• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Wrapping Encryption Based on Double Randomness Mechanism

    2023-12-12 15:51:20YiLiHuangFangYieLeuRueyKaiSheuJungChunLiuandChiJanHuang
    Computers Materials&Continua 2023年10期

    Yi-Li Huang,Fang-Yie Leu,2,?,Ruey-Kai Sheu,Jung-Chun Liu and Chi-Jan Huang

    1Department of Computer Science,Tunghai University,Taichung,40764,Taiwan

    2Emergency Response Management Center,Ming Chung University,Taipei,11103,Taiwan

    3General Education Center,Ming Chuan University,Taipei,11103,Taiwan

    ABSTRACT Currently,data security mainly relies on password(PW)or system channel key(SKCH) to encrypt data before they are sent,no matter whether in broadband networks,the 5th generation(5G)mobile communications,satellite communications,and so on.In these environments,a fixed password or channel key (e.g., PW/SKCH) is often adopted to encrypt different data,resulting in security risks since this PW/SKCH may be solved after hackers collect a huge amount of encrypted data.Actually,the most popularly used security mechanism Advanced Encryption Standard(AES)has its own problems,e.g.,several rounds have been solved.On the other hand,if data protected by the same PW/SKCH at different time points can derive different data encryption parameters,the system’s security level will be then greatly enhanced.Therefore,in this study,a security scheme,named Wrapping Encryption Based on Double Randomness Mechanism(WEBDR),is proposed by integrating a password key(or a system channel key)and an Initialization Vector(IV)to generate an Initial Encryption Key(IEK).Also,an Accumulated Shifting Substitution(ASS)function and a three-dimensional encryption method are adopted to produce a set of keys.Two randomness encryption mechanisms are developed.The first generates system sub-keys and calculates the length of the first pseudo-random numbers by employing IEK for providing subsequent encryption/decryption.The second produces a random encryption key and a sequence of internal feedback codes and computes the length of the second pseudo-random numbers for encrypting delivered messages.A wrapped mechanism is further utilized to pack a ciphertext file so that a wrapped ciphertext file,rather than the ciphertext,will be produced and then transmitted to its destination.The findings are as follows.Our theoretic analyses and simulations demonstrate that the security of the WEBDR in cloud communication has achieved its practical security.Also,AES requires 176 times exclusive OR(XOR)operations for both encryption and decryption,while the WEBDR consumes only 3 operations.That is why the WEBDR is 6.7~7.09 times faster than the AES,thus more suitable for replacing the AES to protect data transmitted between a cloud system and its users.

    KEYWORDS Initial encryption key;accumulated shifting substitution;three-dimensional operation;wrapped ciphertext file

    1 Introduction

    In recent years,owing to the fast advance of the 5th generation (5G) networks and Internet techniques and the popularity of mobile phones,a wide range of mobile applications were proposed to provide us with a colorful living environment and enrich our daily lives.Also,with the fast development of cloud computing,people frequently send data to a cloud for storage or processing.But data transmitted via wireless channels may be stolen by hackers,conducting severe security problems.This means we need a more secure data transmission environment before the delivered data can be safely protected.

    In addition,in the age of big data,the sizes of files transferred between a cloud system and users are often huge,i.e.,encryption/decryption speeds should be two of the key issues if we want to deliver them via a 5G network.

    At present,Advanced Encryption Standard(AES)as a block cipher mechanism has been popularly employed to secure delivered data.The AES adopts the combinational logic encryption method[1],consequently attracting different kinds of brute-force attacks[2–4].According to references[5,6],the AES will soon be insecure since it has been partially solved.Thus,a safer block ciphering method is required shortly.In 2016,Huang et al.[7]introduced a random method to encrypt/decrypt messages/files.However,it is not truly random,sinceΔhis derived from password(PW)only whereΔhis the length of an additional character string utilized to hide the beginning point of the ciphertext.The weakness is thatΔhmay be solved by Brute-force attacks [7].After that,the samePWwill be employed to crack wrapped ciphertext files.

    Thus,in this study,a more secure scheme,named “Wrapping Encryption Based on Double Randomness Mechanism(WEBDR for short)is proposed.The WEBDR enhances the security level of block ciphering by wrapping ciphertext with two dynamic data sequences of variable lengths to form a wrapped file,aiming to hide the ciphertext to protect it from being accessed by hackers.The WEBDR uses four types of keys to encrypt data.The first one is called the initial encryption key(IEK),which is generated by integrating a password key(or a channel key)and an initialization vector(IV).The second is a set of sub-keys(SK1~SK5),which is produced by using an accumulated shifting substitution(ASS)function and a Three-dimensional encryption method(3D Encryption).Following that,the WEBDR retrieves current time from its internal clock to produce a key,named the current time key (SKCT),as the third type of key.The fourth is a random encryption key (REK) generated randomly.

    Owing to using these four types of keys,even encrypting the same plaintext with the same password,the WEBDR generates different corresponding ciphertext of different lengths and different wrapped ciphertext files.Therefore,it is not easy for hackers to access and then solve the ciphertext.Our previous research results can be seen in reference [7].The main contributions of this study are listed below:

    (1) We adopt the timing-random mechanism to randomly wrap ciphertext.This can effectively prevent hackers from solving the relationship between plaintext and ciphertext even when they have ever collected a huge number of(plaintext/ciphertext)pairs.

    (2)Using the encryption method of sequential-logic style,due to adopting a feedback mechanism,the generated subsequent ciphertext blocks will vary according to the contents of previous plaintext blocks.This greatly increases the difficulty of illegal decryption.

    (3) The WEBDR in its message encryption (decryption) stage only invokes three exclusive OR(XOR) operations,while the AES calls this operation a total of 176 times for each of its message encryption and decryption processes.

    The rest of this article is structured as follows.In Section 2,we briefly describe the related studies of this paper.Section 3 introduces the WEBDR.In Section 4,we analyze the security level of the WEBDR.Simulations and performance of the WEBDR are demonstrated and evaluated in Section 5.Section 6 summarizes this study and overviews our future research.

    2 Related Studies and Background

    In this section,the AES is first described.Security challenges in cloud systems and their data delivery are also discussed.

    2.1 The AES and Its Problems

    AES as a standard block cipher technique may have different block/key sizes,i.e.,128,192,or 256 bits[8].The corresponding numbers of rounds on the data encryption are 10,12,and 14,respectively,on a 4×4-byte matrix(also called state,denoted by M).The given plaintext block is the initial value.

    Giving its 10-round AES encryption as an example.A round has four operations,including SubBytes,ShiftRows,MixColumns,and AddRoundKey.But in the 0thround,i.e.,the initial round,only AddRoundKey is executed.The last round performs SubBytes,ShiftRows,and AddRoundKey,skipping the MixColumns.Each of the remaining 9 rounds(rounds 1–9)invokes the mentioned four operations.The SubBytes operation substitutes each byte of the state M with the help of the SBox;the ShiftRows rotates the last three rows,i.e.,rotating theithrow a total ofitimes,i=2,3,4;the MixColumns multiplies the columns of M with a polynomial function c(x);the AddRoundKey exclusive ORs(XORs)M with the round sub-key[8].

    In 2002,the government of the United States (U.S.) adopted the AES as the security standard since it is the most secure encryption method at that time.However,Diehl[9]analyzed a cache attack on the AES,and[10]presented that a biclique attack has been successfully applied to attack AES[8,11]introduced different types of AES attacks,meaning that the AES will be solved soon,or at least,it is not really secure.

    2.2 Data Security and Encryption

    Today,cloud and Internet of Things (IoTs) systems are two popular applications in the world.Their data securities are essential before these applications can be successfully applied to the world.Reference[12]defined cloud security as the policies,services,controls,and technologies that prevent cloud data,infrastructure,and applications from threats.7 challenges are also proposed.Among them,Granular Privilege and Key Management are concerned with privilege and cryptography keys.In reference[13],cloud security refers to a broad set of techniques and control methods used to protect data,applications,and cloud computing infrastructures.Because data archived in a cloud system can be accessed by using multiple client devices,when uploading data to the cloud,for security reasons,we need to consider who may access the data(e.g.,the staff of the cloud system),and what applications and what methods will be,respectively,requested and utilized to access the data.

