and Mohamed A.Elaskily

    1Department of Information Technology,College of Computers and Information Technology,Taif University,P.O.Box 11099,Taif,21944,Saudi Arabia

    2Department of Electrical Communications,Faculty of Engineering,Kafrelsheikh University,Kafrelsheikh,Egypt

    3Department of Computer Engineering,College of Computers and Information Technology,Taif University,P.O.Box 11099,Taif,21944,Saudi Arabia

    4Department of Electronics and Electrical Communications,Faculty of Electronic Engineering,Menoufia University,Menouf,32952,Egypt

    5Department of Electrical Engineering,Faculty of Engineering,Menoufia University,Shebin El-Kom,32511,Egypt

    6Department of Informatics,Electronic Research Institute(ERI),Cairo,Egypt

    Abstract: This paper introduces an Improved RC6 (IRC6) cipher for data encryption based on data-dependent rotations.The proposed scheme is designed with the potential of meeting the needs of the Advanced Encryption Standard(AES).Four parameters are used to characterize the proposed scheme.These parameters are the size of the word (w) in bits,the number of rounds (r),the length of the secret key (b) in bytes,and the size of the block(L)in bits.The main feature of IRC6 is the variable number of working registers instead of just four registers as in RC6,resulting in a variable block size for plaintext and ciphertext.The IRC6 cipher is designed to improve the robustness against attacks by increasing the diffusion for each round and providing greater security with fewer rounds.The effectiveness of the proposed IRC6 scheme is verified againsttheoretical attacks.The proposed IRC6 scheme depends on full diffusion and confusion mechanisms regardless of the utilized block size.The proposed IRC6 scheme saves 70%of the encryption time and 64%of the decryption time of RC6.The simulation results prove that the IRC6 achieves a better encryption/decryption time compared to the traditional RC6.Therefore,the proposed IRC6 is anticipated to fulfill the market needs and system security requirements.

    Keywords: Cryptography;block cipher;RC6,IRC6,AES

    1 Introduction

    Security is the process of protecting data from unwanted behavior.Security can be achieved through security services that satisfy integrity,availability,and confidentiality.Encrypting of data is the operation of substitution or scrambling of the data through a computer system or any communication system.Later,authorized parties may reverse the process to reconstruct and reveal the original data [1].Fig.1 depicts a data security model [2].The source message is described as a plaintext (X) and transformed into a ciphertext (Y) through the encryption process [3].This encryption process is applied by performing an algorithm with a secret keyK.The encryption produces different outputs based on the secret key.For decryption,the ciphertext can be converted to the plaintext again via performing the decryption algorithm using the same key employed for encryption.The cryptanalysis process tries to discover the plaintext or/and key by creating a plaintext value (Xe) or/and the secret key value (Ke) [1-3].

    Figure 1:Symmetric system model for data security

    Some of the almost widely used traditional ciphers involve RC5 [4-7] and RC6 [8-12].The RC5 employs the ideas of data-dependent rotation,word size variation,variation of the number of rounds,and secret key length variation.RC6 may be considered as an extension of RC5,where it uses four running registers instead of two running registers,in addition to integer multiplication [9-12].With multiplication,the diffusion spread per round can be significantly increased,increasing security,reducing rounds,and increasing throughput.Since declaration of the proposals of RC5 and RC6,many studies have improved the understanding of how structures and operations contribute to security [4-19].Such investigations offered a theoretical attack depending on the fact that RC5 rotations do not rely on each bit in the register.

    The proposal introduces a data encryption algorithm based on data-dependent rotations(IRC6).Unlike RC6,the proposed IRC6 relies on four variables.wdenotes the word size in bits,ris the number of non-negative rounds,bis the length of the secret key in bytes,andLis the block size.The number of working registersmcan be found by dividingLbyw.The employment of integer multiplication extremely enhances the diffusion spread accomplished per round and can provide enhanced security.The IRC6 consists of two major components,the cipher algorithm and the confusion/diffusion network,which depends on the XOR operation between permuted bytes,called ‘’Permuted XORed Bytes” (PXB).Fig.2 shows the general description of the proposed encryption/decryption process of IRC6.

    These proposed modifications offer the advantages of enhancing the number of rotations for each round and utilizing further data bits to evaluate the number of rotations for each round.Therefore,integer multiplication can be considered as an effective diffusion primitive and can be utilized to calculate the number of rotations in the proposed IRC6.Consequently,the proposed IRC6 shows an increase in the diffusion spread compared with all other block ciphers.In addition,the IRC6 can run with less rounds with an efficient increase in security and throughput.

    Figure 2:Description of the proposed encryption/decryption processes of IRC6 (a) The encryption process (b) The decryption process

    The work presented in this paper offers several significant contributions to the security field as follows:

    (a) A detailed survey of the RC6 encryption algorithm is presented.It is noticed that RC6 cannot provide full confusion and diffusion properties to the encrypted data.

    (b) A proposed cipher (IRC6),which is an advanced version of RC6,is introduced.This cipher has a variable block length,which makes it more flexible.

    (c) The proposed algorithm achieves full diffusion and confusion,and it is divided into two parts.The first one is the PXB network,which mixes the bytes of the data.If there are any small changes in the plaintext,they result in changes in all bytes of the ciphertext,and these changes are magnified in the cipher,resulting in full diffusion and confusion properties regardless of the block size.

