• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Nonlinear Components of a Block Cipher over Eisenstein Integers

    2024-01-12 03:47:40MohammadMazyadHazzaziMuhammadSajjadZaidBassfarTariqShahandAshwagAlbakri
    Computers Materials&Continua 2023年12期

    Mohammad Mazyad Hazzazi ,Muhammad Sajjad ,Zaid Bassfar ,Tariq Shah,? and Ashwag Albakri

    1Department of Mathematics,College of Science,King Khalid University,Abha,61413,Saudi Arabia

    2Department of Mathematics,Quaid-I-Azam University,Islamabad,45320,Pakistan

    3Department of Information Technology,University of Tabuk,Tabuk,71491,Saudi Arabia

    4Department of Computer Science,College of Computer Science&Information Technology,Jazan University,Jazan,45142,Saudi Arabia

    ABSTRACT In block ciphers,the nonlinear components,also known as substitution boxes(S-boxes),are used with the purpose to induce confusion in cryptosystems.For the last decade,most of the work on designing S-boxes over the points of elliptic curves,chaotic maps,and Gaussian integers has been published.The main purpose of these studies is to hide data and improve the security levels of crypto algorithms.In this work,we design pair of nonlinear components of a block cipher over the residue class of Eisenstein integers(EI).The fascinating features of this structure provide S-boxes pair at a time by fixing three parameters.However,in the same way,by taking three fixed parameters only one S-box is obtained through a prime field-dependent Elliptic curve(EC),chaotic maps,and Gaussian integers.The newly designed pair of S-boxes are assessed by various tests like nonlinearity,bit independence criterion,strict avalanche criterion,linear approximation probability,and differential approximation probability.

    KEYWORDS Eisenstein integers;residue class of Eisenstein integers;block cipher;S-boxes;analysis of S-boxes

    1 Introduction

    Cryptography was widely used in military,diplomatic,and government applications until the 1970s.In the 1980s,the telecommunications and financial industries installed hardware cryptographic devices.The mobile phone system was the first cryptographic application in the late 1980s.Nowadays,everyone uses cryptographic applications in their daily lives.Our daily lives commonly depend on the secure transmission of information and data.Online shopping,cell phone messages and calls,ATMs,electronic mail,facsimile,wireless media,and data transfer over the internet all require a system to maintain the secrecy and integrity of private information.Cryptography offers a mechanism for everyone to interact safely in a hostile environment.Sensitive data is significantly aided by cryptography.Communication is encrypted to guarantee that its meaning is hidden,preventing anybody who reads it from understanding something regarding it unless somebody else manages to decrypt it[1].

    In cryptography,the S-box is crucial for ensuring secure communication.Shannon suggested the notion of an S-box in 1949 in [2].S-boxes serve a pivotal role in causing confusion within the data.According to Shannon,concealing the relationship between the key and cipher text is referred to as confusion,while concealing the statistical link between plain text as well as cipher text is referred to as diffusion.In other words,the non-uniformity in the distribution of individual letters inside plain text should be redistributed into the non-uniformity in the distribution of much bigger structures in the encrypted text,which is substantially more difficult to decrypt[3].The Rijndael algorithm is basically the same as an iterated block cipher but has a few extra features.Before we talk about the Rijndael algorithm,we will talk about an iterated block cipher shown in[4].

    Many scholars employed diverse algebraic and statistical frameworks to confound data and produce S-boxes.In[5],the authors suggested S-boxes over the permutation of the symmetric group.In [6],Javeed et al.constructed the non-linear component of block cipher by means of a chaotic dynamical system and symmetric group.In[7],the authors described the S-box based on the subgroup of the Galois field.The author suggested a robust encryption system using a modified Chebyshev map,Advanced Encryption Standard(AES)S-boxes,and a symmetric group of permutations[8].

    In[9],the authors proposed a new scheme for the construction of the S-box based on the linear fractional transformation(LFT)and permutation function.In[10],the authors proposed S-box over the Mobius group and finite field.The author proposed S-box on a nonlinear chaotic map in[11].In[12],Sajjad et al.designed pair of nonlinear components of a block cipher over Gaussian integers.In[13,14],the authors constructed cyclic codes over quaternion integers,these quaternion structures can be helpful for the construction of S-boxes.The authors designed differential cryptanalysis of DESlike cryptosystems in [15].Cassal-Quiroga et al.generated the dynamical S-boxes for block ciphers via an extended logistic map[16].Tang et al.designed a new method of dynamical S-boxes based on discretized chaotic maps [17].Chen et al.extended method for obtaining S-boxes based on threedimensional chaotic Baker maps [18].The authors constructed s-boxes using different maps over elliptic curves for image encryption [19].Cavusoglu et al.[20] constructed S-box based on chaotic scaled zhongtang system.Siddiqui et al.developed a novel scheme of substitution-box design based on modified Pascal’s triangle and elliptic curve in[21].Farhan et al.designed a new S-box generation algorithm based on the multistability behavior of a plasma perturbation model[22].In[23],the authors approached the S-boxes and permutation,substitution,based encryption.