    Bordak[14]mentioned that before cloud storage,plain-text data can be encrypted to differentiate the ability to save data from the ability to retrieve it.So,it would be better if the encryption key is securely protected to ensure that only authorized users can decrypt data.

    Musa et al.[15]enforced their symmetric key encryption to protect a file locally on the client side before uploading it to the cloud system and the file is decrypted after it is downloaded on the client side using the key produced during encryption.Keys are generated by different algorithms,thus offering better security levels and enhanced system performance for large files.

    Reis et al.[16]said that cryptography for cloud applications relies on both client-side and serverside cryptographies.The AES-256 in Cipher Block Chain(CBC)mode is employed to encrypt their healthcare data.Client-side cryptography encrypts data at the user’s device before sending data to the cloud storage,aiming to ensure user-data privacy and security.Server-side encrypts data before storage,i.e.,inside the cloud system,for the reason that encrypts data,saves data,and manages keys at the same location.Of course,before these activities,the ciphertext sent by users should be decrypted first.

    Banuelos [17] mentioned that users often utilize integers as keys by invoking a pseudo-random number generator or random-number generator.Sometimes,strings comprising numbers and letters are adopted.Also,a longer key is required,because longer keys consume a longer time to crack.The author also presented that SkyFlow,a data privacy vault company,uses a granular method to encryption keys that conveys a master key named a Key Encryption Key(KEK)and Data Encryption Keys(DEKs).Users may use Amazon Web Services Key Management Service(AWS KMS),Skyflow Key Management,or a bring-your-own-key(BYOK)technique to administrate KEK.But their data stored in the company’s vault is still encrypted by using DEKs.

    Reference[18]described that an IoT security solution is required for business.Without security,businesses can be vulnerable to hacks and data breaches,making private information exploited and the public which will threaten the reputation and well-being of these corporations/companies.

    Schacht et al.[19] evaluated 5 million Open Pretty-Good-Privacy (OpenPGP) keys with the algorithms utilized and internal parameters selected when establishing connections to third-party software.The authors analyzed the properties of keys and the trends of OpenPGP usage in the passing two decades,providing an internal look at OpenPGP and the adoption of public key cryptography.Looking at the details of the keys over time can make us recommend key features that affect real-world use.The analyses of OpenPGP keys give users a way to determine the time duration for changing the default settings of software packets.

    Roundy[20]presented that IoT security risks were rising and stated the challenges listed in Verizon Mobile Security Index 2021 for mirroring mobile to the IoT environment.The author proposed a 6-step procedure to better IoT security.The last step is encrypting user and application data,aiming to protect the data from malicious actors.Without cryptography,an organization may face sensitive data leakage,reputational damage,and penalties.

    Yang et al.[21] proposed an algorithm by exploiting encrypted packets and modeling network traffic to uncover stepping-stone statements/intrusions.The software tool used is OpenSSH which comprises n paths between Host 0 and Host 1.Each path has its cryptography key under the assumption that Host 0 acts as an intruder,and Host 1 plays the role of a victim.When a path is built,an encryption key is given.Authors claimed that the algorithm demonstrates better performance when detecting intruders’both-side chaff attacks.However,it is better if the keys can be created with a secure approach.

    Nowaczewski et al.[22] predicted that Customer Edge Switching (CES) would be used in 5G networks.They described the CES and explained how it works with Domain Name System(DNS).The possible attack models were also discussed.Currently,DNSs lack encryption/authentication.Hackers can exploit the system through man-in-the-middle attacks.They also extend CES’s implementation to fix this gap by adding DNSCrypt and DNSSEC functionalities.Their experimental results show that most attacks can be effectively detected by the proposed countermeasures.However,it would be better if the details of cryptography can be presented.

    2.3 Three Working Models of Data Encryption

    For those systems requesting high-security levels for their data transmission,three data transmission modes can be considered.Mode 1 is encrypting files transmitted between a user and a base station(BS) or a cloud with a channel key established to ensure their point-to-point security [23,24].With mode 2,data is saved in client devices before its delivery,i.e.,data is encrypted before transmission[25].Therefore,a password given by the user is processed to generate a password key with which to encrypt/decrypt data files.Mode 3 adopts Proxy-based encryption methods to secure archived data.For some existing software or applications with no encryption functions,data can be encrypted by proxy servers[26]before transmission.Our opinion is that the WEBDR can enhance the security and performance of modes 1 and 2,particularly for those medium and large-size files.

    2.4 Other Related Studies

    Chakravarthy et al.[27] proposed a system named digital signature algorithm (DSA) which works together with deep packet inspection (DPI),known as the DSA-DPI model,to detect and prevent Distributed Denial of Service (DDoS) attacks.DDoS is an attack that overloads Central Process Units(CPUs)of the firewall and other network components and/or consumes their network bandwidths.The proposed system also provides preventive warnings on infrastructure before the malware attack.However,this system does not discuss how to protect,e.g.,encrypt/decrypt,data itself.Digital signatures are one kind of anomaly-based detection scheme.Often a signature-based approach is required.DPI is often a function of firewalls.However,packet filtering often consumes a longer checking time.

    Chiu et al.[28]proposed a network autonomous security system,named Detection and Defense of Denial of Service(DoS)/DDoS on 5G(DDD5G)which analyzes 5G network traffics and determines whether a protected system is under DoS/DDoS attack or not by using Shannon entropy(SE)and/or a mixed model.The latter mixes Shannon entropy and Cumulative Sum Algorithm (CUSUM) to further enhance a system’s security level.Shannon entropy adopts entropy derived from normal traffic at specific time intervals as the threshold and compares it with the entropies of other time intervals,denoted by T,to detect whether there are intrusions and attacks in T or not,while the CUSUM collects traffic and checks to see whether it exceeds the predefined thresholds or not to determine if this system is under attack.Authors claimed that a mixed-mode approach can effectively detect DDoS.However,with the two-stage detection approach,the detection time may be long,i.e.,unable to detect attacks in a real-time manner.

    Tsai et al.[29] proposed a Two-stage High-efficiency Long Range Wide Area Network(LoRaWAN)encryption key Update Scheme(THUS for short)for changing LoRaWAN’s session keys and root keys in an efficient and secure approach.The THUS comprises two stages,i.e.,the Root Key Update(RKU)and the Session Key Update(SKU),and with different update periods,the security levels of RKU and SKU are higher than those of normal LoRaWAN specifications.A modified AES cryptography process is also adopted in the THUS to improve the THUS’s security level.According to the authors’security analyses,the THUS can effectively protect important parameters in its key update stages,and satisfies the requirements of integrity mutual authentication,and confidentiality.Moreover,The THUS can further resist replay and eavesdropping attacks.However,THUS procedures can only be applied to LoRaWAN since the mechanism is limited to LoRaWAN,i.e.,join-server,enddevice,and network server.Also,when a sender generates a new D-box,it needs to deliver it(of course,encrypting it)to his/her target site.Otherwise,the target site does not know how to solve the receiving message,thus increasing the processing costs.

    Khan et al.[30] stated that traditional authentication protocols are vulnerable in the quantum computing era.Therefore,they presented an authentication protocol according to the lattice technique for public cloud environments to prevent quantum attacks and avoid all known typical attacks.This protocol provably secures the protected systems with the Real-Or-Random(ROR)model.Their simulation results showed that this protocol is lightweight compared with some existing lattice-based authentication protocols.Their comparative analyses also demonstrated that this protocol is quite appropriate to be implemented in quantum-based environments.However,this scheme is developed for authentication,instead of encrypting/decrypting transmitted data.

    Khalaf et al.[31]presented that hackers may send malicious inputs to confuse a web application.The purpose is to access or disable the application’s back end.The authors claimed that Cross-site scripting (XSS) and Structured Query Language (SQL) Injection Attacks (SQLIAs) are frequently launched.They then developed an input validation mechanism to check and evaluate for program codes and also developed a script whitelisting interception layer that is a part of the browser’s JavaScript engine.The SQLIA can be detected and the XSS attack is resolved with the approach of input verification and script whitelisting by using pushdown automatons.However,this system only focuses on SQLIA,XSS,and buffer overflow.

