免费国产一级毛卡片视频app

    1. <form id=HNqrReUUs><nobr id=HNqrReUUs></nobr></form>
      <address id=HNqrReUUs><nobr id=HNqrReUUs><nobr id=HNqrReUUs></nobr></nobr></address>

      Personal tools

      fips-185-clipper-feb-94.html

      RIN 0693-AB19

      免费国产一级毛卡片视频app

      1. <form id=HNqrReUUs><nobr id=HNqrReUUs></nobr></form>
        <address id=HNqrReUUs><nobr id=HNqrReUUs><nobr id=HNqrReUUs></nobr></nobr></address>

        Approval of Federal Information Processing Standards Publication 185, Escrowed Encryption Standard (EES): 59 FR 5997


        FEDERAL REGISTER
        VOL. 59, No. 27

        Notices

        DEPARTMENT OF COMMERCE (DOC)
        National Institute of Standards and Technology (NIST)

        RIN 0693-AB19
        Approval of Federal Information Processing Standards Publication 185,
        Escrowed Encryption Standard (EES)

        59 FR 5997

        February 9, 1994

        ACTION: The purpose of this notice is to announce that the Secretary of Commerce has approved a new standard, which will be published as FIPS Publication 185, Escrowed Encryption Standard.

        SUMMARY: On July 30, 1993, notice was published in the Federal Register (58 FR 40791) that a Federal Information Processing Standard for EES was being proposed for Federal use. The written comments submitted by interested parties and other material available to the Department relevant to this standard were reviewed by NIST. On the basis of this review, NIST recommended that the Secretary approve the standard as a Federal Information Processing Standards Publication and prepared a detailed justification document for the Secretary's review in support of that recommendation. The detailed justification document which was presented to the Secretary is part of the public record and is available for inspection and copying in the Department's Central Reference and Records Inspection Facility, room 6020, Herbert C. Hoover Building, 14th Street between Pennsylvania and Constitution Avenues, NW., Washington DC 20230.

        This FIPS contains two sections: (1) An announcement section, which provides information concerning the applicability, implementation, and maintenance of the standard; and (2) a specifications section which deals with the technical requirements of the standard. Both sections of the standard are provided in this notice.

        EFFECTIVE DATE: This standard is effective March 11, 1994.

        ADDRESSES: Interested parties may purchase copies of this standard, including the technical specifications section, from the National Technical Information Service (NTIS). Specific ordering information from NTIS for this standard is set out in the "Where to Obtain Copies" section of the announcement section of the standards.

        FOR FURTHER INFORMATION CONTACT: Michael R. Rubin, Deputy Chief Counsel for the National Institute of Standards and Technology, (301) 975-2803, room A1111, Administration Building, National Institute of Standards and Technology, Gaithersburg, MD 20899.

        SUPPLEMENTARY INFORMATION: This standard specifies a technology developed by the Federal government to provide strong encryption protection for unclassified information and to provide that the keys used in the encryption and decryption processes are escrowed. This latter feature will assist law enforcement and other government agencies, under the proper legal authority, in the collection and decryption of electronically transmitted information. The encryption technology will be implemented in electronic devices.

        The purpose of this standard is to facilitate the acquisition of devices that implement escrowed encryption techniques by Federal government agencies. This standard does not mandate the use of escrowed encryption devices by Federal government agencies, the private sector or other levels of government. The use of such devices is totally voluntary. The standard provides a mechanism for Federal government agencies to use when they wish to specify key escrowed encryption as a requirement in their acquisition documents. Otherwise agencies would have to formally waive the requirements of the recently reaffirmed encryption standard, FIPS 46-2, Data Encryption Standard, if they wanted to use escrowed encryption techniques.

        Key escrow technology was developed to address the concern that widespread use of encryption makes lawfully authorized electronic surveillance difficult. In the past, law enforcement authorities have encountered very little encryption because of the expense and difficulty in using this technology. More recently, however, lower cost, commercial encryption technology has become available for use by U.S. industry and private citizens. The key escrow technology provided by this standard addresses the needs of the private sector for top notch communications security, and of U.S. law enforcement to conduct lawfully authorized electronic surveillance.

        Analysis of Comments

        This FIPS was announced in the Federal Register (58 FR 40791 dated July 30, 1993) and was also sent to Federal agencies for review. Comments were received from 22 government organizations in the United States, 22 industry organizations and 276 individuals. Of the 298 comments received from industry organizations and from individuals, 225 were forwarded to NIST by the Electronic Frontier Foundation which had collected them as electronic mail messages.