    (d) The proposed cipher has good flexibility and effectiveness.This appears in the variable block size and the high throughput.

    (e) A good comparative analysis is introduced.This is achieved by performing a comparison of the proposed algorithm with RC6 for theoretical attacks.

    The rest of the paper is organized as follows.Section 2 provides the RC6 literature overview.Section 3 presents the functional and design parameters of the proposed IRC6.Section 4 explores the architecture of the proposed IRC6.The implementation issues are given in Section 5.Section 6 introduces theoretical attacks on the proposed IRC6 cipher.A comparative analysis of the proposed IRC6 and the state-of-the-art RC6 is introduced in Section 7.The conclusion is given in Section 8.

    2 The RC6

    The RC6 is characterized as an encryption algorithm that belongs to the fully-parameterized family [4-7,9-12].RC6 is a version of block ciphers specified as RC6-ww/rr/bb,wherewwdenotes the word size in bits,rrdenotes the number of rounds,andbbdenotes the length in bytes of the key.These parameters are shown in Tab.1.In all variants,RC6-ww/rr/bbworks in units of four wbit words input/output (plaintext/ciphertext),It may be considered as a word-oriented algorithm.The RC6 has three processes: the key schedule algorithm,encryption,and decryption algorithms.

    Table 1:RC6 parameters

    2.1 Key Schedule Routine

    The key schedule routine extends the secret keyKto fill the extended key arraySS.So,SSis similar to a random binary array of wordstt=2rr+4specified byKK.The key schedule routine utilizes two magic constants [4-7] and has three algorithmic parts: converting,initializing,and mixing,respectively.

    ·Converting:The user secret keyKK[0...bb-1] is copied into theL[0...cc-1] array of wordscc=[bb/uu],where the number of bytes/word is denoted asuu=ww/8.Fill each consecutive word fromLL,low byte to high byte,using consecutive key bytes ofKK.The unfilled byte positions inLLare padded with zeros as follows: Fill each consecutive word fromLL,low byte to high byte,using consecutive key bytes ofKK.The unfilled byte positions inLLare padded with zeros,as given below.

    ·Initializing: The arraySSis initialized with a specific fixed pseudo-random bit pattern based on modulo 2wusing the two magic constantsPwandQw.

    ·Mixing: This stage starts by mixing the user’s secret key intoSSandLLarrays.More accurately,becauseSSandLLcan have unequal sizes,the larger array is processed for one time,and the other is processed three times.

    2.2 RC6 Encryption/Decryption Processes

    The RC6 encryption is explored and detailed as follows.It is assumed that the input block is provided to the four ww-bit registersAA,BB,CCandDD,and the output is stored inAA,BB,CC,andDDregisters.

    The RC6 decryption process can be easily derived from the RC6 encryption process [9-12].

    3 Features and Design Parameters of IRC6

    The IRC6 consists of two parts,the cipher algorithm and the Permuted-XORed Bytes Network (PXB).

    3.1 Cipher Algorithm

    Similar to RC5 and RC6 ciphers,the IRC6 is a family of fully-parameterized cryptographic algorithms.The proposed IRC6 is more precisely designated as IRC6-w/r/b/L;in whichwdenotes the word size in bits,rdenotes the number of rounds,Ldenotes the encryption key length in bytes andbis the block size.IRC6-w/r/b/Lworks inmunits of w-bit words,wheremis the number of working registers.The IRC6 works with m-word input/output (plaintext/ciphertext).So it may be considered as a word-oriented algorithm.As seen,we have input with w-bit words and output with all computational operations.So,the IRC6 first design parameter isw.The normal selection forwis 32 bits,and IRC6 operates on 32 *mbits of plaintext and ciphertext block size (L).For simplicity,only values of 16,32 and 64 are suggested [9-12].

    The second IRC6 design parameter is the number of roundsr.An extended key tableSis derived from the secret key provided by the user.TableSwith sizetdepends on the number of roundsrwitht=(r+ 2) words.If(r+ 2) is too large (i.e.,>352),which represents four times the size ofSin RC6,the sizetof the tableSwill be too large,consuming processing time and memory.So,a constant sizetof 352 will be adopted.The keys will be reused in the encryption/decryption process.There are different versions of the algorithm based on selecting the values of the parameterswandr.

    The IRC6 third design parameter is the secret key length determined bybandKparameters.The parameterbdenotes the secret key number of bytes forK[0],K[1],K[2],...,K[b-1].The permissible values ofbare 0,1,2,3,...,255.

    Block size is the fourth design parameter of IRC6.The variable block size comes from using a variable number of registers in the encryption/decryption process,unlike RC6,resulting in more flexibility.The test results show that with the increase in the number of working registers,the security and throughput are improved,and the dependency between the data increases.

    3.2 Primitive Operations of IRC6-w/r/b/L

    The proposed IRC6-w/r/b/Lblock cipher uses the following primitive operations as shown in Tab.2.log2(x) represents thexbase-two logarithm.