    Yang et al.[32,33]described that Age-of-information(AoI)as an indicator reflects the freshness of data during the communication stage and Unmanned Aerial Vehicles(UAVs)play very important roles in Mobile Edge Computing Networks(MECN).They tried to solve the Channel Access Attack(CAA)problem of AoI-oriented channel access from game-theory viewpoints.A system model with active probability is first built to acquire a MECN-based AoI indicator under CAA attacks.Next,they proposed the AoI-based channel access optimization problem by using Ordinary Potential Game(OPG).At last,a learning algorithm named Distributed Channel Access Strategy Determination(DCASD) is presented to choose the channel access strategies.The experiments given different parameters to enhance the performance of the algorithm are conducted as compared with some stateof-the-art systems.But the proposed scheme is not applied to encrypt/decrypt data.Further,readers may like to know how attackers access the available channels to intrude on sensor nodes.How to implement the proposed approach with Carrier Sense Multiple Access(CSMA)families?How to work with IEEE 802.11 ax/be?It would be better if authors can deeply describe these.

    3 The WEBDR

    The WEBDR dynamically hides ciphertext in a wrapped cipher file,aiming to hide the right position of ciphertext.Thus,it is not easy for hackers to collect a huge amount of effective(plaintext,ciphertext)pairs with which to break the system.

    3.1 Parameters and Operators

    All parameters and operators adopted by the WEBDR are listed and defined below:

    A.Parameters

    Parameters used are as follows:

    1.IV:initialization vector,which is inputted to a cryptographic primitive by users to provide the initial state of the WEBDR.

    2.PW:the password,comprising 8 to 32 characters,is prepared as one of the inputs by users.

    3.SKPW:the system password key derived from PW.

    4.dsc:dynamically shifting count when shifting data.

    5.SKCH:the system channel key,created for a user and the cloud sever before their communication starts.

    6.SK0:the system zeroth encryption key defined as SK0=SKPWor SK0=SKCH.

    7.IEK:the initial encryption key.

    8.SK1~SK5:the system sub-keys produced in the system’s initial procedure.

    9.PRS1:pseudo-random sequence 1,as a random string placed at the beginning of a wrapped ciphertext file.

    10.PRS2: pseudo-random sequence 2, as a random string placed at the end of a wrapped ciphertext file.

    11.Δ1l:|PRS1|in bytes.Its usage will be described later.

    12.Δ2l:|PRS2|in bytes.Its usage will be described later.

    13.SKCT:the system time key,produced based on current CPU time,is 128 bits long comprising the following elements:nanosecond/date/hour/minute/second/nanosecond/hour/minute/second.

    14.SKRCT:the reverse key of SKCT,128 bits long,consists of the following elements:second/minute/hour/nanosecond/second/minute/hour/date/nanosecond.

    15.REK:Random Encryption Key,which is employed to generate ciphertexts and the length of PRS2.

    16.CREK:the Ciphertext key of REK.

    17.fb0~fbn:a sequence of internal feedback code.

    18.Plaintext blocks:P1P2...Pj...Pn,where Pjis plaintext block j and|Pj|=128 bits,1 ≤j ≤n.

    19.Ciphertext blocks:C1C2...Cj...Cn,where Cjis ciphertext block j and|Cj|=128 bits,1 ≤j ≤n.

    B.Operators

    The operators employed and their functions are defined as follows:

    1.XOR,denoted by ⊕.

    Encrypting plaintext p to ciphertext c with key k,i.e.,c=p ⊕k.

    Decrypting c to p with k,i.e.,p=c ⊕k.

    2.Binary adder[7]:+2

    Encrypting plaintext p to ciphertext c with key k, i.e., c = p+2k, in which we drop the carry generated by the addition of the most significant bit

    Decrypting c to p with k,i.e.,

    3.Rotate-Equivalence operator:R

    Encrypting plaintext pito ciphertext ciwith key k,i.e.,

    ci=piRk=piRk,where piRis the key acquired by rotating plaintext piclockwise h bits where h=|k|/4,i.e.,if|k|=128,piwill rotate 32 bits.

    Decrypting cito piwith k,i.e.,pi= ciIRk=counterclockwise rotating(cik)a total of|k|/4 bits.

    4.Three-dimensional operation: the operation encrypting a message by using encryption keys and three fundamental operators[1],i.e.,⊕,+2andR.

    5.Modulus operator:mod.

    c=p mod n,where n is a positive integer.

    6.Left(PW,n): a function that retrieves n leftmost characters from PW, where n ≤|PW|in bytes.

    7.Right(PW,n):a function that accesses n rightmost characters from PW,where n ≤|PW|in bytes.

    8.Trunc(RN,t): a function that truncates the rightmost t bytes from the random number key RN.

    C.Accumulated shifting substitution

    In the AES,the SubBytes is a mapping/substitution operation following the content of a given lookup table,i.e.,a substitution box (S-Box).Basically,this mapping is a combinatorial-logic style encryption.The substringXin bytes appears at different locations in the plaintext will produce the same cipher substring S(X),consequently decreasing its security level since the mapping fromXto S(X)is fixed,rather than a one-to-many mapping.

    Next,the Accumulated Shifting Substitution algorithm(ASS),i.e.,Algorithm 1,defined below is a sequential-logic style encryption mechanism which encrypts a plaintext into an irreversible ciphertext.The same substringXs at different locations of the plaintext will be mapped to different cipher substrings.In other words,this is a one-to-many relationship,aiming to significantly enhance the security level of ciphertext.

    Algorithm 1:ASS Algorithm

    3.2 Password Key(SKPW)

    In the WEBDR,SKPWis the initial key.Its content significantly affects the security level of the WEBDR.To generateSKPW,we expandPWfollowing three rules:

    (1)The original content ofPWis preserved;

    (2)The code expanded is generated based on the original content ofPW;

    (3)When the same character repeatedly appears inPW,the expanded codes varies.The algorithm derivingSKPWfromPWis shown in Algorithm 2.

    Algorithm 2:Deriving SKPW from PW

    3.3 Encryption/Decryption

    In the WEBDR,before data encryption,there is an initial process used to generate system subkeysSK1~SK5andΔ1lby usingPWor a channel keySKCH,both of which have been enhanced by invoking Algorithm 2.The key length is 128 bits.

    A.Initial process

    The initial process of the WEBDR is shown below:

    Step 1:ProducingREKandCREK

    Step 2:Producing ciphertext andΔ2l

    Step 3:YieldingPRS1 andPRS2

    Step 4:ConcatenatingIV,PRS1,CREK,CiphertextandPRS2 sequentially to produce the wrapped ciphertext file,the layout of which is illustrated in Fig.1.

    Figure 1:The layout of a wrapped ciphertext file

    C.Message decryption

    The decryption process is shown below:

    4 Security Analyses

    We analyze security of the WEBDR’s working environment on operation mode 1 and mode 2 stated above,containing the securities of system sub-keysSK1~SK5,Δ1l,the dynamic random keyREK,the wrapped ciphertext file,and the ciphertext,and then demonstrate how they resist against eavesdropping attacks.

    4.1 Security on SK1~SK5

    In the WEBDR,the system sub-keysSK1~SK5are employed to encrypt/decrypt a given plaintext.Claimed 1 shows thatSK1~SK5have achieved practical security.

    Claimed 1:

    When the WEBDR worked on operation mode 1 or mode 2,the generated system sub-keysSK1~SK5have achieved practical security.

    Proof:In operation mode 1 or mode 2,SK0is defined asSK0=SKCH(orSK0=SKPW),whereSKCH(orSKPW) is inputted externally,meaning that it is not easy for hackers to guess the value ofSK0.In the two modes,SK0is used only once.Thus,the problems resulted from collecting massive data for solvingSK0can be prevented.SinceSK0andIVemployed in a session are themselves unique from those used in other sessions.Hence,to crackSK1~SK5,apart from blindly guessing their values,hackers can also utilize three approaches.The first is solving Eqs.(1) to(3).The second is breaking Eq.(4).The last is cracking Eqs.(6) to (9) and solving the wrapped ciphertext file construction(WCFC)by adopting brute-force attacks.