        The Federal government organizations submitting comments included 11 Cabinet departments and 11 other Federal organizations. The 22 industry organizations included several large computer industry organizations, 4 trade associations, 2 professional societies, and several smaller computer industry organizations. The individuals submitting comments included computer systems, networks and software professionals; consultants; professionals affiliated with universities and colleges; students; and many individuals who did not identify their professions.

        Comments were grouped for the purpose of this analysis in the following major categories:

        A. General comments concerning key escrow encryption;

        B. Other general comments;

        C. Patent infringement allegations;

        D. Economic comments on the standard, including its potential cost to Federal agencies and private organizations that adopt it, and the effect that the standard may have upon the competitiveness of U.S. firms in domestic and world markets; and,

        E. Comments on the technical operation of the standard.

        Each of these matters is discussed in turn below.

        A. General Comments Concerning Key Escrow

        Nearly all of the comments received from industry and individuals opposed the adoption of the standard, raising concerns about a variety of issues including privacy; the use of a secret algorithm; the security of the technology; restrictions on software implementation; impact on competitiveness; and lack of procedures for escrowing keys. Over 80 percent of the industry and individual responses repeated the following points which were also made by the Electronic Frontier Foundation:

        (1) Five industry organizations and 200 individuals said that guarantees are needed to assure that this standard is not a first step toward prohibition against other forms of encryption. In response, NIST notes that the standard is a specification for voluntary use by the Federal government in the acquisition of devices for escrowed encryption. There is no requirement that the public use this standard. Further, the Administration has announced that it will not propose new legislation to limit the use of encryption technology.

        (2) Three industry organizations and 164 individuals said that there had been insufficient technical and operational information available to allow full public comment. Also, seven Federal government organizations, 19 industry organizations, and 213 individuals expressed concern that the details of the escrowed encryption system had not been announced when the FIPS was proposed. Other related concerns included: the escrow agents have not been identified; the operating procedures are unclear; the system will not be secure if the keys are not protected; the system must allow for enforcement of expiration of wiretap authority. One member of the NIST Computer Privacy and Security Advisory Board stated that the notice was "content-free".

        In response, NIST notes that the standard is a technical one, for implementation in electronic devices and use in protection of certain unclassified government communications when such protection is required. It adopts encryption technology developed by the Federal government to provide strong protection for unclassified information and to enable the keys used in the encryption and decryption processes to be escrowed. The technical aspects of the Escrowed Encryption Standard have been set forth in detail, and the classified algorithm has been examined by independent experts.

        The responsibility for designation of the key component escrow agents lies with the Attorney General, rather than the Secretary of Commerce. In addition, the Attorney General is charged with reviewing for legal sufficiency the procedures by which an agency establishes its authority to acquire the content of communications encrypted with electronic devices using the Escrowed Encryption Standard. Designation of the key component escrow agents, and approval of procedures for acquisition of key components to facilitate decryption of communications, are separate from the establishment of the technical parameters of this standard. Necessarily, protection of the information encrypted by use of the Escrowed Encryption Standard requires that the key components and other aspects of the system be accorded strict security. Procedures to provide strict security in the programming, storage, and transmission of key components have been developed; however, the security procedures for the key components are beyond the scope of this rule.

        Even were the identity of the key component escrow agents, or the procedures under which escrowed key components will be maintained and released for use in conjunction with lawfully authorized interceptions relevant to the technical standards established in the instant rule, the Department of Commerce has found, consistent with 5 U.S.C. 553(b)(B), that notice and public procedure thereon is unnecessary. The technical aspects of the Escrowed Encryption Standard themselves, coupled with the strength of the algorithm and the privacy protections afforded by the Constitution and relevant statutes, afford adequate assurance of the efficacy of the standard for the protection of sensitive unclassified Federal government information, without the need for specifying the identities of key component escrow agents or detailing the procedures respecting maintenance or release of key components.

        (3) One Federal government organization, 10 industry organizations, and 199 individuals were concerned that the escrowed encryption system may infringe on individual rights. Some said that the government cannot act as an independent escrow agent. One industry organization and 6 individuals said that the government cannot be trusted to run the escrow system.

        The technical capabilities afforded by the Escrowed Encryption Standard permit protection of certain sensitive, but unclassified Federal government information at a level far stronger than that of the Data Encryption Standard, while at the same time permitting decryption of communications in conjunction with electronic surveillance when authorized by law. These comments address policy issues separate from the technical aspects of the Escrowed Encryption Standard established herein. The technical benefits accruing to a Federal government system using the Escrowed Encryption Standard are independent of the identity of the entities serving as key component escrow agents.