    Table 2:IRC6 primitive operations

    3.3 The Permuted-XORed Bytes Network

    The Permuted-XORed Bytes (PXB) is the network of substitution-transposition that is responsible for providing the confusion/diffusion mechanism of the IRC6.The proposed PXB is utilized to increase the confusion/diffusion characteristics of IRC6 by mixing bytes of data.First,the XOR chain operations are performed between the plaintext bytes.K1is the sub-key that acts as the first XORing initial key and results in a XORing with the next block until reaching the end of the plaintext.Then,all blocks resulting from this XOR series are transposed bit by bit,as illustrated in Fig.1.After that,a block-based transposition is employed.Finally,another XOR chain is employed starting from the sub-keyK2.The advantage of the PXB is that one round is fair enough to make a complete confusion/diffusion of the plaintext and it does not consume too much time.

    4 Architecture and Implementation of IRC6

    The IRC6 algorithm,likes RC6,has three processes: the key expansion process,the encryption processes,and the decryption processes.These processes are shown in the following subsections.

    4.1 IRC6 Encryption/Decryption

    In the encryption process,the plaintext is firstly processed by PXB,and then it is delivered to the IRC6 cipher.The IRC6 hasm w-bit registersWiwithi=1,2,3,...,m.The registers include the initial input of the plaintext and output ciphertext of the encryption.The initial byte of either plaintext or ciphertext is put inW1,and the final byte is put inWm.A parallel assignment is performed and this can be expressed as (Wl,W2,W3,...,Wm-1,Wm)=(W2,W3,W4,Wm-1,Wm,W1).

    The pseudo-code of the encryption with IRC6-w/r/b/Lis as follows:

    The pseudo-code of the decryption of IRC6-w/r/b/Lis as follows:

    4.2 Key Expansion Algorithm for IRC6

    The main schedule of IRC6 is substantially the same as the main key schedule of RC5 and RC6,using the magic constantsPw,Qw.The difference in IRC6 is the number of w-bit words generated for the addition round keyt=(r+ 2) and stocked in theS[0,...,t-1] array.

    If the block size is large,i.e.,((r+2) >352),the number of additive round keys will be large resulting in consumption in both memory and processing time.So,a key re-usage mechanism is used to update the keys in the encryption/decryption processes.

    The key re-usage function is used to update tableSwith new values in the encryption/decryption processes resulting in more security.The equation of the update is

    5 Implementation Issues

    The IRC6-w/r/b/Luses(r+2) words generated from the key schedule and minimal additional memory.To calculate the(r+2) words in the key schedule,the key setting process only needs a secondary array of approximately an equivalent size as the key provided by the user.Also,since the key scheduling has justtwords,the key schedule process for hundreds of keys can be pre-computed and performed.After that,the pointer is needed to switch only to the relevant key,and hence key agility is kept.The main goal of security is that the transform functionf(x)=x(2x+ l) (mod 2w),which determines the amount of data-dependent rotation,must depend on every bit of the input word,and the transform has to provide an effective mix between words.

    For the previous block cipher and the modified cipher,the selected transform is the left rotation by the functionf(x) followed by the log2(w) bit position (log2(w)=5 forw=32).Thef(x) function is a one-to-one modulo 2w,andf(x) bits with a higher-order estimate of the rotation amount are highly dependent on every bit ofx[9-12].The rotation is performed by the log2(w) bits,but taking into account the hardening differential and linear cryptographic analysis.

    Another issue is that in the decryption process,the key must be prepared first before beginning the decryption process by applying the key re-usage function of the encryption process along the length of the ciphertext to get the value ofS[t-1].This disadvantage results in a slight increase in the decryption time compared to the encryption one.

    6 Theoretical Attacks

    6.1 Basic Cryptanalytic Attack

    The brute-force attack is the most commonly employed for IRC6 cryptographic analysis via searching the encryption key space for theb-bytes encryption key.Hence,if the key provided by the user is long,the search focuses on the extending round key array [20].A meet-in-themiddle attack,which is resource-intensive,can decrease the number of operations to min {28b,min {2(8m(r+2)),2(5632)}}.Otherwise,the number of operations is min {28b,min {2(16m(r+2)),2(11264)}} [20].However,the AES-specific key size weakens the effect of brute-force attacks [21].

    6.2 Confusion/Diffusion Mechanism

    A desirable property of the proposed encryption system is that it is susceptible to small changes in plaintext (just one plaintext bit changes).Usually,the other party can make minor changes,like changing just only 1 byte of the source plaintext and notifying the result modification.Through this technique,one can figure out a meaningful relationship between plaintext and ciphertext.However,this attack would be practically useless and inefficient if the ciphertext could be changed drastically due to minor changes in the plaintext [22].

    In Shannon’s original definitions,confusion means complicating the relationship between the key and the ciphertext.The main purpose of the confusion is to make the key hard to be determined,even when there are many plaintext-ciphertext pairs generated with the same key.So,each ciphertext bit has to depend differently on the whole key and the other bits in the key.Specifically,if we change just one key bit,the ciphertext must be changed completely [22].

    In the IRC6 cryptosystem,due to PXB and the variable working registers (m),one can encrypt a huge amount of data (ex: 1GB) by processing the data with the PXB network,and then dividing it into m working registers.These registers are all encrypted with each other in each round,giving a complete self-diffusion mechanism.Furthermore,the key re-usage function can generate new values of keys in the encryption/decryption processes,resulting in full dependence of the data on the key.