    Eisenstein integers are named after German mathematician Ferdinand Eisenstein,who first introduced them in the 1850s while studying the theory of quadratic forms.Like ordinary complex numbers,Eisenstein integers can be added and multiplied together.However,their properties are different.Eisenstein integers have important applications in number theory,coding theory,data security,and algebraic geometry.They also have connections to other areas of mathematics,such as algebraic number theory and modular forms[24].

    An S-box generator is appropriate for cryptographic purposes if it can efficiently make highly dynamic S-boxes with good cryptographic properties or tests like nonlinearity,bit independence criterion,strict avalanche criterion,linear approximation probability,and differential approximation probability.The key contributions of our proposed study are given below:

    ? Propose an algorithm to generate pair of S-boxes by the cyclic group over the residue class of Eisenstein integers.

    ? Security Analysis.

    ? The advantages of the proposed algorithm over EI with some of the existing algorithms over EC.

    This paper is structured as follows: Basic definitions,cyclic group over the residue class of Eisenstein integers,and some fundamental results are elaborated in Section 2.The scheme of the pair of new S-boxes is proposed in Section 3.Analysis of the proposed S-boxes including nonlinearity,bit independence criterion,strict avalanche criterion,linear approximation probability,and differential approximation probability investigated in Section 4.The comparison of the proposed S-boxes with some of the existing S-boxes are given in Section 5.Conclusions and future directions are given in Section 6.

    2 Preliminaries

    This section provides the key concepts and basic findings that will be used in the study of upcoming sections.First of all,we recall the definition of Eisenstein integers,cyclic group over a residue class of Eisenstein integers,and some fundamental results.

    Eisenstein Integers

    In[24],Eisenstein integers are a subset of complex numbers with real and vector parts.

    1.Z[ω]={b0+b1ω:b0,b1∈Z},where Z is the set of integers.

    2.Multiplicative identity is 1.

    3.ωis the cube root of unity.

    Leth=b0+b1ωbe an element of the Eisenstein integer ring,then the conjugate ofhis=b0+b1ω2.Then the norm ofhis given by

    An Eisenstein integer has only two parts,one is the scalar partb0and the other is the vector partb1ω.

    Addition of Two Eisenstein Integers

    Leth=a1+b1ωandk=a2+b2ωbe two Eisenstein integers then,the sum of two Eisenstein integers is also an Eisenstein integer defined as

    Multiplication of Two Eisenstein Integers

    Leth=a1+b1ωandk=a2+b2ωare two Eisenstein integers then,the multiplication of two Eisenstein integers is also an Eisenstein integer defined as

    Theorem:In[24],the set of natural numbers for each odd rational primep,there is a primeh∈Z[ω],such thatN(h)=p=.In particular,pis not prime in Z[ω].

    Theorem:In [24],if the norm of an Eisenstein integerN(h) is prime in Z,then the Eisenstein integerhis prime in Z[ω].

    Definition:In [24],let Z[ω] be the set of Eisenstein integers and Z[ω]hbe the residue class of Eisenstein integers over moduloh,h=a+bω.Then,the modulo function:

    wherez∈Z[ω]hand[.]are rounding to the nearest integer.The rounding of an Eisenstein integer can be done by rounding the real part and coefficients of the vector part separately to the closest integer.

    Theorem:In[24],lethbe an Eisenstein prime,and the number of Eisenstein integers modulohis the norm ofh.Ifρ0(modh),thenρn(h)-1≡1(modh).

    Remark:The group generated b<ρ>in the above Theorem is namedS.

    3 Redesign of Pair of n×n S-boxes over Eisenstein Integers

    Multiple methods can be employed to cause confusion inside a security system.S-box is one of the most efficient cryptographic algorithms in use today.The S-boxes are generally formed using the EI class or the multiplicative cyclic group.As a result,it is feasible to create a variety of S-boxes across the residue class of EI,which presents a fantastic outlook for the development of secure and consistent cryptosystems.The subsequent procedures are useful for constructing S-boxes over the residue class of EI(Multiplicative cyclic group).

    Step 1:Construct a cyclic groupSof orderp-1 over the residue class of EI.

    Step 2:Apply permutation through affine mapping as:

    whereb∈Sandabe the unit element ofS.

    Step 3:Separate real and vector parts of Step 2.

    Step 4:Apply modulo 2nover the separated parts in Step 3.

    Step 5:Select the first 2nnon-repeated elements from the elements of Step 4.

    Step 6:Get a pair of S-boxes.

    The construction of S-boxes by Eisenstein integers provides us with better performance instead of S-boxes by using other structures like as chaotic maps,elliptic curves,finite fields,etc.

    3.1 Pair of 4×4 S-boxes over the Residue Class of EI

    Leth=2+9ω,p=n(h)=22+92-18=67,andβ=2+3ω=(2,3),then the cyclic group generated byβis given in Table 1.

    Table 1:Cyclic group generated by β

    Table 2:4×4 S-box by the scalar part of EI

    Table 3:4×4 S-box by the vector part of EI

    Table 4:8×8 S-box by the scalar part of EI=S1

    Table 5:8×8 S-box by the vector part of EI=S2

    Table 6:8×8 S-box by the vector part of EI=S3

    Table 7:8×8 S-box by the vector part of EI=S4

    Apply the affine permutation mapping,f(x)=((63+61ω)x+(63+62ω))(mod16),separate real and vector parts,and select the first 16 non-repeating entries for real and vector parts,which are given in Tables 2 and 3.