        With respect to the suggestions that the system may infringe individual rights, the purpose of the escrowing of key components is to permit decryption only in those circumstances in which interception of communications is lawfully authorized, consistent with the Constitution and relevant statutes. To this end, the Attorney General is to review for legal sufficiency the procedures by which an agency establishes its authority to acquire the contents of such communications. The Department of Justice has assured NIST, therefore, that the Escrowed Encryption Standard is fully consistent with protection of individual privacy rights.

        (4) Fifteen industry organizations and 193 individuals were concerned that the standard uses a secret algorithm. Some said that since the algorithm is secret, it is not possible to evaluate it. Some said that the algorithm is flawed and is subject to compromise. Two individuals said that the algorithm has severe technical problems, and that the algorithm for generating the unit keys is too predictable. One individual said that in addition to possible decryption via escrowed keys, the algorithm has a back door. Others said that people will not use encryption that they cannot trust, and that the risks of using the EES have not been assessed. One government organization, two industry organizations and 7 individuals said that the technology will not be accepted internationally if the algorithm is not known.

        The algorithm was developed originally as a classified algorithm for the U.S. Government to provide highly effective communications security. It is still used for that purpose. There are no trap doors or any known weaknesses in it. A classified algorithm is essential to the effectiveness of the key escrow solution. The use of a classified algorithm assures that no one can produce devices that use the algorithm without the key escrow feature and thereby frustrate the ability of government agencies to acquire the content of communications encrypted with the algorithm, in conjunction with lawfully authorized interception. NIST finds that, because the algorithm needs to remain secret in order to preserve the utility of the key escrow feature, it would be neither practicable nor in the public interest to publish the algorithm.

        (5) Eight industry organizations and 181 individuals said that it was premature to adopt the EES as a standard until policy decisions on encryption are made.

        The Federal government is committed to protection of sensitive information of all kinds, particularly sensitive, but unclassified information outside the scope of the Warner Amendment. The Escrowed Encryption Standard gives Federal managers the ability to afford their agencies' sensitive but unclassified information protection substantially stronger than possible with the Data Encryption Standard. This standard permits, but does not mandate, the use of the Escrowed Encryption Standard by Federal managers; it in no way mandates use of the standard outside the Federal government. Issuance of the standard at this time is fully consistent with the President's Directive on encryption management.

        B. Other General Comments

        Twelve individuals questioned the role of the National Security Agency in the development of the standard. In response, NIST notes that NSA, because of its expertise in the field of cryptography and its statutory role as a technical advisor to U.S. government agencies concerning the use of secure communications, developed the technical basis for the standard which allows for the widespread use of encryption technology while affording law enforcement the capability to access encrypted communications under lawfully authorized conditions. NSA worked in cooperation with the Department of Justice, the FBI and NIST to develop the escrowed encryption standard.

        Seven individuals said that there is other technology available for protecting information that is more cost effective and that the EES is not the best solution for the problems identified. NIST notes that use of the standard is voluntary. The standard states that a risk analysis should be performed to determine potential threats and risk and that the costs of providing encryption using this standard as well as alternative methods and their respective costs should be projected. A decision to use this standard should be based on the risk and cost analyses.

        One individual said that the government should not broaden its access to private communications. NIST notes that the standard does not broaden access to private communications, Access must be legally authorized.

        One government organization, 4 industry organizations and 28 individuals said that the standard hinders security of information and will not help law enforcement activities. NIST responds that, as noted in the President's directive on "Public Encryption Management," new communications technology can frustrate lawful government electronic surveillance and, when exported abroad, thwart foreign intelligence activities critical to our national interests. The Escrowed Encryption Standard provides substantially stronger encryption protection than is currently available under the Data Encryption Standard, and its implementation in hardware is expected to permit ease and transparency of use. It is anticipated that security will be enhanced by the combination of robust encryption with technology easily usable even in circumstances that have not, in the past, readily lent themselves to encryption. The Escrowed Encryption Standard permits the protection of sensitive information with strong encryption, while at the same time permitting protection of the public safety by decryption in conjunction with lawfully authorized electronic surveillance. The key escrowing technique in this standard will allow the government to gain access to encrypted information only with appropriate legal authorization.