    7 Comparative Analysis

    A comparative analysis is held between IRC6 and RC6 to assess the encryption/decryption procedures.The effect of the number of rounds on the encryption quality is investigated for IRC6 and compared with that on RC6 in different modes of operation atr=20,which gives the best encryption quality in RC6 [20-22].The measurement for normalized throughput of encryption/decryption is also considered.The analysis of confusion/diffusion properties is presented.The results are explained in sections 7.1 to 7.4.

    7.1 The Effect of Number of Rounds on Encryption Quality

    LetFandF′denote the plaintext and ciphertext,respectively,each of sizeLbytes,and denoteH(F) as the occurrence number of each byte value from 0 to 255 in the plaintext andH(F′) as the number of occurrences of each byte value from 0 to 255 in the ciphertext.So,the encryption quality can be expressed as:

    The test was made on data with a size of 256 KB using IRC6-32/r/16/256 K,i.e.,the data was treated as one block.The encryption quality of RC6 in ECB,CBC,and OFB modes atr=20 is shown in Tab.3.From Tab.3 and Fig.3,we can see that:

    (1) The best result of IRC6 is atr=2 with a value of 737.1875.

    (2) Comparing these results with those of RC6,one can see that with only two rounds of IRC6,the encryption quality is better than that of RC6.

    Table 3:The encryption quality of RC6 in ECB,CBC and OFB modes

    Figure 3:The effect of the number of rounds on IRC6 encryption quality

    7.2 Encryption/Decryption Throughput

    The encryption/decryption throughput (Th) can be estimated as the encryption or decryption amount of data per time unit (MB/Sec).In addition,the throughput normalization is tested on data with a size of 64 KB and computed for RC6-32/20/16 and IRC6-32/2/16/64 K.The results show that IRC6 takes only 30% of the encryption time of RC6,but in decryption,the percentage is increased to 36% of the decryption time of RC6.This is attributed to the key preparation process before decryption.

    7.3 Diffusion

    The diffusion of an algorithm can be tested by two factors: the Number of Pixels Changing Rate (NPCR) and the Unified Average Change Intensity (UACI) [23-25].Considering the two ciphers,C1andC2,whose plaintexts have only one-bit difference.Also,letC1(i) andC2(i)representC1andC2atith byte.Assume a bipolar array,Dof equivalent size asC1andC2.Hence,the values ofC1(i) andC2(i) giveD(i).IfC1(i)=C2(i),thenD(i)=0;otherwise,D(i)=1.The NPCR can be computed as:

    whereLisC1orC2length.The NPCR detects the percentage of different bytes between the two ciphers.

    The UACI can be computed as:

    which estimates the difference in average intensity between the two ciphers.The test was made on data of 64 KB.The results are shown in Tab.4.From these results,one can see that:

    (1) The best mode that makes the most significant diffusion in RC6 is the CBC mode.

    (2) The IRC6 has the best results compared to all other RC6 modes.

    Table 4:The NPCR and UACI results

    7.4 Confusion

    We have tested the confusion by ciphering a 64 KB plaintext with two different keys.The first is key1=‘0000000000000000’16 and the second is key2=‘0000000000000001’16.The correlation between these two ciphers is calculated.For IRC6-32/2/16/64 K,the correlation is-0.0013 indicating a high deviation between these two ciphers due to a one-bit change in the key.

    8 Conclusions

    This paper introduced an IRC6,which is considered as an improved extension of RC5 and RC6 ciphers.Its salient feature is the utilization of a variable number of working registers instead of constant four registers in the RC6 round resulting in varying plaintext/ciphertext block size resulting and more flexibility.The processes of IRC6 include encryption,decryption and key expansion.Experiments have been conducted to demonstrate that the proposed encryption algorithm is robust against theoretical attacks.Furthermore,the IRC6 is verified as a full diffusion/confusion mechanism regardless of the block size.Finally,the comparative analysis for the IRC6 was considered,and its results were compared to those of RC6.The obtained results demonstrate that IRC6 has less encryption/decryption times and higher throughput compared to RC6 in other modes of operation.Using this architecture,the IRC6 w/r/b/L provides a compact,simple,and dynamic block cipher that satisfies the Advanced Encryption Standard and the computer security developers’goals.

    Acknowledgement: The authors would like to thank the Deanship of Scientific Research,Taif University Researchers Supporting Project number (TURSP-2020/08),Taif University,Taif,Saudi Arabia for supporting this research work.

    Funding Statement: This study was funded by the Deanship of Scientific Research,Taif University Researchers Supporting Project number (TURSP-2020/08),Taif University,Taif,Saudi Arabia.

    Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study.