    3.2 Pair of 8×8 S-boxes over the Residue Class of EI

    Example 1:Leth=81+71ω,p=n(h)=812+712-(81)(71)=5851,andβ=2+3ω=(2,3),then apply the same procedure of 3.1,we get pair of S-boxes by affine mappingf(x)=((59+29ω)x+(14+8ω))(mod256)given in Tables 4 and 5.

    Example 2:Leth=81+71ω,p=n(h)=812+712-(81)(71)=5851,andβ=2+3ω=(2,3),then apply the same procedure of 3.1,we get pair of S-boxes by affine mappingf(x)((59+29ω)x+(7+5836ω))(mod256)given in Tables 6 and 7.

    4 Analysis of S-boxes

    There are the following tests to analyze the properties of S-boxes.

    4.1 Non-Linearity

    The nonlinearity of the S-box refers to the property of the substitution box used in cryptographic algorithms,which is designed to introduce nonlinearity into the encryption process.In particular,the S-box is used in block ciphers to perform the substitution of plaintext bits with cipher text bits,and its nonlinearity is important for the security of the cipher.The nonlinearity of the S-box is usually measured using a metric called the “nonlinearity coefficient”or “nonlinearity index”.This metric quantifies the degree of nonlinearity introduced by the S-box and is based on the Walsh-Hadamard transform of the S-box.A high nonlinearity coefficient indicates that the S-box is highly nonlinear,which is desirable for cryptographic purposes.Nonlinear S-boxes make it more difficult for an attacker to find patterns or correlations between the plaintext and cipher text,which can be used to break the cipher[25].To achieve high nonlinearity,S-boxes are often constructed using mathematical functions that are highly nonlinear,such as power functions or finite field operations.The upper bound of nonlinearity isN(f)=2n-1-,for S-box.The optimal value of non-linearity is 120.The nonlinearity of the proposed S-boxes is given in Table 8.

    Table 8:Non-linearity of proposed S-boxes

    Table 9:Bit independent criterion of S1

    Table 10:Bit independent criterion of S2

    Table 11:Bit independent criterion of S3

    Table 12:Bit independent criterion of S4

    Table 13:Differential approximation probability of S1

    Table 14 Differential approximation probability of S2

    Table 15:Differential approximation probability of S3

    Table 16 Differential approximation probability of S4

    Table 17:Strict avalanche criterion of S1

    Table 18:Strict avalanche criterion of S2

    Table 19:Strict avalanche criterion of S3

    Table 20:Strict avalanche criterion of S4

    The average non-linearity of proposed S-boxes is 107,106.75,107.0,and 106.75.

    4.2 Bit Independent Criterion(BIC)

    The bit independence criterion of an S-box is a measure of its resistance to linear and differential cryptanalysis attacks.Specifically,it refers to the property that no linear relationship exists between any two output bits of the S-box and any two input bits of the S-box.In other words,the bit independence criterion of an S-box ensures that changing one input bit or one output bit of the S-box will not affect the other output bits or input bits,respectively,in a linear way [26].This property makes it more difficult for an attacker to analyze the S-box using linear or differential cryptanalysis.To achieve high bit independence,S-box designers often use mathematical structures,such as finite fields and Boolean functions,to construct the S-box lookup table.They also perform extensive testing and analysis to ensure that the S-box meets the required bit independence criteria and other cryptographic properties.The results of the BIC are given in Tables 9–12.

    HenceS1,S2,S3andS4satisfied the bit-independent criterion close to the best possible value.

    4.3 Linear Approximation Probability(LP)

    The linear approximation probability for a substitution box(S-box)is a measure of the probability that a linear approximation of the S-box will hold.In other words,it is a measure of the correlation between a set of input bits and a set of output bits of the S-box [27].The linear approximation probability of an S-box is defined asPr[a·x=b·S(x)],whereaandbare two-bit vectors of the same length as the input and output of the S-box,respectively,x is an input to the S-box,and S(x)is the output of the S-box.The symbol · denotes the bitwise inner product of the two-bit vectors.The linear approximation probability is a value between 0 and 1.A value of 0 means that there is no linear approximation of the S-box,while a value of 1 means that the linear approximation holds with certainty.We have calculated the linear approximation probability of the S-boxesS1,S2,S3andS4.The maximum value of LP is 0.1484375,0.1328125,0.1484375,and 0.1328125.

    4.4 Differential Approximation Probability(DAP)

    The differential approximation probability for a substitution box (S-box) is a measure of the probability that a differential approximation of the S-box will hold.In other words,it is a measure of the correlation between a set of input differences and a set of output differences of the S-box.The differential approximation probability of an S-box is defined asPr[Δx→Δy=Δu→Δv],where Δxand Δyare two input differences of the S-box,Δu,and Δvare the corresponding output differences,and →denotes the S-box operation.The differential approximation probability is a value between 0 and 1.A value of 0 means that there is no differential approximation of the S-box,while a value of 1 means that the differential approximation holds with certainty.The DAP results of the proposed work are given in Tables 13–16.