    About the first approach,in Eq.(3),in whichSK5is derived from four parameters,includingIV,SK1,SK2,andSK4and the three-dimensional operation mentioned above.SK4=(SK0+2SK3)⊕SK2in Eq.(2) is derived by utilizingSK0,SK2,andSK3,in whichSK3is produced by invoking the ASS Algorithm given D-Box andSK2.Further,SK1in the equation(see Eq.(1))is again acquired by calling the ASS Algorithm given D-Box andIEKwhereIEK=SK0⊕IV.Now we can conclude that without correct values ofSK0andIV,SK1~SK5cannot be solved.However,the value ofSK0is unknown to hackers.In other words,SK1~SK5are difficult to break.Also,at different time points,theIVvalues are different,meaning that hackers have insufficient data to break our system.

    For the third approach,hackers may break Eqs.(6) to (9) and the wrapped ciphertext file construction by employing brute-force attacks.In mode 1 or mode 2,without knowing plaintext,hackers cannot launch chosen-plaintext attacks and known-plaintext attacks.They can only collect and analyze wrapped ciphertext files.Even though hackers have collected a huge amount of wrapped ciphertext files encrypted bySK0,each ciphertext file has its ownIVwhich is a random number so that the generated keys,i.e.,SK1~SK5,are themselves different from thoseSK1s~SK5sproduced in other sessions,indicating that hackers cannot acquire the value ofΔ1l,hence unable to retrieveCREKfrom the file and acquire the random encryption key,i.e.,REK.Even though hackers have guessed the value ofCREK,based on Eq.(6),i.e.,,whenREKis unknown,it is hard to solveREKandSK1~SK5based on theCREK.Moreover,at different CPU time points,theREKvaries,i.e.,lacking enough data for hackers to break these parameters.

    Furthermore,the WEBDR generates a random keyREKfor each plaintextP.Each time when the plaintext encryption process is executed,differentSK1~SK5,SKCTandREKvalues will be derived and given to produce different wrapped ciphertext files;thus,breaking those parameters from these collected wrapped ciphertext files is difficult.Also,Δ1l,Δ2land the size of the plaintext file are unknown to hackers.Consequently,it is not easy for hackers to identify the place of the ciphertext in the wrapped ciphertext file to obtain the ciphertext,thus unable to break the WEBDR.

    Next,even hackers correctly guesses the exact location of the ciphertext and obtain(Pi,Ci),1 ≤i≤n,pairs,without the value offb0(i.e.,SK4),C0(i.e.,SK3),plaintext blockPi,the system sub-keySK5,the random keyREK,and the internal feedback codefbi-1,hackers are unable to obtainSK3,SK4,Pi,fbi-1,SK5,andREKfrom the ciphertext blockCibased on Eqs.(7) and (8),due to the sequentially generated internal feedback codefbi-1,1 ≤i≤n,i.e.,SK1~SK5are difficult to break.

    From the analyses above,we dare to say that in operation mode 1 or mode 2,the generated system sub-keysSK1~SK5have achieved practical security(Q.E.D).

    4.2 Security on Δ1l

    The key point for solving the wrapped ciphertext files is acquiringΔ1l.But it is crucial for hackers to solve the WCFC and then access the correspondingCREKand ciphertext.That is,Δ1lneeds a higher level of security.In operation mode 1 or 2,the probabilities of crackingΔ1lby using probable approaches are similar to that of a blind guess.So,we dare to declare thatΔ1lhas its practical security.We analyze this in Claimed 2.

    Claimed 2:

    In operation mode 1 or 2,Δ1lderived from the zeroth encryption keySK0and system sub-keysSK1~SK5has achieved its practical security.

    Proof:Besides a blind guess,there are only two approaches for hackers to solve the value ofΔ1l,i.e.,by solving Eq.(4)or breaking the wrapped ciphertext file format by using brute-force attacks.

    With the first approach,in operation mode 1,data transmitted between a user and a base station(or the cloud)is encrypted,i.e.,SK0=SKCH.In operation mode 2,the data file owned by the user is encrypted,i.e.,SK0=SKPW.As mentioned above,bothSKCHandSKPWare given by users,i.e.,the two parameters are external to our system.Therefore,it is not easy for hackers to correctly guess the one given.Namely,SK0is difficult to break.

    According to Claimed 1,SK1~SK5,sequentially derived fromSK0andIV,also have their own practical securities.Without knowing the values ofSK0~SK5,hackers cannot solve Eq.(4)to breakΔ1l.The reason is that to calculate the value ofΔ1l,SK0andSK1~SK5ought to be solved beforehand.But,the key length is 128 bits.The possible values ranging from 0 and 2128-1 is far wider than the probable values ofΔ1lwhich is between 3 and 1024.Without knowing the values ofSK0~SK5,the probability of solvingΔ1l,produced by usingSK1~SK5with a Three-dimensional operation and the modulus operation(mod1022+3),is equal to that of a blind guess[1].

    By using the second approach,hackers may try to analyze the wrapped ciphertext file format with brute-force attacks.But,in operation mode 1 or mode 2,they cannot solve the file by employing chosen-plaintext attacks or known-plaintext attacks because they are unable to solveΔ1landΔ2land thus do not comprehend the location of ciphertext in the file.Even though the collected wrapped ciphertext files are produced by giving the sameSK0,the values ofΔ1ls of all ciphertext files vary due to giving differentIVs.The conclusion is thatΔ1lis difficult to break.

    In addition,the ciphertext is placed betweenPRS1 andPRS2 andCREK(see Fig.1).PRS1 andPRS2 are all derived from random numbers or pseudo-random numbers.They cannot be solved from the wrapped ciphertext files collected.Also,the size of a wrapped ciphertext file is(16+Δ1l+16+16n+Δ2l)bytes,where the two 16 bytes are the sizes ofIVandCREK,16nbytes represent the length of the plaintext andΔ1l(Δ2l)is the size ofPRS1(PRS2).Hackers do not know the values ofΔ1land(Δ2l),the probability with which to obtainΔ1lby cracking the entire wrapped ciphertext file structure is the same to that of a blind guess.Here,we can conclude thatΔ1lhas achieved its practical security(Q.E.D).

    4.3 Security on Random Encryption Key REK

    Since the dynamic random keyREKis used to encrypt a plaintext file,it requires a relatively high level of security.In Eq.(5),i.e.,,REKis generated by utilizing the Three-dimensional operation,and three parameters,including the zeroth random encryption keyREK0and the two current time keysSKCTandSKRCT,showing thatREKis a highly dynamic random key.Theorem 1 will prove thatREK’s security level is high.

    Theorem 1:

    In operation mode 1 or 2,if the dynamic random encryption keyREKgenerated isnbits long,the probability with which to obtainREKfrom an intercepted wrapped ciphertext file is.

    Proof:To breakREK,in addition to a blind guess,hackers could also adopt the following three methods.The first is cracking Eq.(6).The second is solving Eqs.(7) and (8).The third is breaking Eq.(9)and analyzing the wrapped ciphertext file format.

    Firstly,in operation mode 1 or 2,from previous analyses,we know thatΔ1landSK1~SK5have their practical securities.Thus,whenΔ1lis unknown,hackers cannot find the position ofCREKin the wrapped ciphertext file.Thus,the probability with which to obtainREKis the same to that of a blind guess.Even though hackers may somehow accurately retrieveCREK,and try to obtainREKby solving Eq.(6),i.e.,,without knowing the values ofSK1~SK5,they are unable to obtainREKwith only one value ofCREK.Therefore,when the values ofSK1~SK5are unknown,the probability with which to obtainREKby solving the information concerningCREKis the same to that of a blind guess,i.e.,[1].

    Secondly,in operation mode 1 or mode 2,hackers are unable to successfully crack the WEBDR by submitting chosen-plaintext attacks and known-plaintext attacks.They can only crack the system by analyzing the wrapped ciphertext files collected.But without the values ofΔ1landΔ2l,no clues of the exact place of the ciphertext within the wrapped ciphertext file can be found,meaning that the attacker cannot successfully retrieve the ciphertext from the wrapped ciphertext file and crack it.In this case,Eqs.(7)and(8)are not helpful for hackers,i.e.,the probability with which to recoverREKby solving Eqs.(7)and(8)is the same to that of a blind guess.