    黑人巨大精品欧美一区二区蜜桃| 国产在线一区二区三区精| 看免费av毛片| 丁香六月欧美| 欧美精品亚洲一区二区| 国产精品 欧美亚洲| 在线观看免费高清a一片| 香蕉久久夜色| 精品少妇一区二区三区视频日本电影| 熟女少妇亚洲综合色aaa.| 国产97色在线日韩免费| 亚洲第一欧美日韩一区二区三区 | 啦啦啦 在线观看视频| 99热网站在线观看| 99国产极品粉嫩在线观看| 欧美乱码精品一区二区三区| 亚洲成av片中文字幕在线观看| 亚洲成人免费电影在线观看| 999久久久精品免费观看国产| 男人舔女人的私密视频| 国产精品98久久久久久宅男小说| aaaaa片日本免费| 久久久久久亚洲精品国产蜜桃av| 国产黄频视频在线观看| 中亚洲国语对白在线视频| 国产精品 国内视频| 两性夫妻黄色片| 无人区码免费观看不卡 | 9色porny在线观看| 九色亚洲精品在线播放| 一进一出好大好爽视频| 成年人黄色毛片网站| 日本av免费视频播放| 国产黄色免费在线视频| 青青草视频在线视频观看| 久久99热这里只频精品6学生| 日日爽夜夜爽网站| 少妇猛男粗大的猛烈进出视频| 色综合婷婷激情| 欧美精品啪啪一区二区三区| 欧美成人午夜精品| 午夜视频精品福利| 每晚都被弄得嗷嗷叫到高潮| 久久久久久久大尺度免费视频| 极品少妇高潮喷水抽搐| 国产精品香港三级国产av潘金莲| 他把我摸到了高潮在线观看 | 一边摸一边抽搐一进一小说 | 十八禁高潮呻吟视频| 老司机亚洲免费影院| 久久ye,这里只有精品| 汤姆久久久久久久影院中文字幕| 亚洲国产精品一区二区三区在线| 亚洲av第一区精品v没综合| 岛国毛片在线播放| 99精品欧美一区二区三区四区| 国产伦理片在线播放av一区| 伦理电影免费视频| 老司机深夜福利视频在线观看| 久久久水蜜桃国产精品网| 精品少妇内射三级| 久久青草综合色| 成人影院久久| 亚洲一码二码三码区别大吗| 狠狠精品人妻久久久久久综合| 少妇猛男粗大的猛烈进出视频| 两性午夜刺激爽爽歪歪视频在线观看 | 岛国毛片在线播放| 亚洲av国产av综合av卡| 99精品在免费线老司机午夜| 人人妻,人人澡人人爽秒播| 老司机影院毛片| 青草久久国产| 一本—道久久a久久精品蜜桃钙片| 美女福利国产在线| 亚洲中文字幕日韩| www.999成人在线观看| 1024视频免费在线观看| 高潮久久久久久久久久久不卡| 悠悠久久av| 亚洲熟妇熟女久久| 日韩大片免费观看网站| 精品国内亚洲2022精品成人 | 欧美大码av| 亚洲国产中文字幕在线视频| 可以免费在线观看a视频的电影网站| 50天的宝宝边吃奶边哭怎么回事| 男男h啪啪无遮挡| 欧美日韩精品网址| 激情在线观看视频在线高清 | 精品福利观看| 欧美 日韩 精品 国产| 日韩欧美国产一区二区入口| tube8黄色片| 亚洲第一av免费看| 日韩欧美一区视频在线观看| 性高湖久久久久久久久免费观看| 色94色欧美一区二区| 狠狠狠狠99中文字幕| 国产精品成人在线| 视频区图区小说| 国产精品美女特级片免费视频播放器 | 亚洲精品国产色婷婷电影| 桃花免费在线播放| 久久影院123| 一本综合久久免费| 啦啦啦中文免费视频观看日本| 激情在线观看视频在线高清 | 亚洲午夜精品一区,二区,三区| 妹子高潮喷水视频| 日韩成人在线观看一区二区三区| kizo精华| 精品亚洲乱码少妇综合久久| 久久婷婷成人综合色麻豆| 久热爱精品视频在线9| 亚洲午夜理论影院| 欧美国产精品va在线观看不卡| 激情在线观看视频在线高清 | 亚洲色图综合在线观看| 99re在线观看精品视频| kizo精华| 国产精品1区2区在线观看. | 91精品国产国语对白视频| 国产成+人综合+亚洲专区| 成人18禁高潮啪啪吃奶动态图| 欧美大码av| 成人永久免费在线观看视频 | 日本黄色日本黄色录像| 天天添夜夜摸| 狠狠狠狠99中文字幕| 一区二区av电影网| 亚洲欧美日韩高清在线视频 | 日韩 欧美 亚洲 中文字幕| tocl精华| 国产精品久久久久久精品古装| av欧美777| 国产在线视频一区二区| av网站免费在线观看视频| 菩萨蛮人人尽说江南好唐韦庄| 亚洲avbb在线观看| 成人影院久久| 精品一区二区三区av网在线观看 | 亚洲国产精品一区二区三区在线| 午夜成年电影在线免费观看| 欧美激情久久久久久爽电影 | 久久性视频一级片| 日本wwww免费看| 天天添夜夜摸| 免费在线观看视频国产中文字幕亚洲| 黑人欧美特级aaaaaa片| 免费日韩欧美在线观看| 91字幕亚洲| av欧美777| 