    The maximum value of differential approximation probability for both S-boxesS1,S2,S3,andS2is 0.046875,0.0390625,0.046875,and 0.0390625.

    4.5 Strict Avalanche Criterion(SAC)

    The Strict Avalanche Criterion(SAC)is a measure of the cryptographic strength of a substitution box(S-box).The SAC measures how much a change in one input bit affects the output bits on average,and is defined as follows:For every pair of input bitsiandj,and for every pair of output bitskandl,the difference between the output bits when i and j are flipped is denoted byThe SAC requires that the average over all pairs of input and output bits of the total number of output bit differences that occur when a single input bit is flipped is at least 1/2:

    wherenis the number of input bits,m is the number of output bits,andεis a small positive constant,typically set to 0.01 or smaller.The results in Tables 17–20 show that the value of the strict avalanche criterion of S-boxes based on the residue of a prime number is ~1/2.

    5 Comparison

    The former tests are performed on well-known S-boxes over EC,chaotic maps,and finite fields presented in[19–23,26,27]in order to compare them to the proposed S-boxesS1,S2,S3,andS4over EI.Table 21 shows the results of the EC,chaotic maps(CM),and EI analyses for the various parameters.It is discovered that the proposed S-boxes have a higher nonlinearity value than EC,CM,and other Sboxes.The intriguing features of the proposed technique provide S-boxes pair at a time by fixing three parametersa,b,andp.However,the prime field,which is dependent on the EC via various techniques,provides one S-box at a time by fixing three parametersa,b,andp.Table 21 and Fig.1 show the nonlinearity of the proposed S-box.The proposed S-box LAP results are lower than those presented in[19–23,26,27]and Fig.2.As a result,the proposed S-boxes generate more data confusion and are more resistant to linear attack [17] than [19–23,26,27].The proposed S-boxes’SAC and BIC results are comparable to those of other S-boxes used in Table 21 and Fig.2.As a result,the S-box generated by the proposed technique and the S-boxes shown in Table 21 cause equal magnitude diffusion in the data.The proposed DAP is comparable to the DAP of S-boxes in[19–23,26,27]and Fig.2.Thus,when compared to the others,the proposed technique generates an S-box with high resistance to differential cryptanalysis [18].Table 21 shows the analysis results of newly generated paired S-boxes by the EI cyclic group.Table 21 shows that the performance of paired S-boxes by the cyclic group over EI is comparable to that of S-boxes over EC.

    Figure 1:Comparison of NL of proposed work with existing works

    Table 21:Proposed S-boxes comparison with EC S-boxes for different primes

    Figure 2:Comparison of BIC,SAC and LAP of proposed work with existing works

    6 Conclusion and Future Directions

    We propose a novel construction of substitution boxes by using affine mapping and fixing three parameters a,b,and p.By fixing the three parameters,the prime field dependent on the EC,chaotic maps,and Gaussian integers provide one S-box at a time.Here,the Prime p must be greater than or equal to 257 and belong to the cyclic group over the residue class of Eisenstein integers in order to produce cryptographically robust S-boxes.The newly proposed S-boxes are tested by using different available algebraic and statistical tests.Additionally,the proposed S-boxes cryptographic characteristics are contrasted with some of the currently used S-boxes over EC,Gaussian integers,and chaotic maps.The results indicate that the proposed algorithm can generate paired S-boxes with high resistance to linear and differential attacks.

    The proposed S-boxes over the residue class of EI integers may extend to the S-boxes over the residue class of quaternion and octonion integers.These structures may also use for watermarking and image encryption.

    Acknowledgement:The authors would like to thank the anonymous reviewers for their valuable comments.This work was financially supported by the Deanship of Scientific Research at King Khalid University in Saudi Arabia.

    Funding Statement:The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University,for funding this work through the General Research Groups Program under Grant No.R.G.P.2/109/43.

    Author Contributions:Study conception and design: M.S.,and T.S.;data collection: M.S.,and M.M.H.;analysis and interpretation of results: M.S.,T.S.,M.M.H.,Z.B.,and A.A.;draft manuscript preparation:M.S.,and M.M.H.All authors reviewed the results and approved the final version of the manuscript.