    On the other hand,hackers may somehow accurately guess where the ciphertext blockCiis(e.g.,by brute-force approaches),1 ≤i≤n,and attempt to solve Eqs.(7) and (8).But in Eq.(8),i.e.,,the internal feedback keyfbi-1,1 ≤i≤n,is generated by utilizing Eq.(7)and the four parameters,includingfb0,C0,REK,andSK5,are unknown.Therefore,the value offb1cannot be uncovered.Likewise,sincefb1,REK,andSK5are unknown,the value offb2cannot be solved.Also,becausefb2,REK,andSK5are unknown,the value offb3cannot be obtained,and so on.

    Therefore,the variablesfb1,fb2,...,fbi,...,fbn,form a secure internal feedback-code sequence which is unattainable by hackers.By substituting Eq.(8) with the above results,even if the attacker knowsCiandCi-1,under the condition thatfbi-1,REK,andSK5are unknown,they cannot reversely derive values ofNamely,the chance of obtaining values ofon the basis in whichCiis known is the same to that of a blind guess[1].In other words,the dynamic random encryption keyREKhidden in the term(REK⊕fbi-1)is secure,and the probability with which to solveREKis,which is the same as that of a blind guess.

    Thirdly,without knowing the values ofSK2,SK4,SK5andREK,hackers cannot obtainΔ2lby solving Eq.(9).Further,without the value ofΔ1l,hackers cannot reversely derive the value ofΔ2lfrom the total length of the wrapped ciphertext file,i.e.,Δ2lis secure.Even though hackers correctly guess the value ofΔ2l,and try to solve Eq.(9),i.e.,mod1022+3,to crackREK,the reality is that generation of aΔ2linvolves a dynamic encryption keyREK.On each generation,the value ofΔ2lvaries.The value ofΔ2lranges between 3 and 1024,in which 1024 is far smaller than the upper bound ofREK(0 ≤REK≤2128-1),plus the fact that hackers do not know the values of(SK2+2REK),SK5,and(SK4⊕REK).Thus,the probability with which to obtainREKbased on mere value ofΔ2lis,which is the same to that of a blind guess(Q.E.D.).

    4.4 Security on a Wrapped Ciphertext File

    The ciphertext shown in Fig.1 is wrapped byPRS1 of lengthΔ1landPRS2 of lengthΔ2l.Since values ofPRS1,CREK,andPRS2 are random in different sessions,no methods that can be used to identify each of them in this wrapped ciphertext file.In operation mode 1 or 2,hackers cannot realize the length of ciphertext portion.So,they need to know the values ofΔ1landΔ2lto identify the positions ofPRS1,CREK,andPRS2 to acquire the ciphertext.But,as mentioned above,Δ1landΔ2lare well protected.Hackers cannot identify the exact location of ciphertext,thus unable to access it.Here,we dare to conclude that the security level of a wrapped ciphertext file is high.

    4.5 Security on Ciphertext

    Assume that hackers,by some method,correctly retrieve the ciphertext from the wrapped ciphertext file.Theorem 2 proves that the plaintext is secure.

    Theorem 2:

    LetP1P2P3...Pmbe the plaintext,and letC1C2C3...Cmbe the generated ciphertext,wherePiis theithplaintext block,Ciis its corresponding ciphertext block and both arenbits in length,1 ≤i≤m.In operation mode 1 or 2,the probability with which to acquire plaintextP1P2P3...Pmbased on illegally intercepted ciphertextC1C2C3...Cmis

    Proof:Eq.(11),i.e.,,indicates thatCi-1,SK5,fbi-1,andREKon the righthand side are required beforePican be recovered fromCi.Then by Claimed 1 and Theorem 1,SK5andREKhave achieved their practical securities.The value offbi-1can be obtained with the help of Eq.(12),i.e.,,in which values ofPi-1,fbi-2,Ci-2andSK5are necessary.However,the plaintext blockPi-1is hidden from hackers,and bothfb0=SK4andC0=SK3are well protected.Sois also safely protected.Similarly,if the hackers cannot solveP2,fb1andSK5,the value ofis still unknown,and so on,meaning that the internal feedback-code sequence(fbi-1,1 ≤i≤n)is well protected.Substituting Eq.(11)with this result will show thatP1=(C1⊕((C0⊕SK5)+2fb0))-2(REK⊕fb0)fb0is secure.Thus,whenC0,SK5,fb0andREKare unknown,the probability with which to breakP1is the same as that of a blind guess,i.e.,whereP1is protected by using the Two-dimension operation[1].Likewise,P2=(C2⊕((C1⊕SK5)+2fb1))-2(REK⊕fb1)fb1is secure whenSK5,fb1andREKare unknown.The probability with which to breakP2protected by the Three-dimensional operation[1]is also,and so on.Hence,a plaintext blockPi,1 ≤i≤m,is safely protected,and the probability with which to solve an individual plaintext block is.According to Rule of Product,the probability with which to crack the plaintextP1P2P3...Pmis

    4.6 Security on the WEBDR against Eavesdropping Attacks

    In operation mode 1 or 2,active brute-force attacks,like the chosen-plaintext attack and knownplaintext attack,cannot successfully crack a system protected by the WEBDR.Therefore,passive eavesdropping attacks will be the main method used to break the WEBDR by hackers.Now we would like to prove that the WEBDR can effectively defend against eavesdropping attacks.

    In operation mode 1,before data files are transmitted between UE and a base station(or a cloud system),both sides of the connection have already owned their channel key,i.e.,SKCH,which is used to protect the data files.In fact,without the value ofΔ1l,the length of the plaintext and the value ofΔ2l,hackers cannot exactly identify the position of the ciphertext and then crack it.In addition,if hackers attempt to sniff data in a long term so as to collect a large amount of data for further analysis,it is still useless since for each communication session,the channel keySKCHvaries and there is no association between two arbitrarySKCHs.Of course,there is no direct relationship among all wrapped ciphertext files.In other words,the WEBDR can effectively defend against eavesdropping attacks when operation mode 1 is in use.

    In operation mode 2,even if a wrapped ciphertext file is stolen.As mentioned above,hackers cannot figure out the right position of the ciphertext,and then crack the wrapped ciphertext file.Nevertheless,even though many wrapped ciphertext files are encrypted by using the sameSKPW,theirIVs are different so thatSK1~SK5,Δ1landREKare all individually different in different sessions.It is hard for hackers to crack these wrapped ciphertext files without knowingSKPW,meaning that the WEBDR is able to effectively defend against eavesdropping attacks when operation mode 2 is in use.

    5 Performance Analyses and Improvements

    The performance of encrypting and decrypting data blocks mainly depends upon the number of operating instructions.Table 1 lists the number of operations required by the WEBDR and AES when they encrypt/decrypt data blocks that are 128 bits long.

    Table 1:The number of operations consumed by the WEBDR and AES

    Due to the natural-randomness property,it is difficult for most cryptographic algorithms to theoretically compare time complexity.To demonstrate the better performance of the WEBDR than the AES,we conduct several experiments with test scenarios that encrypt/decrypt data blocks of different sizes from 1 KBs to billion KBs.In each test case,we calculate the average time consumed by each step of pre-processing procedures and the encryption/decryption step by million times of executions.

    The experimental results by employing devices of different specifications are shown in Table 2 which shows that the cost of encrypting(decrypting)a plaintext(ciphertext)block by the AES is 6–8 times higher than that of encrypting (decrypting) a plaintext (ciphertext) block by the WEBDR in average.Since before encryption,the AES needs to execute Key-Expansion,i.e.,generating roundkeys by manipulating its cipher-key.Similarly,before encryption,the WEBDR has to perform preprocessing,including initial process,Step 1 of the encryption process and the generation ofΔ2l.

    Table 2:Experimental results of test cases(μs)

    To produce a wrapped ciphertext file,the WEBDR should execute post-processing procedures,i.e.,the generation ofPRS1 andPRS2,in Step 3 of the encryption process.The costs of extra suboperations required by the AES and WEBDR are also listed in Table 2.The costs for pre/postprocessing in the decryption process of the WEBDR are lower than that in its encryption process since the decryption does not need to generatePRS1 andPRS2,only identifying their lengths.If a plaintext file hasnplaintext blocks,each of which is 16 bytes long,the theoretical encryption/decryption costs of the WEBDR and AES can be derived from Table 2.