        Four industry organizations and 17 individuals said that the standard does not respond to any user requirement. NIST responds that the standard provides substantially stronger protection for sensitive, but unclassified Federal government information than is currently available under the DATA Encryption Standard. Moreover, the standard permit law enforcement entities to protect the public safety by gaining access to encrypted information in conjunction with lawfully authorized electronic surveillance.

        One industry organization and 20 individuals said that it is unlikely that people engaged in illegal activities will use the standard. NIST notes that the Administration has chosen to encourage the widespread use of key escrow devices to make strong encryption broadly available and affordable.

        One individual said that the key escrow program will be funded by asset forfeiture and therefore will not be subject to Congressional review. The Federal government will acquire a number of key escrow-equipped devices, for some of which funds from the Department of Justice Asset Forfeiture Super Surplus Fund will be utilized. NIST notes that the asset forfeiture program is subject to Congressional review and oversight, and to General Accounting Office reviews and audits, if requested by the Congress. There are, however, no plans to use asset forfeiture funds for other aspects of the key-escrow encryption system.

        One industry organization stated that the applicability of the standard should be limited to telephony. NIST notes that the standard is applicable to voice, facsimile, and computer information communicated in a telephone system.

        One industry organization said that the recommended FIPS deviates from the FIPS process. In response, NIST notes that it uses a variety of methods to develop needed standards, including working closely with other Federal agencies as mandated by the Computer Security Act of 1987. NIST followed its usual procedures in announcing the proposed standard and soliciting comments from government and private sector organizations, as well as from interested members of the public. All comments received to the Federal Register notice announcing the proposed standard have been made part of the public record and are available for inspection and copying at the Central Reference and Records Inspection Facility in the Department of Commerce. The justification document which was presented to the Secretary of Commerce is part of the public record as well.

        C. Patent Infringement Allegations

        In addition to the above comments, NIST has received two allegations of patent infringement for the key escrow technology adopted by the EES. The first allegation was from the older of an issued patent, the second was from an inventor who had recently filed a patent application with the Patent and Trademark Office. Also, one government organization observed that the patent status of the EES is not clear and may result in cost impacts due to payment of royalties, should EES be found to infringe upon any privately held patent. Based upon information received to date, NIST has not been persuaded that any patent of which it is aware will lead to a successful claim against any use of the EES, including U.S. Government users, for payment of royalties. An infringement study was conducted upon the first infringement allegation, with the result that no infringement was found. When the patent relevant to the second allegation was issued in January of this year, an infringement study was begun on that patent.

        D. Economic Effects of the Standard

        Public comments were received on three economic aspects of the proposed standard, including concerns about the cost to the government and the private sector of implementing the standard; the effect of the standard upon the competitiveness of U.S. software firms in world markets; and suggestions that the government has bestowed an unfair economic benefit upon the contractor that has been selected to manufacture the escrow encryption semiconductor chips that are called for in the standard. Each of these matters is addressed in turn below.

        1. Costs

        A number of comments were received concerning the possible cost of implementing the Escrowed Encryption Standard. Thus, one government agency, two industry organizations and nine individuals expressed concern about the cost of administration of the escrow database, or about the cost, availability, implementation and maintenance of the equipment needed to support the standard. Indeed, one Federal organization said that it did not support the standard because there would be an adverse impact if the organization had to replace or modify its current equipment. An industry organization suggested that the standard would impose costs on the private sector if private parties need to use the standard to communicate with the government.

        NIST estimates the cost of establishing the escrow system to be approximately $ 14 million. The cost of operating the key escrow facility is estimated to be $ 16 million annually.

        These costs figures are based upon a number of factors. NIST notes that use of the standard is voluntary for Federal agencies, and that agencies are not required to implement it. Agencies will determine whether to use this standard based on their analyses of the risk of unauthorized disclosure of their sensitive data and the cost of using this standard to protect the data. NIST does not expect the wholesale replacement of the current base of equipment that conforms to FIPS 46-2, Data Encryption Standard. Rather, the implementation of this standard appears most likely to occur as the Federal government replaces old and obsolete equipment. NIST believes that as the Federal government replaces old and obsolete equipment, the additional costs of implementing this standard in electronic devices will prove to be negligible compared to the costs of equivalent encryption protection which would be implemented in encryption devices which do not comply with this standard.

        NIST also notes that the standard has no direct applicability to entities that do not operate Federal computer systems. Thus, businesses, universities and other nonprofit organizations and individual citizens are free to use products that conform to the standard, or to ignore the standard if they see fit.