    Availability of Data and Materials:Not applicable.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    久久6这里有精品| 乱人视频在线观看| 2021天堂中文幕一二区在线观| 午夜免费激情av| 国产欧美日韩一区二区三| 少妇人妻一区二区三区视频| 悠悠久久av| 久久久久国产精品人妻aⅴ院| 又黄又爽又免费观看的视频| 内射极品少妇av片p| h日本视频在线播放| 在线观看免费视频日本深夜| 欧美又色又爽又黄视频| 成人特级av手机在线观看| 嫁个100分男人电影在线观看| 国产久久久一区二区三区| 国产精品亚洲美女久久久| 国产三级中文精品| 最近视频中文字幕2019在线8| 精品人妻熟女av久视频| 真人做人爱边吃奶动态| av中文乱码字幕在线| 一进一出好大好爽视频| 免费观看的影片在线观看| 精品久久久久久久久久久久久| 在线十欧美十亚洲十日本专区| 精品人妻1区二区| 99在线人妻在线中文字幕| 免费观看的影片在线观看| 丰满人妻熟妇乱又伦精品不卡| 成人高潮视频无遮挡免费网站| 国产男靠女视频免费网站| 午夜福利免费观看在线| 99热6这里只有精品| 麻豆一二三区av精品| 国产免费一级a男人的天堂| 天堂动漫精品| 国产人妻一区二区三区在| 亚洲三级黄色毛片| 三级国产精品欧美在线观看| 久久久久久国产a免费观看| 日韩亚洲欧美综合| 午夜免费男女啪啪视频观看 | 别揉我奶头~嗯~啊~动态视频| 观看免费一级毛片| 国产高清视频在线播放一区| 午夜福利免费观看在线| 久久久国产成人精品二区| netflix在线观看网站| 一区二区三区高清视频在线| 精品午夜福利在线看| 亚洲黑人精品在线| 精品久久久久久久久久久久久| 在线a可以看的网站| 国产主播在线观看一区二区| 日韩欧美精品免费久久 | 国产一区二区激情短视频| 精品欧美国产一区二区三| 久久人妻av系列| 小说图片视频综合网站| 国产精品一区二区三区四区久久| 国产成人影院久久av| 直男gayav资源| 亚洲经典国产精华液单 | av专区在线播放| 两个人的视频大全免费| 亚洲精品粉嫩美女一区| 日韩有码中文字幕| 国产亚洲精品av在线| 日韩欧美国产一区二区入口| 久久久久久大精品| 免费观看的影片在线观看| 1024手机看黄色片| 69人妻影院| 欧洲精品卡2卡3卡4卡5卡区| 国产精品影院久久| 亚洲欧美精品综合久久99| 国产亚洲精品久久久com| 日韩 亚洲 欧美在线| 日韩亚洲欧美综合| 18禁黄网站禁片午夜丰满| x7x7x7水蜜桃| 男插女下体视频免费在线播放| av在线蜜桃| 国产精品乱码一区二三区的特点| 国产老妇女一区| 757午夜福利合集在线观看| av天堂中文字幕网| 国产爱豆传媒在线观看| 亚洲电影在线观看av| 国产三级中文精品| 九九在线视频观看精品| 久久热精品热| 老熟妇乱子伦视频在线观看| 美女免费视频网站| 天堂√8在线中文| 亚洲精品影视一区二区三区av| 久久天躁狠狠躁夜夜2o2o| 麻豆av噜噜一区二区三区| 99久久精品一区二区三区| 亚洲专区国产一区二区| 日韩成人在线观看一区二区三区| 色吧在线观看| 国产精品日韩av在线免费观看| 婷婷色综合大香蕉| 国产精品一区二区三区四区久久| 深夜精品福利| 两性午夜刺激爽爽歪歪视频在线观看| 亚洲va日本ⅴa欧美va伊人久久| 欧美三级亚洲精品| 欧美日本亚洲视频在线播放| 婷婷色综合大香蕉| 久久99热这里只有精品18| 国产黄a三级三级三级人| 一级毛片久久久久久久久女| 夜夜爽天天搞| 精品一区二区三区视频在线| 99热这里只有是精品在线观看 | 黄色日韩在线| 国产高潮美女av| 五月伊人婷婷丁香| 亚洲熟妇熟女久久| 国产黄色小视频在线观看| 18美女黄网站色大片免费观看| 国产精华一区二区三区| 免费在线观看成人毛片| 亚洲国产精品久久男人天堂| 可以在线观看毛片的网站| 久久久久久久久久成人| 久久香蕉精品热| 美女免费视频网站| 国产亚洲欧美在线一区二区| 青草久久国产| 日本在线视频免费播放| 欧美日韩国产亚洲二区| 人妻夜夜爽99麻豆av| 亚洲片人在线观看| 免费大片18禁| 亚洲五月天丁香| 成年女人毛片免费观看观看9| 脱女人内裤的视频| 精品福利观看| 亚洲精品一区av在线观看| 在线免费观看的www视频| 国产高清有码在线观看视频| 午夜激情欧美在线| 亚洲av成人精品一区久久| 成人高潮视频无遮挡免费网站| 91字幕亚洲| 在线免费观看的www视频| 欧美成人a在线观看| 夜夜夜夜夜久久久久| 久久久久久久亚洲中文字幕 | 亚洲av电影在线进入| 国产精华一区二区三区| 日本在线视频免费播放| 欧美+日韩+精品| 日韩国内少妇激情av| 亚洲国产高清在线一区二区三| 美女大奶头视频| 美女黄网站色视频| 99国产精品一区二区蜜桃av| 日韩 亚洲 欧美在线| 免费黄网站久久成人精品 | 波多野结衣高清作品| 91在线精品国自产拍蜜月| 久久午夜亚洲精品久久| www.