• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Triple Key Security Algorithm Against Single Key Attack on Multiple Rounds

    2022-11-11 10:49:54MuhammadAkramMuhammadWaseemIqbalSyedAshrafAliMuhammadUsmanAshrafKhalidAlsubhiandHaniMoaiteqAljahdali
    Computers Materials&Continua 2022年9期

    Muhammad Akram,Muhammad Waseem Iqbal,Syed Ashraf Ali,Muhammad Usman Ashraf,Khalid Alsubhi and Hani Moaiteq Aljahdali

    1Department of Computer Science,Superior University Lahore,54000,Pakistan

    2Department of Software Engineering,Superior University Lahore,54000,Pakistan

    3Department of Computer Science,The Institute of Management Sciences(PAK-AIMS),Lahore,54000,Pakistan

    4Department of Computer Science,GC Women University Sialkot,Pakistan

    5Department of Computer Science,King Abdulaziz University,Jeddah,Saudi Arabia

    6Faculty of Computing and Information Technology,King Abdulaziz University,Jeddah,Saudi Arabia

    Abstract: In cipher algorithms,the encryption and decryption are based on the same key.There are some limitations in cipher algorithms, for example in polyalphabetic substitution cipher the key size must be equal to plaintext otherwise it will be repeated and if the key is known then encryption becomes useless.This paper aims to improve the said limitations by designing of Triple key security algorithm (TKS)in which the key is modified on polyalphabetic substitution cipher to maintain the size of the key and plaintext.Each plaintext character is substituted by an alternative message.The mode of substitution is transformed cyclically which depends on the current position of the modified communication.Three keys are used in the encryption and decryption process on 8 or 16 rounds with the Exclusively-OR (XOR)of the 1st key.This study also identifies a single-key attack on multiple rounds block cipher in mobile communications and applied the proposed technique to prevent the attack.By utilization of the TKS algorithm,the decryption is illustrated,and security is analyzed in detail with mathematical examples.

    Keywords:Encryption;decryption;cipher;symmetric key cryptography;single key attack

    1 Introduction

    Information plays a very vital role for any organization since it is its asset, and hence must be protected from illegal access.If the Confidentiality integrity availability (CIA)model of any information is lost (compromised), then that information may be used for purposes harmful to the respective organization.It becomes,therefore,very much necessary for any organization to make its data and information resources out of the reach of the illegal users by applying cipher cryptography.In the context of CIA model,the confidentiality is a set of procedures that bounds access,the integrity means to ensure trustworthy and accurate,and availability is assurance of reliability[1].Securing the information and to maintain the intellectual property and copyright,the best example is watermarking via wavelet transform for data protection[2].

    Mostly the ciphers are based on simple functions such as round or iterated block cipher with repeated round function.Encryption is widely used as an effective method to protect data and information in many real-life applications.The cryptographic algorithms are used for encryption using asymmetric and asymmetric keys,some ciphers use the same key for encryption and decryption.The keys may be equal with a simple transformation to go between the two keys.A shared secret for encryption and decryption is used to maintain the information,however,this is the main drawback of symmetric key encryption with respect to the public key.In asymmetric cryptography,a public/private key pair is generated randomly to allow access to the public key.For huge data encryption symmetric algorithm is much faster than asymmetric,but it has some drawbacks that the size of the key should be equal to the size of plaintext otherwise it is repeated continuously and causes repeated histogram.The classes of symmetric block cipher are based on the mode of operation and iterations.The symmetric key block cipher is based on two calculations such as encryption and decryption which takes n bits of plain text by providing a similar number of bits including k bits for the mystery key[3].

    Mode of operation determines the methods of using a block cipher to larger plaintexts, this mode is classified into deterministic and probabilistic [4].Such block cipher methods are planned for mystery and cryptographic primitive which is recognized in figuring texts,these methods are called Electronic codebook(E-C-B).Iterated product ciphers are categorized in unbalanced Feistel cipher,Feistel cipher, and substitution permutation-networks.In unbalanced Feistel “l(fā)eft half”and “right half”are not of equal size therefore these networks are called generalized unbalanced Feistel which consist of a series of rounds[5].

    Whereas the Feistel cipher is utilized by adding circular capacity on the normal content to gives encrypted content in which the block cipher calculations use the Data-encryption standard(DES).It comprises 64-bits as input and 64-bits as encryption along with 56-bits key length.Another iterative base cipher is a substitution permutation network in which substitution change is part of a block cipher.The substitution stage is organized by including the round box or S-boxes.The most broadly utilized symmetric cipher is Advanced encryption standard (AES)with 128-block size and incorporates 3 key lengths more likely than not upheld 128, 192, and 256 blocks.If the key size is greater than block size with a uniform distribution,there is more than one key and if a block cipher is designed randomly,then the key space should be into the same classes.So there is a requirement to recover the key of the block cipher[6].AES lies in its key length options and the time required to crack an encryption algorithm is directly related to the length of the key used to secure the communication for 128-bit,192-bit,or 256-bit keys.Therefore,AES is exponentially stronger than the 56-bit key of DES.Also,AES uses 10 rounds for 128-bit keys,12 rounds for 192-bit keys,and 14 rounds for 256-bit keys and each of these rounds uses a different 128-bit round key,which is calculated from the original AES key.

    Another utilization of block cipher is in mobile communication particularly for 3GPP evolved radio access and Global system for mobile communication (GSM)networks [7], the 8 round block ciphers are used.This block cipher is called KASUMI and has 64-bit and 128-bit keys with nonlinear S-boxes.Two functions,FO and FL are composed for each round performing logical operations with subkeys.However,there is a single key attack against reduced-round[8]with respect to complexity.In the case of asymmetric key encryption,the public key is available to anyone to encrypt the plaintext on the network and only authentic user can decrypt by using the secret private key.In asymmetric key encryption algorithm,computationally different steps are involved for example in scenario of sender A and receiver B.The following steps are used with different terms and conditions such sender A and receiver B must know the public key while private keys are secret: A can encrypt the plain text by using B’s public key: a can transmit cipher text to B: by using private key B can receive cipher text,Finally,the plain text message is received by B.The problem of asymmetric encryption works slower as compared to symmetric encryption[9].

    Most asymmetric algorithms depend on the properties of hard problems in mathematics.These problems are usually work-intensive in one direction and nearly impossible in the other direction.For example, factoring the product of two large prime numbers.If one of the prime numbers is known,then factoring becomes easy[10].But by knowing only the product it is very difficult to factorize and find the prime numbers.So in the case of the asymmetric algorithm,speed and more computationally costly is a major drawback of using public-key cryptography.

    The algorithm TKS is proposed to overcome the said limitations and drawbacks of both symmetric and asymmetric.This study focus on said limitations and to answer the research questions such as,how to manage the key size which must be equal to plaintext in polyalphabetic substitution cipher.The second concern is,how to deal with attack due to the inverse of the underlying mathematical function.The proposed algorithm adds to the subject area compared with other published material that the key is modified on polyalphabetic substitution cipher to maintain the size of key and plaintext.