        2. Competitiveness

        Eight industry organizations and 28 individuals said that the standard will reduce the competitiveness of U.S. computer hardware and software companies in foreign markets. NIST notes that approval of the Escrowed Encryption Standard will not prevent U.S. manufacturers from making other encryption products for the private sector. While export controls may affect the sales of U.S. encryption products abroad, key escrow products are already exportable to U.S. industry and individuals operating abroad in accordance with proper export licensing through the Department of State. Further, a comprehensive policy review on commercial encryption is now underway by the Administration. This review will consider, among other topics, broader export options for key escrow products. Again, approval of the Escrowed Encryption Standard for broader export will not restrict exports of other encryption products. The overseas market for these products will depend on a variety of factors including any restrictions other countries place on imports of encryption technology.

        3. Unfair Competitive Advantage

        One industry organization and two individuals said that the standard gives an economic advantage to the one company that has been selected by the Government to date to manufacture semiconductor chips which conform to this standard. NIST notes that the company that designed the microcircuit was selected because of its expertise in design of custom cryptographic chips, its secure facilities, and employment of cleared personnel. The company that developed the microcircuit was selected for its technological capabilities to fabricate microcircuits resistant to reverse engineering. Other manufacturers that wish to enter the market and can satisfy the technology and security requirements will be approved to manufacture the microcircuits.

        E. Technical Recommendations and Editorial Changes

        A wide range of technical issues were raised in the public comment process. Each issue, and a NIST response follows below.

        Four industry organizations and 7 individuals said that the required hardware implementation of the escrowed encryption standard was not optimum. Software implementation would be more useful and cost effective. NIST notes that because software is easy to change, secure software implementations of the key escrow technique have been difficult to devise. On August 24, 1993 (58 FR 44662) NIST invited the participation of the software industry in cooperative efforts to meet this challenge. Several organizations have indicated that they wish to collaborate with NIST in this area. NIST will try to establish cooperative partnerships to investigate the implementation of the EES in software.

        Three Federal government organizations and one individual said that applicability of the standard should not be restrictive, and that it should allow for other applications and data rates. NIST notes that the scope of applicability was established to address the immediate need for improved telephone security while preserving the law enforcement capability of decrypting intercepted telecommunications that have been lawfully authorized. Use of the standard is voluntary. Use of the standard for other purposes is not prohibited in the standard.

        One individual stated that the standard should require two or more escrow agents and that the standard should state that all the components of the device unique key are independent and all are needed to form the key. A change was made to state that the Device Unique Key shall be composed of two components (each 80 bits long) and each component shall be independently generated and stored by an escrow agent. This change provides for the two escrow agents envisioned by the Department of Justice, and two key components, each 80 bits long.

        One individual said that the name of Device Identifier (DID) should be device Unique Identifier (UID). Since DID is used elsewhere for another purpose, NIST changed the name of Device Identifier (DID) to device Unique Identifier (UID).

        One individual said that the standard should provide for access to both sides of a real-time conversation. NIST notes that if the two keys are different, either a law enforcement official must obtain a court order for both parties of a two-day communication or it can only decrypt one part of a conversation. Therefore, the standard was changed to state that the session key used to encrypt transmitted information shall be the same as the session key used to decrypt received information in a two-way simultaneous communication.

        One industry organization said that the standard should specify a register for Leaf Creation Methods. NIST changed the standard to state that the Leaf Creation Method (LCM) shall be registered in the NIST Computer Security Object Register (e.g., LCM-1). Additional LCM's may be created in the future.

        One industry organization said that the Cryptographic Protocol Field (CPF) has not been defined and should be removed from the standard since it is an incomplete specification. NIST changed the standard to state that the Cryptographic Protocol Field (CPF) shall be registered in the NIST Computer Security Object Register. This will enable the details on the CPF to be formalized later.

        Four Federal government organizations and two individuals said that the standard is not an interoperability standard, that it does not specify parameter lengths and formats and placement in communications, and that the standard provides insufficient technical information for implementation. NIST added information to the standard to explain that it is not an interoperability standard. It does not provide sufficient information to design and implement a security device or equipment. Other specifications and standards will be required to assure interoperability of EES devices in various applications. Specifications of a particular EES device must be obtained from the manufacturer in order to use it in an application.

        One industry commenter said that the standard should specify a register of family keys, such as "FBI Family Key 1," to provide some assurance of interoperability. NIST changed the standard to state that the family key shall have an identifier (KF-ID). The identifier of a family key shall be registered in the NIST Computer Security Object Register. As a result, if more than one family key exists (reasonable assumption), it should be identified so that law enforcement agencies can decrypt the LEAF.