熟女人妻精品国产| 国产探花在线观看一区二区| 熟女电影av网| 国产一级毛片七仙女欲春2| 最新中文字幕久久久久| 亚洲av日韩精品久久久久久密| 国产高清激情床上av| 波多野结衣高清作品| 天天躁日日操中文字幕| 欧美丝袜亚洲另类 | 成人鲁丝片一二三区免费| 免费人成在线观看视频色| 全区人妻精品视频| 日本与韩国留学比较| 国产精品一区二区三区四区久久| 午夜免费激情av| 成熟少妇高潮喷水视频| 免费一级毛片在线播放高清视频| 午夜两性在线视频| eeuss影院久久| 成人特级av手机在线观看| 美女cb高潮喷水在线观看| 午夜久久久久精精品| 精品久久久久久久人妻蜜臀av| 三级男女做爰猛烈吃奶摸视频| av在线观看视频网站免费| 欧美黑人欧美精品刺激| 美女xxoo啪啪120秒动态图 | 精品人妻一区二区三区麻豆 | 国产成人影院久久av| 在现免费观看毛片| 很黄的视频免费| 亚洲最大成人手机在线| 成人av在线播放网站| 又黄又爽又刺激的免费视频.| 18+在线观看网站| 女同久久另类99精品国产91| 少妇被粗大猛烈的视频| 少妇的逼好多水| 男女之事视频高清在线观看| 嫁个100分男人电影在线观看| 亚洲人成网站在线播| 日日摸夜夜添夜夜添小说| 在线观看舔阴道视频| 变态另类成人亚洲欧美熟女| 精品久久久久久久人妻蜜臀av| 欧美三级亚洲精品| 久久久久久久久大av| 久久午夜福利片| 亚洲精品乱码久久久v下载方式| 免费无遮挡裸体视频| 97碰自拍视频| 亚洲精品久久国产高清桃花| 99久久99久久久精品蜜桃| 99久久精品热视频| bbb黄色大片| 老熟妇乱子伦视频在线观看| 成人特级av手机在线观看| 亚洲不卡免费看| 国产精品综合久久久久久久免费| 18美女黄网站色大片免费观看| 午夜视频国产福利| 久久中文看片网| 99热这里只有是精品在线观看 | 午夜福利在线观看吧| 国产伦精品一区二区三区四那| 热99在线观看视频| 日本黄色片子视频| 成人av一区二区三区在线看| 午夜老司机福利剧场| 99久久99久久久精品蜜桃| 免费电影在线观看免费观看| 特大巨黑吊av在线直播| 国产精品久久久久久亚洲av鲁大| 毛片女人毛片| 日韩国内少妇激情av| 亚洲熟妇中文字幕五十中出| 在线播放国产精品三级| 91av网一区二区| 国产淫片久久久久久久久 | 嫩草影院精品99| 中文字幕人妻熟人妻熟丝袜美| 午夜免费成人在线视频| 简卡轻食公司| 在线观看免费视频日本深夜| av视频在线观看入口| 丁香六月欧美| 亚州av有码| 婷婷丁香在线五月| 日韩欧美国产一区二区入口| 亚洲最大成人手机在线| 国产精品电影一区二区三区| 亚洲真实伦在线观看| 床上黄色一级片| 69人妻影院| 国产蜜桃级精品一区二区三区| 亚洲精品粉嫩美女一区| 国产精品自产拍在线观看55亚洲| 一级作爱视频免费观看| 尤物成人国产欧美一区二区三区| 成人国产综合亚洲| 搡老岳熟女国产| 亚洲av第一区精品v没综合| 久久久国产成人免费| 亚洲人成网站高清观看| 国内少妇人妻偷人精品xxx网站| 在线观看美女被高潮喷水网站 | 真实男女啪啪啪动态图| 成年女人看的毛片在线观看| 麻豆国产97在线/欧美| 国产人妻一区二区三区在| 可以在线观看毛片的网站| 国产高清视频在线播放一区| 女同久久另类99精品国产91| 高潮久久久久久久久久久不卡| 99热这里只有是精品50| 小说图片视频综合网站| 欧美黄色片欧美黄色片| 亚洲成人久久爱视频| 国产在视频线在精品| 日本免费一区二区三区高清不卡| 他把我摸到了高潮在线观看| 男女之事视频高清在线观看| 中出人妻视频一区二区| 久久伊人香网站| 看片在线看免费视频| 久久久久久九九精品二区国产| 国产精品1区2区在线观看.| 色哟哟·www| 老司机午夜十八禁免费视频| 日本熟妇午夜| 国产免费av片在线观看野外av| 嫁个100分男人电影在线观看| 看免费av毛片| 精品人妻视频免费看| 性色av乱码一区二区三区2| 一级黄片播放器| .