    The rest of paper is structured is sections,the literature review is explained in Section 2,Section 3 presents the comparative study and problem identification,the proposed TKS Algorithm is explained in Section 4,the implementation of proposed algorithm is demonstrated in Section 5,implementation of TKS against attacks on multiple rounds block cipher is explained in Section 6, the results and analytics is validated by mathematical example in Section 7 and the Section 8 presents the conclusions.

    2 Literature Review

    Previously various security techniques and encryption algorithms have been carried out for information security.To understand this study, the following security algorithms are discussed for a comparison between the suggested implementation of the triple key security algorithm.

    2.1 Enhanced Symmetric Key Cryptography

    The study was proposed with a focus on symmetric key encryption-decryption results according to memory consumption and the algorithm is defined for low memory and processing capable devices[11].

    The Algorithm equally divides data into blocks for encryption using a key function which is basically a mathematical set with variable key lengths from 65-bytes to 72-bytes.For the decryption,the same key is utilized purely randomly based as shown in Fig.1 of the conventional model.

    A matrix operation is used for permutation column and row mix with an adaptation of AES to protect the data.Matrix form with multiple steps for encryption algorithm in which 16-byte key value has been selected in ten steps.For decryption,the reverse process of the encryption algorithm is used.The throughput of this algorithm is based on the calculation of encryption time, execution time,simulation time,and decryption time with the calculation of memory requirement.The Memory required for implementation is 5.7 KB and Central processing unit (CPU)execution time is 0.23 s for 100 KB.Also,the encryption-decryption time is 0.2 s.According to the results of encryption and decryption time,the proposed algorithm is comparatively better among DES,Triple-DES,Blowfish,and AES, however, there are some limitations of this algorithm such as complex mathematical manipulations,resource constriction,and testing constriction.

    Figure 1:Conventional model

    2.2 Data Security with Symmetric Key Cryptography

    The symmetric key encryption with some enhanced techniques[12]uses key generation by random number in the algorithm as the concept of internal key generation for the size of 512-bits at the receiver end.In this technique,the sender may store the internal key and send it via another path.Basically,it is a substitution method that is using the block-based technique for encryption of multiple times messages.The proposed key blocks contain ASCII code from 0 to 255 in a random order for all possible words and characters.By using 256*2=512-bit key size for encryption of a text message at receiving end for decryption of any file,the receiver has to know the key blocks and apply 2512 trial runs.The author proposed the key blocks of all possible worlds comprising of number (n)of characters with ASCII code 0 to 255 and the pattern of the key can be generated by the user.For this purpose,the 256*2=512-bit key size is used for encryption.At the receiving end the key block must be available for decryption.

    The Algorithm is shown in Tab.1.The decryption time is the same as the encryption time shown in Tab.2.This algorithm is based on the block cipher method which takes less time for 2 Mb file size however Key transportation has a major problem, due to this, the communication channels may be taped.

    Table 1: Encryption time comparison

    Table 2: The approval status for key agreement of DH and MQV

    So this algorithm has the following 13 lengthy steps such as:to define variable length,to calculate the random number,calculate the variable total,conversion into a binary string,calculation of random value,selection of another variable value,calculation of encryption number,calculation of encryption value, selection of another variable to represent as an encryption number, availability of random number and encryption number, to store a binary string into a table for next iteration, and exit.According to result evaluation model as shown in Fig.2,the comparison between the encryption time of proposed Algorithm,with Algorithm 1 is performed.

    However,there are some observations symmetric and asymmetric keys have their respective advantages and disadvantages [12] as deficiency of procedures on how to take the function and apposite iterative process so that the convergence is always certain.The second limitation is vulnerability to attack because due to the same key is encoded with the same real number[13].

    2.3 Cryptographic Algorithms and Key Lengths

    Asymmetric encryption algorithm includes RSA Diffie-hellman(DH)algorithm in which the key exchange is major factor and both sender and receiver need to exchange symmetric secrets key on difficulty of computing discrete logarithms.The key agreement is a technique are used to establish keying material and two related key agreement schemes are DH and RSA.Both schemes have been defined with different mathematical structures, for DH the finite fields and elliptic curves, and for RSA modulus are used[14].

    Key agreement using DH and Menezes qu vanstone (MQV)depends on the key-agreement algorithm, based on finite field or elliptic curve which are generated with three domain parameters p,q,and g.while for the elliptic curve,the keys are generated according to domain parameters based on the length of the key.The approval status for the key agreement of DH and MQV is shown in Tab.2 with schemes,domain parameter,and their status.

    Figure 2:Result evaluation model

    The approval status for DH and MQV schemes with respect to elliptic curves.The use of RSA for key agreement and transportation of key, additional key-transport scheme is allowed and for agreement, both parties have to contribute the information for the generation of the key.In key transportation technique, only one party controls the key while sending it.RSA keys are modulus n and the length of n is actually the security strength.Asymmetric ciphers are often 2-3 orders of magnitude slower than symmetric ciphers.Public key schemes are neither more secure than private keys (security depends on the key size for both), nor do they replace private key schemes (they are too slow to do so), rather these complement private key ciphers.One of the best known & widely used public-key asymmetric encryption algorithms is RSA,which uses large integers(e.g.,1024-bits)and its security is due to the cost of factoring in large numbers.Cryptographic techniques are also divided into two broad categories depending upon how plaintext is encrypted.Stream ciphers process messages a bit or byte at a time when encrypting or decrypting.Stream cipher processes input elements continuously,producing output one element at a time.The network-based security model uses the DH algorithm for shared secret keys with AES-256 for a key generation[9].

    The process begins with a private key then a public key is generated which is a derivative of the private key.Sender A and receiver B then exchange their public keys and now both have their own private key and other systems’public key.Initially shared secret key can be used in the AES as the round key which encrypts,transmits and the distant end decrypts.This method is limited by its inverse cipher which takes more codes and it does not authenticate the asymmetric exchange[15,16].

    3 Comparative Study and Problem Identification

    There are some popular parameters used to compare encryption-decryption algorithms.Key management is an important feature of algorithm because the encryption process is completed using this key data.The size of the key and generating process of the key act their role in process of encryption.Symmetric encryption algorithm uses the same key for encryption and decryption but in the asymmetric algorithm different keys are used for encryption and decryption.Throughput is parameter that indicates the power consumption of the algorithm.If throughput increases,the power consumption decreases.Blowfish of symmetric encryption technique is having very high throughput as compared to others.Tenability is used to define encrypted parts [8].There is no tenability in symmetric encryption algorithm except the blowfish but the asymmetric encryption algorithm used the tenability.The encryption ratio is specifying the measurement of the amount of data to be encrypted.To reduce the complexity of computation the encryption ratio should be minimized.It is high in both the symmetric encryption algorithm and asymmetric encryption algorithm but can be moderate in the 3DES technique of symmetric encryption algorithm.