    (1)The AES(for Device#=5)

    (2)The WEBDR(for Device#=5)

    Basically,most of the 5th-generation (5G) applications are data intensive and at least 100 kb of data size.As shown in Table 2,the performance of the WEBDR is around 6.7–7.09 times faster than that of the AES.

    The cost of wrappingn-block ciphertext,denoted byCC,in a wrapped file is

    where 130=(Δ1lmax+Δ2lmax)/16+2=1024 ?2/16+2 since Δ1lmax=Δ2lmax=1024.Whennis large,CC approaches 1.

    6 Conclusions and Future Works

    In this study,the WEBDR is developed by using a randomly wrapped feedback approach based on user passwords or channel keys,which together withIVconstruct high security wrapped ciphertext files with high performance.When receiving a plaintext at different time points,the dynamic random encryption approach,which adopts current time keys and random keys,will produce different wrapped ciphertext files of different cipher texts and lengths,consequently highly improving the security level of transmitted ciphertext.Our theoretical analyses demonstrate that the WEBDR has achieved practical security in transmitting wireless data and encrypting personal files.

    Theorems 1 and 2 prove the security level that the proposed scheme can achieve,i.e.,the probability with which to obtainREKfrom an intercepted wrapped ciphertext file isand the probability with which to acquire plaintextP1P2P3...Pmbased on illegally intercepted ciphertextC1C2C3...CmisThe performance of the WEBDR when encrypting/decrypting a file longer than 128kb is around 6-8 times faster than that of the AES (see Table 2).All operations required by AES and the WEBDR are listed in Table 1.The former consumes 176 XOR operations for both of its encryption and decryption,while the WEBDR costs only three XOR for each of its message decryption and decryption processes.Therefore,this proposed system is more suitable than AES for protecting data stored in a cloud or transmitted between the cloud and an end user.Of course,readers may say that less operations also easily conduct hackers to break the WEBDR.Yes,it is true.But the time consumed for encrypting/decrypting data for 5G/beyond 5G (B5G)/the 6thgeneration (6G) networks need to be short to avoid being the bottleneck of data transfer since users of current networks request short transmission time.

    According to reference [34],the download speed of a 5G system is about 10 times that of a 4thgeneration (4G) network,and high-speed communication has been widely requested by users,highperformance transmission is always desired,while keeping the practical security.

    In the future,we will continue developing a faster encryption and decryption approach and then apply it to image cryptography [35].Also,users may forget their passwords.Then they have trouble decrypting their ciphertexts to plaintexts.Therefore,we need a forgotten-password-recovery mechanism following which users can recover their original passwords,and then decrypt the wrapped ciphertext files.These constitute our future studies.

    Acknowledgement:We would like to thank reviewers who gave us many valuable comments and suggestions with which we can then significantly improve the quality of our manuscript.

    Funding Statement:This work is financially supported in part by Ministry of Science and Technology(MOST),Taiwan under the Grant MOST 109-2221-E-029-017-MY2.

    Author Contributions:Study concepts and system design: Yi-Li Huang and Fang-Yie Leu;Data collection and preparation: Ruey-Kai Sheu and Chi-Jan Huang;Draft manuscript preparation: Yi-Li Huang and Fang-Yie Leu;Analysis and interpretation of results:Ruey-Kai Sheu and Jung-Chun Liu;Theorem derivation and proofs:Yi-Li Huang and Jung-Chun Liu.