国产精品久久| 欧美日韩中文字幕国产精品一区二区三区| 午夜激情福利司机影院| 国产精品乱码一区二三区的特点| 免费av毛片视频| 舔av片在线| aaaaa片日本免费| 人妻丰满熟妇av一区二区三区| 国产精品98久久久久久宅男小说| 国产不卡一卡二| 有码 亚洲区| 美女cb高潮喷水在线观看| 国产伦精品一区二区三区四那| 欧美日本亚洲视频在线播放| 久久久久国内视频| 美女被艹到高潮喷水动态| 午夜免费成人在线视频| 性插视频无遮挡在线免费观看| 天堂网av新在线| 午夜a级毛片| 蜜桃亚洲精品一区二区三区| 午夜免费成人在线视频| 夜夜夜夜夜久久久久| 日韩人妻高清精品专区| 久99久视频精品免费| 在线观看66精品国产| 男女之事视频高清在线观看| 欧美绝顶高潮抽搐喷水| 国产精品女同一区二区软件 | 老熟妇乱子伦视频在线观看| 女人十人毛片免费观看3o分钟| 韩国av一区二区三区四区| 国产一区二区在线av高清观看| 国产高清三级在线| 香蕉av资源在线| 免费黄网站久久成人精品 | 国产色爽女视频免费观看| 久久这里只有精品中国| 精品久久久久久久久久久久久| 色噜噜av男人的天堂激情| 亚洲一区高清亚洲精品| 亚洲乱码一区二区免费版| 很黄的视频免费| 国产免费一级a男人的天堂| 一本久久中文字幕| 亚洲 欧美 日韩 在线 免费| 色精品久久人妻99蜜桃| 三级男女做爰猛烈吃奶摸视频| 天天躁日日操中文字幕| 激情在线观看视频在线高清| 色播亚洲综合网| 日本免费a在线| 看黄色毛片网站| 欧美一区二区国产精品久久精品| 午夜视频国产福利| 亚洲av日韩精品久久久久久密| 国产精品电影一区二区三区| 麻豆国产97在线/欧美| 日日夜夜操网爽| 免费高清视频大片| 看免费av毛片| 国产精品三级大全| 亚洲av中文字字幕乱码综合| 国产精品爽爽va在线观看网站| a级一级毛片免费在线观看| 国产三级黄色录像| 成人精品一区二区免费| 亚洲狠狠婷婷综合久久图片| 色5月婷婷丁香| 午夜福利免费观看在线| 9191精品国产免费久久| 一级毛片久久久久久久久女| 黄色一级大片看看| 啪啪无遮挡十八禁网站| 亚洲精品一卡2卡三卡4卡5卡| 男女视频在线观看网站免费| 欧美绝顶高潮抽搐喷水| 狠狠狠狠99中文字幕| 亚洲va日本ⅴa欧美va伊人久久| 午夜亚洲福利在线播放| 日本熟妇午夜| 男女视频在线观看网站免费| 麻豆成人av在线观看| 日本 欧美在线| 国产精品1区2区在线观看.| 欧美黑人巨大hd| 国产精品98久久久久久宅男小说| 午夜老司机福利剧场| 女同久久另类99精品国产91| 青草久久国产| ponron亚洲| 1024手机看黄色片| 国产高清视频在线播放一区| 非洲黑人性xxxx精品又粗又长| 亚洲专区中文字幕在线| 一级作爱视频免费观看| 在线观看av片永久免费下载| 在线免费观看不下载黄p国产 | 亚洲av日韩精品久久久久久密| 日日夜夜操网爽| 成年女人永久免费观看视频| 亚洲国产日韩欧美精品在线观看| 亚洲性夜色夜夜综合| 韩国av一区二区三区四区| 极品教师在线免费播放| 特级一级黄色大片| 99国产综合亚洲精品| 日日摸夜夜添夜夜添av毛片 | 久久精品国产99精品国产亚洲性色| 亚洲真实伦在线观看| 美女高潮的动态| 美女大奶头视频| 成年女人毛片免费观看观看9| 日韩欧美精品v在线| 成人鲁丝片一二三区免费| 午夜影院日韩av| 国产v大片淫在线免费观看| 成人三级黄色视频| 日韩欧美在线二视频| 久久99热这里只有精品18| 午夜久久久久精精品| 亚洲自偷自拍三级| 日日摸夜夜添夜夜添小说| 国产一区二区三区在线臀色熟女| 国产探花极品一区二区| 免费搜索国产男女视频| 午夜两性在线视频| 国产成人aa在线观看| 嫩草影视91久久| 久久99热6这里只有精品| 色在线成人网| 一卡2卡三卡四卡精品乱码亚洲| 久久精品夜夜夜夜夜久久蜜豆| 日韩欧美国产在线观看| 长腿黑丝高跟| 在线播放无遮挡| 少妇裸体淫交视频免费看高清| 欧美激情久久久久久爽电影| 午夜福利在线观看吧| 在线天堂最新版资源| 好男人在线观看高清免费视频| 亚洲专区中文字幕在线| 亚洲av.av天堂| 好男人在线观看高清免费视频| 日韩免费av在线播放| 国产成人av教育| 久久人人精品亚洲av| 午夜福利成人在线免费观看| 国产精品一及| 丁香六月欧美| 午夜亚洲福利在线播放| 变态另类成人亚洲欧美熟女| 