    The cryptography techniques used these days are very many and growing day by day as are the cryptanalysis attacks.Many people have developed cryptographic systems to get the data and information protected from unauthorized persons.Several algorithms offer different levels of strength for various applications.Most of the ciphers are either very complex or less efficient.The computations,permutations, and other operations require considerable effort and time.It is therefore the need to combine their strengths to make our real-life systems more secure,more reliable,and more efficient.TKS algorithm is designed and implemented to secure communication on the networks.Proposed algorithm is expected to play its role in the much-needed secure systems in our daily life.In this research, the algorithm is designed for both network security and data security which is based on symmetric key cryptography.TKS algorithm is a block cipher and uses the same key for encryption and decryption.The size of the data block in the designed algorithm is 128 bits.Three keys are used in encryption and three for the decryption process.The size of the first key is 128-bits,the size of the second key is 64-bits and the size of the third key is also 64-bits[3,7,11,13,16].

    4 Proposed TKS Algorithm

    It is important for an organization and company to protect its user’s information from unauthorized access.A company and an organization can secure their E-communications by using different cryptographic techniques and different security algorithms.To make communication secure different algorithm are designed.There are two types of security algorithms (1)symmetric algorithms (2)asymmetric algorithms.In symmetric algorithm,user uses the same key for encryption and decryption,DES and AES are the two important symmetric key cryptographic algorithms.

    In asymmetric key cryptography user, a uses the public key of user B to encrypt the message and user B uses its private key to decrypt the message.Asymmetric key Algorithms use the public and private key for encryption and decryption.RSA, Al-Gamal are the important asymmetric key algorithms.The designing of proposed algorithm is based on the symmetric key cryptography.This algorithm has a block cipher and uses the same key for encryption and decryption.The size of the data block in the designed algorithm is 128-bits.Three keys are used in the encryption and decryption process.The size of the first key is 128-bits and the size of the second and third key(sub-key)is 64-bits with 8 or 16 iterations or 8 or 16 rounds.Each round consists of 128-bits of data,three keys,and two functions.

    First round takes the 128-bits of data and divides the data into two chunks or into two units of 64-bits.These two data units are the input to function-1 and function-2.Function-1 and Function-2 perform the different operations on data and a key is added to the data.Both the function produced the output and this output is swapped and in the end key-1 is added to data which will generate the cipher text.Similarly,8 rounds are executed and in the end,algorithm generates the cipher text.

    There are three keys are used in this algorithm subkey-1 and subkey-2.Key-1 is generated from the shared secret and subkey-1 and subkey-2 is generated from the first and second chunks of 64-bits of key-1,subKey-1,and subkey-2 are used for function one and function two respectively.Round ends with the XOR of the key-1 with data from both functions.

    The working process of the key generation can be explained with following steps:

    i)Input:It is the 128-bits of secret code.The key generation function will perform the following operation to produce the 8 different round keys.

    ii)CON:It means constant.The key generation function will generate the CON by XORing all the bytes of the key.CON will be a byte in size.After finding the value of the CON,each byte of the key XORed with the CON.The whole process is shown in the above diagram.At the end of this function,the whole vector or sub-arrays of bytes is divided into 4 equal chunks of data.The length of each chunk will 32-bits.

    iii)CMP&AND:After dividing the key into four parts.Take complement of first array A1 and select the last byte of the first array A1 and perform AND operation and save the result in new array A21.A11 XORed with all other arrays A12, A13, A14 and generate new arrays A22,A23,A24.

    iv)Circular Shift:After combining the Arrays A21,A22,A23 and A24 we will get a vector and perform circular shifting on the vector.Again divide the array into four parts and take the complement of the first subarray and perform XOR with all other the array.Combine the sub array into vectors and perform circular shifting two times.

    v)Matrix Operations:The resultant vector is then converted into a matrix of 4*4 and performs a circular shift on the matrix.There are two types of shifting one is bottom-up and the second is the right-left(row-wise shift and column-wise shift).

    vi)Matrix-Vector:Convert the matrix into four sub-arrays and convert these arrays into a vector of 128-bits.The positions of the subarrays are random.For example, we have sub-arrays 1,2,3,4,and the arrangement of the array in vector form will be 4,2,3,1.

    4.1 Subkey-1

    For sub key-1,divide the matrix-vector into two parts and first part for the key-1 and second part for the key two.For sub key-1 from part one,determine the constant value CON and perform XOR with all other bytes in the first part of the vector.Further by performing the following operations,we will get the sub key-1 such as reverse the 64-bits vector and perform two-time circular shifts.

    4.2 Subkey-2

    For sub key-2,divide the matrix vector into two parts and first part for the key-1 and the second part for the key two.For sub key-1 from part two,determine the constant value CON and perform XOR with all other bytes in the second part of the vector.Further by performing the following operations,we will get the sub key-2 such as performing two time circular shifts.

    4.3 Round Key

    The round key can be obtained by following operations such as combining results of sub key-1 and sub key-2 into a vector as (subkey-1, subkey-2), performing two-time circular shift on matrix vector perform XOR between sub key vector and matrix vector, perform two-time circular shift to get the final key for the round.Round key is value resultant from the Cipher Key for each round,for implementation of state in the cipher.If the round key were not added in any round,then the block cipher output would not depend on the key at all and it would be an unkeyed permutation.

    5 Implementation of Proposed Algorithm

    The TKS can be implemented by following steps.

    5.1 Substitution

    Replacement of plaintext with cipher text is known as substitution,the units of the plaintext are rearranged in complex order.Substitution-box(S-box)are used to hide the relationship between the key and cipher text and S-boxes generation is based on co-set graphs and symmetric groups[17].

    The dynamical compound chaotic sequence generator is used for obtaining random chaotic S-box based on the image scrambling method to exploit the randomness of the chaotic system [18,19].To implement the TKS algorithm the matrix relation S-box for encryption and inverse S-box decryption is used.

    5.2 S-Box Generation

    Following method is used to generate the S-box,

    Here k is the key matrix is shown in Eq.(1).The determinant of the key matrix should not be zero.Following steps are used in the construction of the S-box such as taking the input byte 000000000,to divide the input into two parts 0000 and 0000,to find the inverse of 00 and second part remain same(1111 0000),to convert the above output 1111 into digits which is equal to 15 and 0000 will be 0.

    5.3 Inverse Substitution

    Inverse substitution is reverse in encryption and decryption process;we will use inverse substitution.

    5.4 Inverse S-Box Generation

    Following method is used to generate the inverse S-box,

    Here KI is the inverse key matrix is shown in Eq.(2).Following steps are used in the construction of inverse S-box such as to take the input from the S-box which is fd and in decimal form{15:13},to take the product of a key matrix and message matrix,the result of the matrix product is{15:0},to take the inverse of the output 15 in binary 0000 and 0000 remain same and the inverse of the fd is 00.