久久中文字幕一级| 亚洲天堂av无毛| 十分钟在线观看高清视频www| 丁香六月欧美| 亚洲自偷自拍图片 自拍| 亚洲少妇的诱惑av| 日韩三级视频一区二区三区| 香蕉丝袜av| 成年女人毛片免费观看观看9 | 黄色成人免费大全| 国产男靠女视频免费网站| 国产日韩欧美视频二区| 99久久99久久久精品蜜桃| 亚洲国产av影院在线观看| 免费不卡黄色视频| av国产精品久久久久影院| av天堂久久9| netflix在线观看网站| 又黄又粗又硬又大视频| av线在线观看网站| 大陆偷拍与自拍| 国产一区二区在线观看av| 99精品在免费线老司机午夜| 日韩中文字幕欧美一区二区| 久久久精品免费免费高清| 亚洲精华国产精华精| 99riav亚洲国产免费| 丰满人妻熟妇乱又伦精品不卡| 一级毛片电影观看| 又黄又粗又硬又大视频| 国产在线一区二区三区精| 亚洲精品美女久久av网站| 啪啪无遮挡十八禁网站| 自拍欧美九色日韩亚洲蝌蚪91| 欧美人与性动交α欧美软件| 不卡一级毛片| a级片在线免费高清观看视频| 亚洲av日韩精品久久久久久密| 69精品国产乱码久久久| 精品午夜福利视频在线观看一区 | 国产xxxxx性猛交| 色94色欧美一区二区| 亚洲国产欧美在线一区| 亚洲全国av大片| 亚洲黑人精品在线| 窝窝影院91人妻| 丁香六月天网| 操出白浆在线播放| 老熟妇乱子伦视频在线观看| 黑丝袜美女国产一区| 亚洲综合色网址| 亚洲国产欧美日韩在线播放| 亚洲国产欧美一区二区综合| 高清欧美精品videossex| 美女高潮喷水抽搐中文字幕| 亚洲欧洲日产国产| videos熟女内射| 一区二区三区精品91| 99久久99久久久精品蜜桃| 他把我摸到了高潮在线观看 | 久久亚洲精品不卡| 99精品久久久久人妻精品| a级毛片黄视频| 亚洲第一青青草原| 在线av久久热| 亚洲 国产 在线| av超薄肉色丝袜交足视频| 男男h啪啪无遮挡| 另类亚洲欧美激情| av又黄又爽大尺度在线免费看| 精品国产超薄肉色丝袜足j| 国产精品av久久久久免费| 两个人看的免费小视频| 久久精品aⅴ一区二区三区四区| 中文字幕人妻熟女乱码| 老熟妇乱子伦视频在线观看| 国产亚洲精品久久久久5区| 午夜免费鲁丝| 美女午夜性视频免费| 久久午夜亚洲精品久久| 国产精品免费视频内射| 国产亚洲精品久久久久5区| 久久精品国产99精品国产亚洲性色 | 新久久久久国产一级毛片| 国产成人精品在线电影| 午夜精品久久久久久毛片777| 国产精品久久电影中文字幕 | 精品一品国产午夜福利视频| 两人在一起打扑克的视频| 精品一区二区三区视频在线观看免费 | 国产精品免费视频内射| 男女免费视频国产| 国产在线精品亚洲第一网站| 国产成人欧美| av欧美777| 一二三四社区在线视频社区8| 男女边摸边吃奶| 最新在线观看一区二区三区| 女人爽到高潮嗷嗷叫在线视频| 久久精品亚洲熟妇少妇任你| 巨乳人妻的诱惑在线观看| 女人久久www免费人成看片| 1024香蕉在线观看| 欧美精品亚洲一区二区| 99久久人妻综合| 国产精品九九99| 狂野欧美激情性xxxx| 亚洲欧美精品综合一区二区三区| 国产精品国产av在线观看| 国产精品av久久久久免费| 国产欧美日韩综合在线一区二区| 丰满迷人的少妇在线观看| 热99国产精品久久久久久7| 大型黄色视频在线免费观看| 色94色欧美一区二区| 69精品国产乱码久久久| 岛国在线观看网站| 亚洲成人免费av在线播放| 男人操女人黄网站| 天堂俺去俺来也www色官网| 久久人妻熟女aⅴ| 一级毛片精品| 亚洲成av片中文字幕在线观看| 国产精品免费大片| 女人高潮潮喷娇喘18禁视频| 99热国产这里只有精品6| 少妇 在线观看| 中文字幕人妻丝袜制服| av电影中文网址| 99re6热这里在线精品视频| 熟女少妇亚洲综合色aaa.| 精品亚洲成a人片在线观看| 亚洲色图 男人天堂 中文字幕| 亚洲精品一卡2卡三卡4卡5卡| 99精国产麻豆久久婷婷| 亚洲中文日韩欧美视频| 在线天堂中文资源库| 正在播放国产对白刺激| 日韩免费av在线播放| 香蕉丝袜av| 日本一区二区免费在线视频| 亚洲专区字幕在线| 国产精品久久久人人做人人爽| 嫁个100分男人电影在线观看| 久久久久精品国产欧美久久久| 亚洲七黄色美女视频| 2018国产大陆天天弄谢| 国产精品电影一区二区三区 | 亚洲午夜理论影院| 午夜福利免费观看在线| 亚洲中文日韩欧美视频| 90打野战视频偷拍视频| 亚洲成人手机| 精品久久久久久久毛片微露脸| 