99在线视频只有这里精品首页| 国产精品久久久久久亚洲av鲁大| 极品教师在线视频| 日韩欧美一区二区三区在线观看| 成人一区二区视频在线观看| 国产一区二区三区在线臀色熟女| 久久久久国产精品人妻aⅴ院| 夜夜爽天天搞| av在线蜜桃| 一级黄片播放器| 97人妻精品一区二区三区麻豆| 国产单亲对白刺激| 国产高清激情床上av| 观看免费一级毛片| 欧美精品国产亚洲| 中文资源天堂在线| 色播亚洲综合网| 日本黄大片高清| 简卡轻食公司| 成人三级黄色视频| 中文在线观看免费www的网站| 少妇的逼好多水| 在线观看舔阴道视频| 69av精品久久久久久| 国产精品亚洲一级av第二区| 无人区码免费观看不卡| 亚洲精品日韩av片在线观看| 中文在线观看免费www的网站| 国产黄a三级三级三级人| 欧美激情国产日韩精品一区| 一边摸一边抽搐一进一小说| 亚洲电影在线观看av| 亚洲欧美激情综合另类| 国产主播在线观看一区二区| 脱女人内裤的视频| 国产精品自产拍在线观看55亚洲| h日本视频在线播放| 久久午夜亚洲精品久久| 嫩草影视91久久| 精品午夜福利视频在线观看一区| 一进一出好大好爽视频| 丁香六月欧美| а√天堂www在线а√下载| 在线播放无遮挡| 午夜福利免费观看在线| 久久久久国产精品人妻aⅴ院| 男插女下体视频免费在线播放| 国语自产精品视频在线第100页| 偷拍熟女少妇极品色| 黄色一级大片看看| 日韩亚洲欧美综合| 日韩欧美精品v在线| 级片在线观看| 国产三级黄色录像| 亚洲色图av天堂| 国产欧美日韩一区二区精品| 亚洲自拍偷在线| 又爽又黄a免费视频| 国产三级黄色录像| 又黄又爽又免费观看的视频| 精品一区二区三区视频在线| 深夜a级毛片| 乱码一卡2卡4卡精品| 欧美日韩中文字幕国产精品一区二区三区| 成年版毛片免费区| 精品一区二区三区视频在线| www日本黄色视频网| 欧美一级a爱片免费观看看| 超碰av人人做人人爽久久| 中文亚洲av片在线观看爽| 午夜激情欧美在线| 色综合亚洲欧美另类图片| 波多野结衣巨乳人妻| 欧美在线一区亚洲| 久久热精品热| 精品一区二区三区视频在线| 亚洲真实伦在线观看| 日韩欧美国产在线观看| a级毛片a级免费在线| 精品福利观看| 在线免费观看不下载黄p国产 | 高清毛片免费观看视频网站| 午夜福利在线在线| 国产aⅴ精品一区二区三区波| 舔av片在线| 午夜两性在线视频| 国产精品亚洲av一区麻豆| 色吧在线观看| 国产免费男女视频| 久9热在线精品视频| 国产不卡一卡二| 日日摸夜夜添夜夜添小说| 老鸭窝网址在线观看| 国产三级中文精品| 午夜久久久久精精品| 免费看美女性在线毛片视频| 欧美日韩黄片免| 老司机福利观看| 亚洲内射少妇av| 国语自产精品视频在线第100页| 热99re8久久精品国产| 一进一出好大好爽视频| 亚洲一区二区三区不卡视频| 午夜老司机福利剧场| 自拍偷自拍亚洲精品老妇| 亚洲av成人精品一区久久| 国产高清有码在线观看视频| 在线观看av片永久免费下载| 高清在线国产一区| 久久久精品欧美日韩精品| 国产精品久久久久久久电影| 成人鲁丝片一二三区免费| 波多野结衣高清作品| 在线十欧美十亚洲十日本专区| 久99久视频精品免费| 丰满的人妻完整版| 成人永久免费在线观看视频| 国产欧美日韩一区二区精品| 日本 av在线| 国产亚洲精品综合一区在线观看| 十八禁人妻一区二区| 成人三级黄色视频| 美女被艹到高潮喷水动态| 午夜福利在线观看吧| 欧美一区二区精品小视频在线| 99久久精品国产亚洲精品| 精华霜和精华液先用哪个| 国产 一区 欧美 日韩| 欧美日韩中文字幕国产精品一区二区三区| 欧美丝袜亚洲另类 | 色综合欧美亚洲国产小说| 日本五十路高清| 中出人妻视频一区二区| 最新中文字幕久久久久| 国产在视频线在精品| 亚洲精品粉嫩美女一区| 国产午夜精品论理片| 老鸭窝网址在线观看| 波野结衣二区三区在线| 精品欧美国产一区二区三| 亚洲中文字幕一区二区三区有码在线看| 久久6这里有精品| 免费无遮挡裸体视频| 一本久久中文字幕| 91字幕亚洲| 精品午夜福利视频在线观看一区| 国产精品免费一区二区三区在线| 小蜜桃在线观看免费完整版高清| 51午夜福利影视在线观看| .国产精品久久| 亚洲人成电影免费在线| 国产av在哪里看| 亚洲久久久久久中文字幕| 国产精品一及| 老女人水多毛片| 有码 亚洲区| 搡老熟女国产l中国老女人| 99国产精品一区二区蜜桃av| 网址你懂的国产日韩在线|