    5.5 Function-1(One)

    Function one consists of A.C XOR A+C,Reverse,Circular Shift,Swapping,Message Constant,and Key Constant.A.C XOR A+C:In this case,input data which is A&C denotes the key value.First,find the A.C and then A+C.perform the XOR between A.C and A+C.C is the sub key for the function-1.Reverse:Let’s suppose the output of the A.C XOR A+C is 123456 and reverse is 654321.By applying the key derivation function a secret and random derivation function key(DF key)can be generated with three inputs and producing three output keys such as chain key,constant key,and message key[20]as shown in Fig.3.

    Figure 3:Chain key derivation function for constant and message

    Constant (key): The function-1 will generate key constant by XORing all the bytes of the key.After finding the value of the CON,each byte of the Message is XORed with the CON.The function-1 will generate Message constant by XORing all the bytes of the message.After finding the value of the CON,each byte of the message is XORed with the CON.Swapping will be done by dividing the data into two parts e.g.,12345 and 67891.After swapping we have the data 6789112345.The substitution box to substitute the values in data vector is used.

    5.6 Function-2(Two)

    It consists of multiple processes such as substitution,message constant,reverse message constant,and key constant.For substitution,we will replace the values in the input data to the values from the s-box.CON means constant.The function-2 will generate key constant by XORing all the bytes of the subkey-2.CON will be a byte in size,and after finding the value of the CON,each byte of the Message is XORed with the CON.

    Message constant: CON means constant.The function-2 will generate Message constant by XORing all the bytes of the message.CON will be 2 bytes in size.After finding the value of the CON,each 2-bytechunk of the Message is XORed with the CON.Reverse message constant:The function-2 will generate message constant by XORing all the bytes of the message.CON will be a 2 bytes in size.After finding the value of the CON,we will find the reverse of the CON and then each 2-byte chunk of the message is XORed with the CON.

    Round Cipher(Final):The round cipher is shown in Fig.4a,each cipher and a number of blocks to create a function multiple times with these steps such as combining the output from the function 1&2,performing XOR operation with the round key,3-time circular shift to output after XOR operation and round cipher.Inverse Round Cipher:In the inverse round the cipher is shown in Fig.4b,input will be the cipher text from the encryption algorithm or from the previous round.The inverse function-1 will generate key constant by XORing all the bytes of the subkey-1(according to the round sub key).CON will be a byte in size.After finding the value of the CON,each byte of the Message is XORed with the CON.The whole process is shown in the above Fig.4, for the inverse function-1.Then the function-1 will generate a message constant by XORing all the bytes of the message.CON will be a byte in size.After finding the value of the CON,each byte of the message is XORed with the CON.The first step of function-1 is operation-1.In operation we will take the 64-bits of data and 64-bits of key.Encrypted message can be obtained by the following relation.

    Figure 4:(a)Encryption final round(b)Decryption inverse round

    Here A is message,C is the key and Y is the encrypted message in Eq.(3).In decryption algorithm we will use the following relation to recover the message A.

    Here A is the message with 64-bits of length and C is also 64-bits in Eq.(4).The reverse function can be explained by example,let suppose the output of the A.C XOR A+C is 123456 and reverse is 654321 by using right and left circular shifts.For inverse function-2 key constant,message constant and reverse message constant via inverse substitution is used.The algorithm will replace the data values in the input data to the values from inverse S-box in order to recover the original text from the cipher text.With reference to key constant the function-1 will generate key constant by XORing all the bytes of the subkey-2(according to round sub key).CON will be a byte in size.After finding the value of the CON,each byte of the message is XORed with the CON.The whole process is shown in Fig.4,for the inverse function-2.

    With reference to message constant the inverse function-2 will generate message constant by XORing all the bytes of the message.CON will be a 2 bytes in size.After finding the value of the CON,each 2-byte chunk of the message is XORed with the CON.For reverse message constant the inverse function-2 will generate message constant by XORing all the bytes of the message.CON will be a 2 bytes in size.After finding the value of the CON,we will find the reverse of the CON and then each 2-byte chunk of the message is XORed with the CON.For example,let suppose output of the A.C XOR A+C is 123456 and reverse is 654321 by implementing circular shifts.

    6 Implementation of TKS Against Attacks on Multiple Rounds Block Cipher

    There are different security attacks for the block cipher like rectangle-attack, sandwich-attack and single-key attack.The rectangle attacks for related-key setting are powerful also for key-recovery attack.The sandwich attack is composed of a single S-box layer this attack uses a distinguisher with three layers to have high probability characteristics[17].To implement TKS for 16-rounds,function is divided into 4 rounds of operation with 16-bit for input and output.The function is processed through even and odd numbers of rounds respectively with 9 bit for input on left and 7-bit for right.The keys of F function are utilized for each round with sub key K of 16-bit.For 32-bit key,two keys Ki1 and Ki2 are further driven by 32-bit key K1 and K2.Mathematically defined in Eq.(5).

    Likewise,with respect to above equations the three keys can be formed as shown in Eq.(6).

    In above equationnindicates the total number of rounds,in our case 16 rounds to be treated for this each round has a single key likeK1 toK16.Let start with 0th round if[n+(integer)]>15 then the most significant bit can be covered and for nth round to produce key with reference toK1 toK3.As the TKS is based on the S-box as security module of SNOW-3G algorithm as a reference Rijndael’s S1-box for FSM[20,21].

    To state two-way interaction formula or other statement the FO function is used within the S-box for remaining rounds as shown in Fig.5.The 3rd round containing 16-bit is based on s-9 and s7 of S-box for the function of FO(a)which can be splinted in to 9-bit and 7-bit data for next rounds to rotate and cyclic the operation for 16-bit input data.The output results are XOR after rotation and shifting with 16-bit input and output.

    7 Results and Analytics by Mathematical Examples

    The simulation results can be tested using MATLAB statistical NIST test while the mathematical examples are given to justify the results and analytics.

    Plaintext=asdqweqweasdqwea

    Key=asdqweqweasdqwea

    Below the hex form of the message and key.