    Availability of Data and Materials:A part of the data adopted in this study is articles randomly collected from the Internet.The remaining part is a company’s personnel data.For privacy consideration,the personnel data cannot be accessed without this company’s permission.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    久久人妻福利社区极品人妻图片| 成在线人永久免费视频| 久久午夜综合久久蜜桃| 在线观看免费日韩欧美大片| 交换朋友夫妻互换小说| 久久久久久久精品吃奶| 最近最新免费中文字幕在线| 免费久久久久久久精品成人欧美视频| 在线 av 中文字幕| 欧美在线黄色| 国产精品.久久久| 国产三级黄色录像| 无人区码免费观看不卡 | 一二三四社区在线视频社区8| 18禁美女被吸乳视频| 在线观看免费午夜福利视频| 菩萨蛮人人尽说江南好唐韦庄| 日韩大片免费观看网站| 国产亚洲精品一区二区www | 国产91精品成人一区二区三区 | 日本黄色视频三级网站网址 | 国产午夜精品久久久久久| a在线观看视频网站| 国产成人啪精品午夜网站| 国产成+人综合+亚洲专区| 日韩免费高清中文字幕av| 欧美+亚洲+日韩+国产| 国产欧美日韩精品亚洲av| 久久久久国内视频| 国产在线精品亚洲第一网站| 亚洲午夜理论影院| 国产野战对白在线观看| 大陆偷拍与自拍| 这个男人来自地球电影免费观看| 国产一区二区 视频在线| 久热爱精品视频在线9| 成年动漫av网址| 男女免费视频国产| 法律面前人人平等表现在哪些方面| 国产精品熟女久久久久浪| 精品亚洲成a人片在线观看| 久久久国产精品麻豆| 男男h啪啪无遮挡| 久久久久网色| 日韩 欧美 亚洲 中文字幕| 国产有黄有色有爽视频| 一级片'在线观看视频| 夜夜骑夜夜射夜夜干| 极品少妇高潮喷水抽搐| 久久中文字幕人妻熟女| 777米奇影视久久| 国产成+人综合+亚洲专区| 国产亚洲精品第一综合不卡| 狠狠狠狠99中文字幕| 亚洲成国产人片在线观看| netflix在线观看网站| 大型黄色视频在线免费观看| 黄色视频,在线免费观看| 女警被强在线播放| 99国产精品99久久久久| 亚洲成人免费av在线播放| 国产一区二区激情短视频| 69精品国产乱码久久久| 亚洲国产欧美网| 韩国精品一区二区三区| 肉色欧美久久久久久久蜜桃| 黑人猛操日本美女一级片| 欧美日韩av久久| 日韩精品免费视频一区二区三区| 亚洲国产欧美一区二区综合| √禁漫天堂资源中文www| www日本在线高清视频| 欧美亚洲日本最大视频资源| 另类精品久久| 无人区码免费观看不卡 | 王馨瑶露胸无遮挡在线观看| 欧美日韩av久久| 国产在线一区二区三区精| 国产精品久久久av美女十八| 黄色视频不卡| 叶爱在线成人免费视频播放| av网站免费在线观看视频| 后天国语完整版免费观看| 极品人妻少妇av视频| 首页视频小说图片口味搜索| 男女高潮啪啪啪动态图| 人人澡人人妻人| 9191精品国产免费久久| 欧美性长视频在线观看| 建设人人有责人人尽责人人享有的| 黑人巨大精品欧美一区二区mp4| 国产视频一区二区在线看| 日韩欧美国产一区二区入口| 精品一品国产午夜福利视频| 高清黄色对白视频在线免费看| 狂野欧美激情性xxxx| 高清欧美精品videossex| 亚洲欧美色中文字幕在线| 久久精品国产亚洲av高清一级| 亚洲综合色网址| 曰老女人黄片| 91精品三级在线观看| 亚洲天堂av无毛| 91精品国产国语对白视频| 亚洲少妇的诱惑av| 久久精品成人免费网站| 丁香六月欧美| 男女无遮挡免费网站观看| 老鸭窝网址在线观看| svipshipincom国产片| 精品少妇一区二区三区视频日本电影| 女性生殖器流出的白浆| 一级片'在线观看视频| 亚洲专区国产一区二区| 国产午夜精品久久久久久| 精品久久久久久电影网| 成年版毛片免费区| 国产一区二区三区综合在线观看| 国产极品粉嫩免费观看在线| 国产精品国产高清国产av | 最近最新免费中文字幕在线| 美女福利国产在线| 亚洲成人免费av在线播放| 男女下面插进去视频免费观看| 亚洲欧洲日产国产| 国产视频一区二区在线看| 十八禁网站免费在线| 国产成人一区二区三区免费视频网站| 搡老熟女国产l中国老女人| 丁香欧美五月| 久久性视频一级片| 精品少妇内射三级| 精品亚洲成a人片在线观看| 在线看a的网站| 国产高清videossex| 一区二区三区激情视频| 精品国产一区二区三区久久久樱花| 可以免费在线观看a视频的电影网站| 成年版毛片免费区| 亚洲男人天堂网一区| 别揉我奶头~嗯~啊~动态视频| 精品少妇内射三级| 日韩欧美一区视频在线观看| 在线观看免费日韩欧美大片| 无限看片的www在线观看| 国产不卡一卡二| 久久久久国内视频| netflix在线观看网站| 国产又爽黄色视频| 99香蕉大伊视频| 99九九在线精品视频| 亚洲国产看品久久| 青草久久国产| 精品高清国产在线一区| 天天躁狠狠躁夜夜躁狠狠躁| 在线观看免费日韩欧美大片| 夜夜骑夜夜射夜夜干| 国产高清激情床上av| 国产精品偷伦视频观看了| 窝窝影院91人妻| 午夜免费成人在线视频| 久久精品91无色码中文字幕| 亚洲中文日韩欧美视频| av欧美777| 久久精品亚洲av国产电影网| 超碰成人久久| 欧美激情极品国产一区二区三区| 最新在线观看一区二区三区| 亚洲五月色婷婷综合| 五月开心婷婷网| 少妇的丰满在线观看| 亚洲五月色婷婷综合| 国产精品.久久久| 一本—道久久a久久精品蜜桃钙片| 在线 av 中文字幕| 日本欧美视频一区| 91国产中文字幕| 中文字幕高清在线视频| 久热这里只有精品99| 欧美亚洲 丝袜 人妻 在线| 成人精品一区二区免费| 国产又色又爽无遮挡免费看| 午夜老司机福利片| 久久精品亚洲熟妇少妇任你| 中文字幕人妻丝袜一区二区| 一本—道久久a久久精品蜜桃钙片| 亚洲五月色婷婷综合| 国产精品.久久久| 成人三级做爰电影| 久久人人97超碰香蕉20202| 男女免费视频国产| 精品少妇内射三级| 亚洲男人天堂网一区| 亚洲伊人久久精品综合| 国产精品一区二区精品视频观看| 高清视频免费观看一区二区| e午夜精品久久久久久久| a级毛片黄视频| www.999成人在线观看| 亚洲免费av在线视频| 成年版毛片免费区| 国产一区二区三区在线臀色熟女 | 黄色片一级片一级黄色片| 国产成+人综合+亚洲专区| 国产一卡二卡三卡精品| 自拍欧美九色日韩亚洲蝌蚪91| 一边摸一边做爽爽视频免费| 满18在线观看网站| 久久精品国产综合久久久| 久久精品aⅴ一区二区三区四区| 日韩有码中文字幕| 国产亚洲av高清不卡| 视频区欧美日本亚洲| 高清av免费在线| 精品国产超薄肉色丝袜足j| 黄色视频,在线免费观看| 久久ye,这里只有精品| 亚洲av成人不卡在线观看播放网| 欧美亚洲 丝袜 人妻 在线| 咕卡用的链子| 亚洲精品美女久久av网站| 精品国产一区二区久久| 我的亚洲天堂| 三上悠亚av全集在线观看| 一二三四在线观看免费中文在| 欧美另类亚洲清纯唯美| 国产97色在线日韩免费| 91精品国产国语对白视频| 91字幕亚洲| kizo精华| 1024视频免费在线观看| 欧美成人免费av一区二区三区 | 18禁裸乳无遮挡动漫免费视频| 免费在线观看视频国产中文字幕亚洲| 极品少妇高潮喷水抽搐| 美女高潮到喷水免费观看| tocl精华| av又黄又爽大尺度在线免费看| 国产成+人综合+亚洲专区| 一个人免费看片子| 久久av网站| 男女下面插进去视频免费观看| bbb黄色大片| 无限看片的www在线观看| 久久精品国产亚洲av香蕉五月 | 国产免费av片在线观看野外av| 免费高清在线观看日韩| 欧美日韩视频精品一区| av网站在线播放免费| 久久精品国产综合久久久| 久久久久久久大尺度免费视频| 欧美激情 高清一区二区三区| 国产色视频综合| 天堂8中文在线网| 老熟女久久久| 色在线成人网| 三上悠亚av全集在线观看| 日韩三级视频一区二区三区| 制服诱惑二区| 高潮久久久久久久久久久不卡| 亚洲欧美精品综合一区二区三区| 欧美黑人精品巨大| 精品久久久久久久毛片微露脸| 十八禁人妻一区二区| 久久久国产一区二区| 两性午夜刺激爽爽歪歪视频在线观看 | 亚洲中文日韩欧美视频| 免费在线观看影片大全网站| 亚洲av美国av| 国产黄色免费在线视频| 午夜久久久在线观看| 欧美日韩av久久| 久久天堂一区二区三区四区| 亚洲av国产av综合av卡| netflix在线观看网站| 男女无遮挡免费网站观看| 国产黄色免费在线视频| 国产99久久九九免费精品| 国产在线观看jvid| 成年人黄色毛片网站| 天天躁日日躁夜夜躁夜夜| 国产日韩欧美在线精品| 十八禁人妻一区二区| 亚洲欧美日韩高清在线视频 | 一区二区三区精品91| 两个人看的免费小视频| 欧美日韩亚洲高清精品| 黑丝袜美女国产一区| 日韩一卡2卡3卡4卡2021年| av天堂久久9| 老汉色∧v一级毛片| 久久精品人人爽人人爽视色| 日韩大片免费观看网站| www.