精品少妇久久久久久888优播| 亚洲视频免费观看视频| 丰满人妻熟妇乱又伦精品不卡| 国产xxxxx性猛交| 亚洲免费av在线视频| 三上悠亚av全集在线观看| 成年人黄色毛片网站| 黑人巨大精品欧美一区二区mp4| 大型av网站在线播放| 女人爽到高潮嗷嗷叫在线视频| 日韩熟女老妇一区二区性免费视频| 国产在线精品亚洲第一网站| 国产精品二区激情视频| 久久久久久久久免费视频了| 91麻豆精品激情在线观看国产 | 夜夜夜夜夜久久久久| 在线亚洲精品国产二区图片欧美| 一区二区三区精品91| 不卡av一区二区三区| 久久久水蜜桃国产精品网| 久久久久视频综合| 九色亚洲精品在线播放| 女人久久www免费人成看片| 精品午夜福利视频在线观看一区 | 男女床上黄色一级片免费看| 视频区图区小说| 夜夜骑夜夜射夜夜干| 国产在线一区二区三区精| 蜜桃国产av成人99| 国产一区二区激情短视频| 久久久久视频综合| 国产精品98久久久久久宅男小说| 99re6热这里在线精品视频| 欧美精品人与动牲交sv欧美| av一本久久久久| 最新美女视频免费是黄的| 天天躁日日躁夜夜躁夜夜| 亚洲精品国产区一区二| 久久精品国产亚洲av香蕉五月 | 欧美精品一区二区大全| 婷婷丁香在线五月| 欧美日韩黄片免| 亚洲欧美一区二区三区黑人| 精品高清国产在线一区| 黄色毛片三级朝国网站| 在线观看人妻少妇| 国产免费福利视频在线观看| 黑人欧美特级aaaaaa片| 少妇被粗大的猛进出69影院| 自拍欧美九色日韩亚洲蝌蚪91| 日本五十路高清| 久久性视频一级片| 在线观看66精品国产| 男女之事视频高清在线观看| 丁香六月欧美| 国产精品久久久人人做人人爽| 制服诱惑二区| 一区二区三区激情视频| 久久久久久久久久久久大奶| 又黄又粗又硬又大视频| 久久久久精品人妻al黑| 亚洲免费av在线视频| 亚洲精品一卡2卡三卡4卡5卡| 日本a在线网址| 欧美乱码精品一区二区三区| 国产一区二区激情短视频| 国产精品一区二区在线不卡| 在线观看免费视频网站a站| 首页视频小说图片口味搜索| 在线亚洲精品国产二区图片欧美| 男人操女人黄网站| 一区二区三区激情视频| 亚洲精品美女久久久久99蜜臀| 黑人猛操日本美女一级片| 午夜福利欧美成人| 制服诱惑二区| 国产精品免费视频内射| 纵有疾风起免费观看全集完整版| 黑人操中国人逼视频| 性高湖久久久久久久久免费观看| 50天的宝宝边吃奶边哭怎么回事| 亚洲精品一卡2卡三卡4卡5卡| 国内毛片毛片毛片毛片毛片| 色综合欧美亚洲国产小说| 亚洲少妇的诱惑av| 国产一区二区在线观看av| 亚洲 国产 在线| 欧美日韩福利视频一区二区| 免费在线观看影片大全网站| 成年人黄色毛片网站| 日韩中文字幕欧美一区二区| 最新的欧美精品一区二区| 黄色成人免费大全| 最近最新中文字幕大全免费视频| 精品高清国产在线一区| 日本黄色日本黄色录像| 中文字幕最新亚洲高清| 久久精品aⅴ一区二区三区四区| 欧美一级毛片孕妇| 婷婷成人精品国产| 国产精品九九99| 天堂8中文在线网| 久久中文看片网| 首页视频小说图片口味搜索| 亚洲 国产 在线| 最黄视频免费看| 欧美日韩黄片免| 久久精品亚洲av国产电影网| 一级黄色大片毛片| 免费看十八禁软件| 欧美 亚洲 国产 日韩一| 成人亚洲精品一区在线观看| 怎么达到女性高潮| 老汉色av国产亚洲站长工具| 国产高清国产精品国产三级| 一级黄色大片毛片| 亚洲一区二区三区欧美精品| 9热在线视频观看99| 国产精品久久久久久人妻精品电影 | 首页视频小说图片口味搜索| 九色亚洲精品在线播放| 交换朋友夫妻互换小说| 国产成+人综合+亚洲专区| 丝袜美腿诱惑在线| 窝窝影院91人妻| 欧美黄色片欧美黄色片| 国产在线精品亚洲第一网站| 黄片小视频在线播放| 成人18禁在线播放| 久久精品aⅴ一区二区三区四区| 亚洲第一欧美日韩一区二区三区 | 国产精品 国内视频| 午夜激情av网站| 18禁美女被吸乳视频| 两性午夜刺激爽爽歪歪视频在线观看 | 波多野结衣一区麻豆| 亚洲欧美日韩另类电影网站| 欧美精品高潮呻吟av久久| 久久国产精品大桥未久av| 日韩中文字幕视频在线看片| 日本五十路高清| 亚洲九九香蕉| 久久热在线av| 妹子高潮喷水视频| 丝袜人妻中文字幕| 日本黄色视频三级网站网址 | 丝袜在线中文字幕| 日韩视频一区二区在线观看| 色播在线永久视频| 国产免费现黄频在线看| 国产99久久九九免费精品| 国产伦理片在线播放av一区| 日本撒尿小便嘘嘘汇集6| 