    Message=61 73 64 71 77 65 71 77 65 61 73 64 71 77 65 61

    Key=61 73 64 71 77 65 71 77 65 61 73 64 71 77 65 61

    Round key and sub-keys are generated from the key generation algorithm.

    keyround1=17 00 8c 8c 8c 8b 14 98 15 89 15 8d 8d 12 9d 9a

    subkey11=ea f8 66 ec fc 63 fe ea

    subkey21=67 65 67 72 ed 75 65 66

    keyround2=01 11 ed ed ec 61 9c 73 9e fa 05 61 60 89 77 ec

    subkey12=62 66 17 77 60 14 76 76

    subkey22=12 89 9a 13 fa 15 9a 8a

    keyround3=88 9f ff ff 66 88 e8 9b ed 72 01 9b 02 76 05 fe

    subkey13=9b 06 8f 88 04 8d 05 04

    subkey23=9b 73 72 01 fe 8c 72 64

    keyround4=fb fc 73 73 9a e8 63 fa 73 16 98 fb 12 03 89 72

    subkey14=64 13 e9 fd 01 fa 00 99

    subkey24=60 88 88 8d fb fb 88 16

    keyround5=fe 65 03 03 f8 60 05 73 8f 8a ec 76 8d 8f ea 02

    subkey15=99 11 63 71 11 66 10 f9

    subkey25=17 e9 ed fd f8 67 ed 9f

    keyround6=ee 89 9f 9f 76 01 8a 13 63 eb f9 11 f8 67 e8 9e

    subkey16=67 17 01 99 16 02 17 ec

    subkey26=03 65 66 61 61 03 66 fa

    keyround7=e9 f9 70 70 03 9b ee 88 10 ff 75 14 67 9e e8 71

    subkey17=8b 03 89 60 06 10 07 ee

    subkey27=15 03 9e 8e 9e 11 9e 67

    keyround8=f9 76 99 99 02 65 f9 77 16 fc 8e 8a 11 72 73 98

    subkey18=63 98 73 8c 9a 8c 9b e8

    subkey28=03 07 fb 67 70 8d fb 07

    For the decryption of the cipher text obtained in the final round or in the round 8 we have to perform the following operation.For brevity only the decryption of round 8 will be performed.Divide the received data into two parts.First part is the input to the function-2 and second part is the input to the function-1.

    plaintext8 = 9e 8a 87 75 ae d2 79 58 2c 47wQbNPTDJp9hMYdvogK2hAUiHsGeiybwaWe36 bwtRQ3UTpYV7YuZ8FV5j9nauFCWwcjM6dTzpL5s2N79Rp5unwdMvc8ZKUperform3-time right shift then we will get z95.z95 =75 ae d2 79 58 2c 47 93 0c 36 da f3 31 9e 8a 87 in the next step perform XOR operation between round 8 key and z95.The result will be.

    Z95=8c d8 4b e0 5a 47wQbNPTDJp9hMYdvogK2hAUiHsGeiybwaWe36bwtRQ3UTpYV7YuZ8 FV5j9nauFCWwcjM6dTzpL5s2N79Rp5unwdMvc8ZKU equal parts of 64 bits.

    forf1=e4 1a ca 54 79 20 ec f9

    For 16 rounds each function can be explained at encryption and decryption end.With respect to key length, larger length key, higher will be the security.Key length is important to any encryption and decryption algorithm.In our designed algorithm length of the key is 128-bits as shown in Tab.3.We have used three keys in the designed algorithm in order to encrypt and decrypt the data where the length of the key-1 is 128-bits.

    The other two keys are sub keys i.e.,Key-2 and key-3,the length of each sub key is 64 bits.More length of the key,makes the brute force attack less feasible.Therefore,in the designed algorithm,the two sub keys are derived from the key-1 and the length of each sub key is 64 bits.

    Figure 5:TKS for 16-rounds

    Table 3: Comparison table

    These sub keys are used for encryption and decryption in the different functions.A final area of block cipher design, and one that has received less attention than S-box design, is the key schedule algorithm.With any Feistel block cipher,the key is used to generate one sub key for each round.In general, we would like to select sub keys to maximize the difficulty of deducing individual sub keys and the difficulty of working back to the main key.The data block length in the designed algorithm is 128-bits.

    The higher the data block length higher will the data security.The data block in the designed algorithm will be divided into two parts and each part of the 64-bit length.Input to function one is the first chunk and input to the second function is the chunk 2 and the length of each chunk is 64-bits.One noteworthy feature of this structure is that it is not a Feistel structure.Recall that in classic Feistel structure,half of the data block is used to modify another half of the data block,and then the halves are swapped.Two of the AES finalists,including Rijndael,do not use a Feistel structure but process the entire data block in parallel during each round using substitutions.

    AES can implement 10, 12, and 14 rounds according to the requirement of the situation and available hardware.DES is designed with 16 rounds and the proposed algorithm TKS can implement with 8 and 16 rounds.The key length of 128-bits is used in AES and a key length of 56 bits is used in DES,but the proposed algorithm TKS is implemented with three keys.The length of the key-1 is 128-bits.The other two keys are sub keys i.e.,Key-2 and key-3,the length of each sub key is 64-bits.

    Avalanche effect for plain text changed is explained as that a change in one bit of the input should produce a change in many bits of the output.Let us have a message to encrypt“abcdefghijklm000”.This message is our original message.If only one bit will have changed in the original cipher text,then there will be a 64-bit change occurs.Avalanche effect (key changed), let a message encrypt“abcdefghijklm000”.This message is original.

    So the number of bits changed in the original message and the corresponding change in the key.Here the key is“abcdefghijklm000”.By using S-box with rotational and cyclic processes to use S9 and S7 boxes, the TKS algorithm makes block cipher strong for discussed security attacks, particularly single key attacks.Keys with XOR and merge operations for each round.

    8 Conclusion

    The aim of this work is to improve cipher algorithms limitations by a proposed a new algorithm TKS in which the key is modified on polyalphabetic substitution cipher to maintain the size of key and plaintext.The designed algorithm has shown a good avalanche effect.The algorithm has a sufficient amount of nonlinearity.The designed algorithm has 8 or 16 steps for encryption and decryption which is comparatively less than the symmetric key cryptography and asymmetric key cryptography networkbased security model in terms of performance.Each step is consisting of two functions,function-1 and 2.Function-1 and function-2 consist of different operations which are to be performed on the data,for encryption purposes.The performance of this algorithm is more efficient and fast as compared with the symmetric key cryptography and asymmetric key cryptography network-based security model.In the feature, research work can be conducted on this algorithm for evaluation of performance on a different level of network and data security.

    Acknowledgement:The authors, acknowledge with thanks to DSR King Abdulaziz University,Jeddah,Saudi Arabia for technical and financial support.

    Funding Statement:This project was funded by the Deanship of Scientific Research (DSR), King Abdul-Aziz University,Jeddah,Saudi Arabia under Grant No.(D-63-611-1442).