熟女人妻精品国产| 悠悠久久av| 国产一区二区三区在线臀色熟女 | 免费在线观看完整版高清| 男人操女人黄网站| 99九九在线精品视频| 在线观看一区二区三区激情| 国产黄色免费在线视频| 丁香六月欧美| 在线观看www视频免费| 深夜精品福利| 国产成人欧美在线观看 | a级毛片黄视频| 宅男免费午夜| 桃花免费在线播放| 在线观看免费视频日本深夜| 国产男女超爽视频在线观看| √禁漫天堂资源中文www| 韩国精品一区二区三区| 精品福利永久在线观看| 看免费av毛片| 久久狼人影院| 免费在线观看黄色视频的| 国产亚洲精品一区二区www | 女人被躁到高潮嗷嗷叫费观| 大陆偷拍与自拍| 亚洲国产欧美在线一区| 日韩一区二区三区影片| 两个人免费观看高清视频| 如日韩欧美国产精品一区二区三区| 久久久久精品国产欧美久久久| 日韩免费av在线播放| 大陆偷拍与自拍| 一级毛片电影观看| 蜜桃国产av成人99| 久久中文字幕人妻熟女| 精品久久蜜臀av无| 一边摸一边抽搐一进一出视频| 蜜桃在线观看..| 亚洲人成伊人成综合网2020| 老熟妇乱子伦视频在线观看| 日韩精品免费视频一区二区三区| 如日韩欧美国产精品一区二区三区| 丁香六月欧美| 国产在线视频一区二区| 久久国产精品人妻蜜桃| 高清视频免费观看一区二区| 日本av手机在线免费观看| 18禁国产床啪视频网站| 两个人看的免费小视频| 中文字幕人妻丝袜一区二区| 久久99热这里只频精品6学生| 宅男免费午夜| 天堂8中文在线网| 亚洲,欧美精品.| 高清在线国产一区| 久久中文看片网| 色尼玛亚洲综合影院| 精品一区二区三卡| 亚洲avbb在线观看| 国产又色又爽无遮挡免费看| 亚洲第一欧美日韩一区二区三区 | 免费观看a级毛片全部| 妹子高潮喷水视频| 欧美日韩视频精品一区| 久久久久久久大尺度免费视频| 亚洲天堂av无毛| 欧美亚洲日本最大视频资源| 精品国产乱码久久久久久小说| 女人被躁到高潮嗷嗷叫费观| 人人妻人人澡人人看| 亚洲专区中文字幕在线| 美女主播在线视频| 黑人巨大精品欧美一区二区蜜桃| 极品人妻少妇av视频| 国产精品影院久久| 18禁裸乳无遮挡动漫免费视频| 亚洲成人免费av在线播放| 夜夜夜夜夜久久久久| 男女午夜视频在线观看| 首页视频小说图片口味搜索| 国产真人三级小视频在线观看| 精品午夜福利视频在线观看一区 | 热99re8久久精品国产| 成人国产一区最新在线观看| e午夜精品久久久久久久| 精品亚洲成a人片在线观看| 亚洲成a人片在线一区二区| 极品少妇高潮喷水抽搐| 大码成人一级视频| 精品视频人人做人人爽| 亚洲精品国产色婷婷电影| 欧美午夜高清在线| 黑人欧美特级aaaaaa片| 中文字幕人妻丝袜一区二区| 啦啦啦视频在线资源免费观看| 国产欧美日韩精品亚洲av| 久久99热这里只频精品6学生| 欧美日本中文国产一区发布| 一级毛片精品| videosex国产| 亚洲专区字幕在线| 国产福利在线免费观看视频| 午夜激情av网站| 亚洲精品自拍成人| 不卡一级毛片| 三级毛片av免费| 日本五十路高清| e午夜精品久久久久久久| 免费黄频网站在线观看国产| 成人三级做爰电影| 一进一出好大好爽视频| 黄色怎么调成土黄色| 黄色视频不卡| 丰满少妇做爰视频| 高清黄色对白视频在线免费看| 9热在线视频观看99| 久久精品91无色码中文字幕| 国产无遮挡羞羞视频在线观看| 亚洲色图 男人天堂 中文字幕| 婷婷成人精品国产| 99久久国产精品久久久| 涩涩av久久男人的天堂| 高清av免费在线| 国产精品久久久人人做人人爽| 最新美女视频免费是黄的| 深夜精品福利| 大片免费播放器 马上看| 国内毛片毛片毛片毛片毛片| 下体分泌物呈黄色| 黄片大片在线免费观看| 三上悠亚av全集在线观看| 国产麻豆69| 少妇精品久久久久久久| svipshipincom国产片| a级片在线免费高清观看视频| 国产精品一区二区免费欧美| 国产免费现黄频在线看| 中文字幕精品免费在线观看视频| a级毛片在线看网站| 国产日韩欧美视频二区| 免费在线观看黄色视频的| 新久久久久国产一级毛片| 亚洲国产欧美在线一区| 国产91精品成人一区二区三区 | 少妇裸体淫交视频免费看高清 | 久久久久视频综合| 热99久久久久精品小说推荐| 久久99热这里只频精品6学生| 美女福利国产在线| 久久中文字幕人妻熟女| 午夜激情av网站| 久久精品亚洲av国产电影网| 国产深夜福利视频在线观看| 老司机午夜福利在线观看视频 | 最新在线观看一区二区三区| 久久精品aⅴ一区二区三区四区| 国产日韩一区二区三区精品不卡| 成人免费观看视频高清| 久久精品亚洲熟妇少妇任你| 高清毛片免费观看视频网站 | 久久久精品国产亚洲av高清涩受| 久久久久久久大尺度免费视频| 亚洲,欧美精品.| 欧美亚洲 丝袜 人妻 在线| 午夜91福利影院| 99精国产麻豆久久婷婷| 午夜日韩欧美国产| 90打野战视频偷拍视频| 亚洲国产欧美网| 成人亚洲精品一区在线观看| 精品卡一卡二卡四卡免费| 免费在线观看日本一区| 国产淫语在线视频| e午夜精品久久久久久久| 好男人电影高清在线观看| 国产黄频视频在线观看| 国产亚洲一区二区精品| 麻豆av在线久日| 欧美成人午夜精品| 久久久久国内视频| 麻豆成人av在线观看| 又大又爽又粗| 无限看片的www在线观看| 日韩欧美免费精品| 超碰成人久久| 在线看a的网站| 亚洲色图av天堂| 久久久久久久精品吃奶| 美国免费a级毛片| 精品免费久久久久久久清纯 | 我的亚洲天堂| 老汉色av国产亚洲站长工具| 午夜免费鲁丝| 黄片小视频在线播放| 亚洲精品乱久久久久久| 久久婷婷成人综合色麻豆| 69av精品久久久久久 | 丝袜美腿诱惑在线| 免费在线观看视频国产中文字幕亚洲| 啦啦啦 在线观看视频| 人人妻人人添人人爽欧美一区卜| 亚洲第一青青草原| 黄色丝袜av网址大全| 久久亚洲精品不卡| 欧美成人免费av一区二区三区 | 国产亚洲一区二区精品| 超色免费av| 动漫黄色视频在线观看| 一区二区三区精品91| 国产亚洲一区二区精品| 青草久久国产| 另类精品久久| 国产av又大| 欧美 日韩 精品 国产| 日韩有码中文字幕| 伊人久久大香线蕉亚洲五| 国产成人一区二区三区免费视频网站| 18禁观看日本| 精品国产一区二区久久| 99久久人妻综合| 桃花免费在线播放| 天天躁狠狠躁夜夜躁狠狠躁| 久久久久视频综合| 国产又色又爽无遮挡免费看| 法律面前人人平等表现在哪些方面| 人妻 亚洲 视频| 91大片在线观看| 国产淫语在线视频| 欧美另类亚洲清纯唯美| 久热这里只有精品99| 伦理电影免费视频| 中文字幕人妻丝袜一区二区| 国产av国产精品国产| 黄色视频不卡| 久久影院123| 热99国产精品久久久久久7| 十八禁网站网址无遮挡| 亚洲精品av麻豆狂野| 美女高潮到喷水免费观看| 热re99久久国产66热| 亚洲九九香蕉| 丁香六月欧美| 亚洲av美国av| 亚洲色图综合在线观看| 久久精品人人爽人人爽视色| 美女福利国产在线| 成人亚洲精品一区在线观看| 色播在线永久视频| 少妇裸体淫交视频免费看高清 | 久久精品国产综合久久久| 国产伦人伦偷精品视频| 午夜福利影视在线免费观看| 51午夜福利影视在线观看| 激情在线观看视频在线高清 | 麻豆av在线久日| 国产精品久久久久久精品古装| 国产极品粉嫩免费观看在线| videos熟女内射| 精品欧美一区二区三区在线| 久久久精品免费免费高清| 黑人猛操日本美女一级片| 久久毛片免费看一区二区三区| 久久久久精品国产欧美久久久| 欧美老熟妇乱子伦牲交| 最新美女视频免费是黄的| 十八禁网站网址无遮挡| 91九色精品人成在线观看| 人成视频在线观看免费观看| 黄网站色视频无遮挡免费观看| 日本av免费视频播放| 大型黄色视频在线免费观看| 日本wwww免费看| 日韩成人在线观看一区二区三区| 亚洲精品国产一区二区精华液| 亚洲av美国av| 色播在线永久视频| 国产成人精品无人区| 建设人人有责人人尽责人人享有的| 一区在线观看完整版| 国产精品影院久久| 大码成人一级视频| a级片在线免费高清观看视频| 伦理电影免费视频| 欧美黑人欧美精品刺激| 黄色怎么调成土黄色| 老汉色av国产亚洲站长工具| 精品高清国产在线一区| 男女之事视频高清在线观看| av免费在线观看网站| 69精品国产乱码久久久| 精品亚洲成a人片在线观看| 国产亚洲午夜精品一区二区久久| 久久久欧美国产精品| 国产av国产精品国产| 亚洲精品美女久久久久99蜜臀| 午夜福利视频精品| 69av精品久久久久久 | 丝袜人妻中文字幕| 欧美日韩亚洲高清精品| 大码成人一级视频| 人妻一区二区av| 99久久99久久久精品蜜桃| 亚洲精品中文字幕一二三四区 | 母亲3免费完整高清在线观看| 一边摸一边抽搐一进一出视频| 视频在线观看一区二区三区| 蜜桃国产av成人99| 一本色道久久久久久精品综合| 人妻 亚洲 视频| 亚洲 欧美一区二区三区| 中文字幕另类日韩欧美亚洲嫩草| 亚洲五月色婷婷综合| 别揉我奶头~嗯~啊~动态视频| 乱人伦中国视频| 91麻豆av在线| 黄片小视频在线播放| 在线观看舔阴道视频| 一级片免费观看大全| 亚洲专区中文字幕在线| 亚洲国产中文字幕在线视频| 国产精品二区激情视频|