丝袜在线中文字幕| 亚洲av国产av综合av卡| 亚洲va日本ⅴa欧美va伊人久久| 亚洲人成77777在线视频| 亚洲欧美日韩高清在线视频 | av片东京热男人的天堂| 99精国产麻豆久久婷婷| 国产97色在线日韩免费| 婷婷成人精品国产| 黄片大片在线免费观看| 欧美日韩精品网址| cao死你这个sao货| 99国产精品一区二区三区| 成在线人永久免费视频| 丁香六月欧美| 国产在线免费精品| 国产成人av激情在线播放| 久久久欧美国产精品| 国产精品欧美亚洲77777| 精品一区二区三卡| 成人三级做爰电影| 国产成人系列免费观看| 又大又爽又粗| 青草久久国产| 国产在视频线精品| 十八禁网站免费在线| 久久人人爽av亚洲精品天堂| 国产伦理片在线播放av一区| 亚洲精品国产色婷婷电影| 麻豆成人av在线观看| 成在线人永久免费视频| 亚洲欧美日韩高清在线视频 | 久久亚洲真实| 人妻久久中文字幕网| 精品国产亚洲在线| 最近最新免费中文字幕在线| 欧美日韩av久久| 男女之事视频高清在线观看| 男男h啪啪无遮挡| 99精国产麻豆久久婷婷| 两性午夜刺激爽爽歪歪视频在线观看 | 精品国产国语对白av| 99re在线观看精品视频| av片东京热男人的天堂| 狠狠精品人妻久久久久久综合| 51午夜福利影视在线观看| 国产色视频综合| 亚洲精品一卡2卡三卡4卡5卡| 狠狠婷婷综合久久久久久88av| 国产成人av激情在线播放| 精品国产国语对白av| 女人久久www免费人成看片| 搡老熟女国产l中国老女人| 精品免费久久久久久久清纯 | 亚洲午夜精品一区,二区,三区| 精品福利永久在线观看| 国产精品国产高清国产av | 视频在线观看一区二区三区| 欧美人与性动交α欧美软件| 五月天丁香电影| 亚洲中文av在线| 男男h啪啪无遮挡| 国产一区二区三区在线臀色熟女 | 一区二区三区精品91| 动漫黄色视频在线观看| 日韩人妻精品一区2区三区| 水蜜桃什么品种好| 精品福利永久在线观看| 9热在线视频观看99| 亚洲av国产av综合av卡| 激情视频va一区二区三区| 亚洲av欧美aⅴ国产| 少妇 在线观看| 大香蕉久久成人网| 久久国产精品影院| 国产黄频视频在线观看| 免费在线观看影片大全网站| 日本一区二区免费在线视频| 欧美 日韩 精品 国产| 成人手机av| 五月天丁香电影| 性色av乱码一区二区三区2| 黄色a级毛片大全视频| 老汉色av国产亚洲站长工具| 亚洲av成人一区二区三| 狠狠狠狠99中文字幕| 在线观看66精品国产| 免费观看a级毛片全部| 国产野战对白在线观看| av网站在线播放免费| 男女无遮挡免费网站观看| 成年女人毛片免费观看观看9 | 日韩中文字幕欧美一区二区| 午夜老司机福利片| 日本欧美视频一区| 成人18禁高潮啪啪吃奶动态图| 啦啦啦 在线观看视频| 久久国产精品人妻蜜桃| 欧美变态另类bdsm刘玥| 久久国产精品人妻蜜桃| 久久久欧美国产精品| 黄片播放在线免费| 国产三级黄色录像| 午夜福利影视在线免费观看| 狠狠狠狠99中文字幕| 在线观看www视频免费| 日本一区二区免费在线视频| 无遮挡黄片免费观看| 国产亚洲欧美精品永久| 欧美黑人精品巨大| 丰满迷人的少妇在线观看| 视频区欧美日本亚洲| 在线十欧美十亚洲十日本专区| 久久天躁狠狠躁夜夜2o2o| 一区二区三区乱码不卡18| 欧美精品人与动牲交sv欧美| 黄色成人免费大全| 制服诱惑二区| 精品亚洲成国产av| 一级片'在线观看视频| a级片在线免费高清观看视频| 日日爽夜夜爽网站| 久久ye,这里只有精品| 亚洲久久久国产精品| 精品一区二区三区av网在线观看 | 国产男靠女视频免费网站| 男女免费视频国产| 欧美国产精品va在线观看不卡| 交换朋友夫妻互换小说| 成人特级黄色片久久久久久久 | 最黄视频免费看| tube8黄色片| 操美女的视频在线观看| 国产精品香港三级国产av潘金莲| www.熟女人妻精品国产| 99在线人妻在线中文字幕 | av欧美777| 国产精品一区二区在线不卡| 亚洲av日韩精品久久久久久密| 欧美激情久久久久久爽电影 | 国产单亲对白刺激| 免费少妇av软件| 最新美女视频免费是黄的| 成人亚洲精品一区在线观看| 窝窝影院91人妻| 亚洲欧美一区二区三区黑人| 热re99久久精品国产66热6| 精品国产乱码久久久久久小说| 亚洲 国产 在线| 色综合欧美亚洲国产小说| 99精品欧美一区二区三区四区| 无限看片的www在线观看| 一边摸一边抽搐一进一小说 | 老熟女久久久| av网站在线播放免费|