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    满18在线观看网站| 国产乱人偷精品视频| 涩涩av久久男人的天堂| 啦啦啦 在线观看视频| 叶爱在线成人免费视频播放| 99热国产这里只有精品6| 亚洲欧洲精品一区二区精品久久久 | 51午夜福利影视在线观看| 亚洲国产精品999| 国产精品国产av在线观看| 欧美 亚洲 国产 日韩一| 在线观看www视频免费| 国产成人欧美在线观看 | 欧美另类一区| 午夜日韩欧美国产| 精品一区二区三区四区五区乱码 | 久久亚洲国产成人精品v| 99久久人妻综合| 亚洲国产成人一精品久久久| 国产亚洲av高清不卡| 久久久久精品久久久久真实原创| 大香蕉久久网| 国产亚洲精品第一综合不卡| www.自偷自拍.com| 精品少妇内射三级| 伦理电影免费视频| 国产精品欧美亚洲77777| 纵有疾风起免费观看全集完整版| 午夜影院在线不卡| 国产精品久久久久久精品古装| 久久97久久精品| 亚洲国产av新网站| 成人国产麻豆网| 一级片免费观看大全| 成人18禁高潮啪啪吃奶动态图| 香蕉国产在线看| 久久性视频一级片| 妹子高潮喷水视频| 最近手机中文字幕大全| 国产精品三级大全| 亚洲欧洲日产国产| 国产成人91sexporn| 久久人妻熟女aⅴ| 亚洲第一区二区三区不卡| 欧美日本中文国产一区发布| 亚洲精品久久成人aⅴ小说| 精品亚洲成国产av| 激情五月婷婷亚洲| 久久99精品国语久久久| 午夜精品国产一区二区电影| 精品人妻熟女毛片av久久网站| 赤兔流量卡办理| 欧美激情高清一区二区三区 | 女人高潮潮喷娇喘18禁视频| 国产免费现黄频在线看| 国产精品秋霞免费鲁丝片| 精品少妇内射三级| 国产亚洲精品第一综合不卡| 欧美精品人与动牲交sv欧美| 一区二区av电影网| 成人漫画全彩无遮挡| 狂野欧美激情性bbbbbb| 蜜桃在线观看..| 黄频高清免费视频| 国产精品 欧美亚洲| 欧美日韩av久久| 天天影视国产精品| a级毛片在线看网站| 一级片'在线观看视频| 日韩欧美精品免费久久| 老汉色∧v一级毛片| 亚洲,欧美,日韩| 久久性视频一级片| 亚洲精品国产一区二区精华液| 菩萨蛮人人尽说江南好唐韦庄| 国产极品粉嫩免费观看在线| 亚洲国产欧美日韩在线播放| 久久久精品国产亚洲av高清涩受| 久久久国产欧美日韩av| 一区二区三区精品91| 国产一级毛片在线| 2018国产大陆天天弄谢| av免费观看日本| 国产高清不卡午夜福利| 91精品三级在线观看| 曰老女人黄片| 亚洲人成电影观看| 看非洲黑人一级黄片| 99国产精品免费福利视频| 久久亚洲国产成人精品v| 亚洲国产日韩一区二区| av线在线观看网站| 亚洲图色成人| 无遮挡黄片免费观看| 亚洲国产欧美网| 一级毛片 在线播放| 成人18禁高潮啪啪吃奶动态图| 又大又爽又粗| 成人国产麻豆网| 精品一区在线观看国产| 国产精品女同一区二区软件| 成人黄色视频免费在线看| 无限看片的www在线观看| 国产97色在线日韩免费| 久久青草综合色| 老司机亚洲免费影院| 日韩制服丝袜自拍偷拍| a级片在线免费高清观看视频| 黄频高清免费视频| 狂野欧美激情性xxxx| 中文字幕精品免费在线观看视频| 波多野结衣av一区二区av| 老司机影院毛片| 国产精品秋霞免费鲁丝片| 好男人视频免费观看在线| 男人爽女人下面视频在线观看| 下体分泌物呈黄色| 久久久久久免费高清国产稀缺| 自线自在国产av| 亚洲中文av在线| 男女边摸边吃奶| 91国产中文字幕| 日韩中文字幕视频在线看片| 一本久久精品| 国产乱人偷精品视频| 国产精品一区二区在线观看99| 国产精品秋霞免费鲁丝片| av国产久精品久网站免费入址| 黑人巨大精品欧美一区二区蜜桃| 国产在线视频一区二区| 欧美亚洲 丝袜 人妻 在线| 伦理电影免费视频| 在线 av 中文字幕| 欧美av亚洲av综合av国产av | 亚洲色图 男人天堂 中文字幕| 美女扒开内裤让男人捅视频| 精品少妇内射三级| 久久久久久人妻| 大香蕉久久网| 日韩,欧美,国产一区二区三区| 久久99精品国语久久久| 成人三级做爰电影| 亚洲欧美中文字幕日韩二区| 美女中出高潮动态图| 人成视频在线观看免费观看| 狂野欧美激情性xxxx| 2021少妇久久久久久久久久久| 男人舔女人的私密视频| 19禁男女啪啪无遮挡网站| 如日韩欧美国产精品一区二区三区| 亚洲国产精品国产精品| xxxhd国产人妻xxx| 侵犯人妻中文字幕一二三四区| 精品一区二区三卡| 肉色欧美久久久久久久蜜桃| 国产极品粉嫩免费观看在线| 青青草视频在线视频观看| 久久久精品区二区三区| 久久久欧美国产精品| 国产女主播在线喷水免费视频网站| 自拍欧美九色日韩亚洲蝌蚪91| 人妻人人澡人人爽人人| 亚洲欧美色中文字幕在线| 男女免费视频国产| 免费久久久久久久精品成人欧美视频| 最近的中文字幕免费完整| 青春草视频在线免费观看| 日韩人妻精品一区2区三区| 啦啦啦在线观看免费高清www| 色婷婷久久久亚洲欧美| 午夜福利乱码中文字幕| 在线看a的网站| 国产精品免费大片| 一边摸一边做爽爽视频免费| 新久久久久国产一级毛片| 制服丝袜香蕉在线| 精品久久久久久电影网| 精品少妇内射三级| 久久精品国产a三级三级三级| 亚洲成人av在线免费| 中国三级夫妇交换| 亚洲成人手机| 九九爱精品视频在线观看| 亚洲图色成人| 亚洲成色77777| 青草久久国产| 在线观看国产h片| 亚洲三区欧美一区| 久久精品久久久久久久性| 午夜福利,免费看| 午夜日本视频在线| 大话2 男鬼变身卡| 国产黄频视频在线观看| 精品国产乱码久久久久久小说| av福利片在线| 日韩一卡2卡3卡4卡2021年| 亚洲精品国产色婷婷电影| 午夜免费鲁丝| 国产精品免费视频内射| 人人妻,人人澡人人爽秒播 | 在现免费观看毛片| 亚洲欧美清纯卡通| 无限看片的www在线观看| 不卡av一区二区三区| 国产成人a∨麻豆精品| 婷婷色综合www| 国产精品久久久久久精品古装| 少妇精品久久久久久久| a级片在线免费高清观看视频| 精品一区二区免费观看| 亚洲欧美一区二区三区国产| 19禁男女啪啪无遮挡网站| 成人三级做爰电影| 女的被弄到高潮叫床怎么办| 亚洲精品aⅴ在线观看| 两个人看的免费小视频| 午夜影院在线不卡| 精品久久久久久电影网| av不卡在线播放| 国产又色又爽无遮挡免| 欧美激情高清一区二区三区 | 欧美激情极品国产一区二区三区| 亚洲天堂av无毛| 一区在线观看完整版| 久久这里只有精品19| 国产精品人妻久久久影院| 免费在线观看黄色视频的| 国产亚洲欧美精品永久| 一级片'在线观看视频| 老司机亚洲免费影院| 欧美国产精品va在线观看不卡| 激情视频va一区二区三区| 欧美 亚洲 国产 日韩一| 亚洲国产精品成人久久小说| 国产精品嫩草影院av在线观看| 国产欧美日韩一区二区三区在线| 男人舔女人的私密视频| a级毛片黄视频| 亚洲精品在线美女| 黑人巨大精品欧美一区二区蜜桃| 精品一品国产午夜福利视频| 七月丁香在线播放| 欧美成人精品欧美一级黄| 欧美日韩亚洲综合一区二区三区_| 青青草视频在线视频观看| 欧美av亚洲av综合av国产av | 人人妻,人人澡人人爽秒播 | 成人手机av| 啦啦啦在线免费观看视频4| 欧美中文综合在线视频| 日韩成人av中文字幕在线观看| 伦理电影免费视频| 热re99久久国产66热| 777久久人妻少妇嫩草av网站| 国产又爽黄色视频| 免费观看人在逋| 久久精品亚洲av国产电影网| 中文精品一卡2卡3卡4更新| 精品第一国产精品| 男男h啪啪无遮挡| 侵犯人妻中文字幕一二三四区| 丝袜在线中文字幕| 美女中出高潮动态图| 精品国产一区二区三区久久久樱花| 久久毛片免费看一区二区三区| 波野结衣二区三区在线| av片东京热男人的天堂| 国产av国产精品国产| 啦啦啦啦在线视频资源| 熟妇人妻不卡中文字幕| 免费看不卡的av| 亚洲人成网站在线观看播放| 免费高清在线观看日韩| 久久这里只有精品19| av国产精品久久久久影院| 国产精品蜜桃在线观看| 亚洲成色77777| 极品人妻少妇av视频| 丰满少妇做爰视频| 国产 精品1| 精品一品国产午夜福利视频| 亚洲欧美一区二区三区黑人| 亚洲欧洲国产日韩| 男男h啪啪无遮挡| 亚洲国产看品久久| 亚洲精品aⅴ在线观看| www.精华液| 国产成人欧美| 亚洲精品一二三| 免费高清在线观看视频在线观看| 亚洲精品av麻豆狂野| 建设人人有责人人尽责人人享有的| 亚洲精品美女久久av网站| 99热国产这里只有精品6| 卡戴珊不雅视频在线播放| 亚洲三区欧美一区| 亚洲成av片中文字幕在线观看| 青草久久国产| 日本av手机在线免费观看| 亚洲精品第二区| 亚洲欧美色中文字幕在线| 午夜福利网站1000一区二区三区| 国产男女内射视频| 青春草国产在线视频| 久久鲁丝午夜福利片| 婷婷色麻豆天堂久久| 一级片'在线观看视频| 在现免费观看毛片| 久久狼人影院| 亚洲精品视频女| 成年女人毛片免费观看观看9 | 啦啦啦在线观看免费高清www| 午夜激情久久久久久久| 久久久久国产一级毛片高清牌| 少妇 在线观看| 亚洲第一青青草原| 久久天躁狠狠躁夜夜2o2o | 亚洲精品国产色婷婷电影| 国产黄色视频一区二区在线观看| 午夜福利一区二区在线看| 成人亚洲精品一区在线观看| 精品一区二区免费观看| 国产精品欧美亚洲77777| 高清欧美精品videossex| 日韩视频在线欧美| 成人毛片60女人毛片免费| 欧美日韩亚洲国产一区二区在线观看 | 亚洲情色 制服丝袜| 日韩一区二区视频免费看| 国产精品亚洲av一区麻豆 | 久久性视频一级片| 另类精品久久| av网站免费在线观看视频| 色播在线永久视频| 国产毛片在线视频| 久久人人爽av亚洲精品天堂| 国产精品二区激情视频| 亚洲欧洲日产国产| 精品一区二区三卡| 精品久久蜜臀av无| 久久狼人影院| 亚洲av福利一区| 亚洲少妇的诱惑av| 日韩制服骚丝袜av| 亚洲五月色婷婷综合| 一级,二级,三级黄色视频| 日韩免费高清中文字幕av| 国产成人精品福利久久| 久久久久久久精品精品| 十八禁网站网址无遮挡| 丰满迷人的少妇在线观看| 精品视频人人做人人爽| av又黄又爽大尺度在线免费看| 十八禁高潮呻吟视频| 69精品国产乱码久久久| 中文字幕亚洲精品专区| 国产精品国产三级专区第一集| 亚洲精品第二区| 久久久久久久久久久久大奶| 下体分泌物呈黄色| 一级片免费观看大全| 男人爽女人下面视频在线观看| 久久人妻熟女aⅴ| 亚洲国产最新在线播放| 精品国产一区二区三区久久久樱花| 美女福利国产在线| 性高湖久久久久久久久免费观看| 亚洲,一卡二卡三卡| 19禁男女啪啪无遮挡网站| 我的亚洲天堂| 亚洲国产日韩一区二区| 日日摸夜夜添夜夜爱| 捣出白浆h1v1| 亚洲精品久久午夜乱码| a级片在线免费高清观看视频| 在线观看国产h片| 久久毛片免费看一区二区三区| 欧美精品av麻豆av| 国产精品二区激情视频| 久久国产亚洲av麻豆专区| 欧美激情极品国产一区二区三区| 久久韩国三级中文字幕| 黑丝袜美女国产一区| 一区二区三区乱码不卡18| 成人亚洲精品一区在线观看| 亚洲欧美清纯卡通| 男女免费视频国产| 不卡av一区二区三区| 亚洲国产精品一区二区三区在线| 在现免费观看毛片| 日韩av在线免费看完整版不卡| 水蜜桃什么品种好| 丝袜人妻中文字幕| 性色av一级| 亚洲天堂av无毛| 纯流量卡能插随身wifi吗| 日本午夜av视频| 男人舔女人的私密视频| e午夜精品久久久久久久| 波多野结衣av一区二区av| 亚洲av福利一区| 精品一区二区三卡| 国产高清国产精品国产三级| 人人妻人人爽人人添夜夜欢视频| 我的亚洲天堂| 90打野战视频偷拍视频| 亚洲综合精品二区| 成人毛片60女人毛片免费| 黄色视频在线播放观看不卡| 亚洲精品日韩在线中文字幕| 国产精品国产三级国产专区5o| 91aial.com中文字幕在线观看| 建设人人有责人人尽责人人享有的| 如日韩欧美国产精品一区二区三区| 女的被弄到高潮叫床怎么办| 新久久久久国产一级毛片| 狂野欧美激情性xxxx| 久久精品熟女亚洲av麻豆精品| 日本猛色少妇xxxxx猛交久久| 午夜福利一区二区在线看| 亚洲av电影在线观看一区二区三区| 国产一卡二卡三卡精品 | 久久人人97超碰香蕉20202| 18在线观看网站| 建设人人有责人人尽责人人享有的| 亚洲精品久久久久久婷婷小说| 丰满饥渴人妻一区二区三| 日韩一本色道免费dvd| 精品少妇一区二区三区视频日本电影 | 欧美国产精品一级二级三级| 久久亚洲国产成人精品v| 最近中文字幕高清免费大全6| 岛国毛片在线播放| 美女福利国产在线| 久久精品国产亚洲av高清一级| 亚洲欧美清纯卡通| 一级,二级,三级黄色视频| 亚洲精品在线美女| 亚洲国产av影院在线观看| 免费少妇av软件| 激情五月婷婷亚洲| 在线天堂中文资源库| 一区二区三区四区激情视频| 老司机影院毛片| www日本在线高清视频| 国产精品av久久久久免费| 女性被躁到高潮视频| 精品福利永久在线观看| 狂野欧美激情性bbbbbb| 欧美日韩视频精品一区| 精品亚洲乱码少妇综合久久| 一本—道久久a久久精品蜜桃钙片| 亚洲国产毛片av蜜桃av| 国产人伦9x9x在线观看| 国产探花极品一区二区| 久久人人爽av亚洲精品天堂| 性高湖久久久久久久久免费观看| 久久精品亚洲熟妇少妇任你| 这个男人来自地球电影免费观看 | 精品久久久久久电影网| 国产免费又黄又爽又色| 久久鲁丝午夜福利片| 中文字幕色久视频| 亚洲精品一区蜜桃| 婷婷色综合大香蕉| 欧美精品高潮呻吟av久久| 亚洲av福利一区| kizo精华| 看免费av毛片| 黄色视频不卡| 久久久久久久精品精品| 女人久久www免费人成看片| 人妻人人澡人人爽人人| 国产成人精品福利久久| 啦啦啦中文免费视频观看日本| 伦理电影大哥的女人| 婷婷色综合www| 男女边摸边吃奶| 亚洲精品成人av观看孕妇| 国产欧美亚洲国产| 人妻人人澡人人爽人人| 日韩一本色道免费dvd| 婷婷成人精品国产| 国产一区二区在线观看av| 天天躁狠狠躁夜夜躁狠狠躁| 日韩大片免费观看网站| 赤兔流量卡办理| 亚洲精品av麻豆狂野| 成年美女黄网站色视频大全免费| av女优亚洲男人天堂| 免费人妻精品一区二区三区视频| 免费黄网站久久成人精品| 中国三级夫妇交换| 国产精品久久久人人做人人爽| 校园人妻丝袜中文字幕| 十八禁网站网址无遮挡| 2021少妇久久久久久久久久久| 亚洲精品视频女| 亚洲国产欧美日韩在线播放| 最近最新中文字幕免费大全7| 欧美黑人精品巨大| 国产99久久九九免费精品| 国产精品一区二区在线观看99| 久久久久精品性色| 中文欧美无线码| 国产野战对白在线观看| 午夜久久久在线观看| 亚洲国产精品999| 91精品伊人久久大香线蕉| 51午夜福利影视在线观看| 韩国av在线不卡| 日本一区二区免费在线视频| 搡老岳熟女国产| 久久久久精品国产欧美久久久 | 亚洲国产成人一精品久久久| 极品人妻少妇av视频| 亚洲精品久久成人aⅴ小说| 国产成人av激情在线播放| 色网站视频免费| 亚洲五月色婷婷综合| 日韩精品有码人妻一区| 国产亚洲精品第一综合不卡| 亚洲欧洲精品一区二区精品久久久 | 日韩电影二区| 搡老乐熟女国产| 伊人久久大香线蕉亚洲五| 只有这里有精品99| 99久久99久久久精品蜜桃| 夫妻性生交免费视频一级片| av国产精品久久久久影院| 赤兔流量卡办理| 中文字幕最新亚洲高清| 美女午夜性视频免费| 国产成人免费观看mmmm| 日韩制服丝袜自拍偷拍| 在线观看免费午夜福利视频| 18禁动态无遮挡网站| 亚洲av中文av极速乱| 国产精品一区二区精品视频观看| 制服丝袜香蕉在线| 老司机在亚洲福利影院| 久久国产精品大桥未久av| 咕卡用的链子| 大香蕉久久网| av在线播放精品| 免费高清在线观看日韩| 久久 成人 亚洲| 成人亚洲欧美一区二区av| 中文字幕高清在线视频| 国产成人精品在线电影| 国产99久久九九免费精品| 国产成人精品在线电影| 国产av国产精品国产| 久久久精品免费免费高清| 国产亚洲午夜精品一区二区久久| 考比视频在线观看| 精品一区二区三区av网在线观看 | 国产av精品麻豆| 国产片特级美女逼逼视频| 可以免费在线观看a视频的电影网站 | 一区在线观看完整版| 天天影视国产精品| 9色porny在线观看| 精品免费久久久久久久清纯 | 黄色一级大片看看| 欧美日韩av久久| 欧美人与性动交α欧美精品济南到| 免费少妇av软件| 黄色怎么调成土黄色| 国产探花极品一区二区| 欧美日韩av久久| 国产国语露脸激情在线看| 久热这里只有精品99| 精品国产国语对白av| 精品福利永久在线观看| 亚洲国产精品国产精品| 制服人妻中文乱码| 亚洲人成77777在线视频| 免费黄色在线免费观看| 国产成人精品久久久久久| 999精品在线视频| 国产男女内射视频| 亚洲人成77777在线视频| 国产亚洲一区二区精品| 色综合欧美亚洲国产小说| 日韩熟女老妇一区二区性免费视频| 美女国产高潮福利片在线看| 国产极品粉嫩免费观看在线| 人妻 亚洲 视频| av电影中文网址| 婷婷色麻豆天堂久久| 91成人精品电影| 丰满迷人的少妇在线观看| 国产福利在线免费观看视频| 狠狠精品人妻久久久久久综合| 欧美另类一区| 中文字幕人妻丝袜制服| 亚洲三区欧美一区| 七月丁香在线播放| 亚洲精品美女久久av网站| 午夜激情av网站| 一级毛片 在线播放| 在线天堂中文资源库| 午夜激情av网站| 国产97色在线日韩免费| 黄色视频不卡| 久热爱精品视频在线9| 一区在线观看完整版| 国产精品久久久人人做人人爽| 亚洲婷婷狠狠爱综合网| 亚洲精品,欧美精品| 久久狼人影院| 好男人视频免费观看在线| 亚洲熟女精品中文字幕| 精品一品国产午夜福利视频|