        One industry organization and one individual stated that the standard should reference technical specifications explicity (even if they are classified). NIST changed the standard to provide specific information on how to obtain the technical specifications for the SKIPJACK algorithm and the LEAF Creation Method 1.

        One industry organization said that parameters (input, output, status, errors) are not specified in the standard, and that diversity of sources of implementations cannot be established. NIST notes that various devices meeting this standard are anticipated. Therefore, the implementations will depend on a number of factors, including physical, electrical and application requirements.

        One industry organization said that the standard should state that DID is transmitted in the LEAF. NIST notes that the standard does state this.

        One individual said that the reverse engineering protection for the algorithm is not prefect. NIST notes that the standard specifies that the encryption algorithm and the LEAF creation method shall be implemented in electronic devices highly resistant to reverse engineering. It does not specify how the reverse engineering is to be prevented (or deterred). It also does not specify a metric for measuring the prevention (or deterrence). These are difficult to quantify and to specify and depend greatly on the implementation. A study is being performed to evaluate the protection provided by one of the current implementations of the standard (MYK-78). Estimates of the protection provided are 1-4 years of protection against attacks by specialized laboratories investing $ 1M to $ 4M.

        One industry organization stated that 2**80 keys is sufficient for session key, but it is not sufficient for lifetime keys (family and unique keys). NIST notes that the length of the family key and the device unique key are presently 80 bits for the SKIPJACK algorithm. The session key is also 80 bits. While the security lifetime of a session key is normally much shorter than the security lifetime of a master key (also called Key Encrypting Key), it is convenient to use keys of the same length for all purposes. Present implementations of the EES use one length key for all three types of keys (i.e., 80 bits). This is expected to be sufficiently long for unclassified data encryption for many years. However, the length of the family key and device unique key can be increased in future implementations and future LEAF creation methods. Some provisions for these have been made in the standard.

        One industry organization was concerned that disclosure of the Device Unique Key could allow decryption of ALL information ever encrypted with that device (all past and all future), and that this condition could technically be prevented. NIST believes that key escrow procedures intended to administratively control the use of the device Unique Key are outside the scope of standard. Technical controls were not included in the initial design of the MYK-78 but could be added in future designs.

        One individual was concerned that two party control is not truly implemented in the "chip." NIST acknowledges that two party control was not in the original design criteria of the chip. Administrative controls are to be used to assure two party control for present design. This two party control feature could be added to future designs.

        One individual said that one "tamperproofing session" is supported by the Mykotronics implementation of the EES. However, the second escrow agent entering a key could read first escrow agent's key and hence have both keys. NIST notes that the present method of reverse engineering protection provides for one "programming session" in which device unique parameters are put into the device. The parameters are "locked" after being entered and verified. The present technology allows this to be done only once. Other technologies may be developed which allow two or more independed "program sessions" which prevent reading of previously entered parameters while other parameters are being entered. Future implementations may be have this feature but such requirements at the present time are outside the scope of this standard.

        One industry organization recommended that the following should be put into the standard: "The Session Key (80 bits) shall be encrypted with the device Unique Key. The encrypted Session Key is concatenated with the Device Identifier (DID) (xx bits) and the Escrow Authenticator (EA) (yy bits). This result is then encrypted with the Family Key to generate a 128 bit LEAF. The 128 bit LEAF along with a 64 bit Initialization Vector shall be transmitted with the cipher text." NIST acknowledges that this is a general description of the LEAF creation method specified in this standard. The complete specifications are classified. Classified specifications must be obtained in order to implement the standards. Users of devices meeting this standard do not need to know the specifics of the LEAF creation method in order to use security devices meeting this standard. There is, therefore, no purpose in providing this general specification in the standard.

        One industry organization recommended that Modes of Operation be developed for the EES, including Counter Addressing or Long Cycle Mode, and that the LFSR should be included. NIST notes that four modes of operation are specified in FIPS-81. Subsets of these four modes are specified in the EES. Other subsets are implemented in various devices implementing this standard. For example, the Output Feedback (OFB) mode is implemented in the MYK-78T while all subsets specified in the standard are implemented in the MYK-80. The Linear Feedback Shift Register (LFSR) mode has been used in some devices but was not included in the Modes of Operation for DES. OFB can be used in the same applications. National security interests were considered when selecting the modes of operation.

        One industry organization said that the standard should state length of Family Key. NIST notes that the length of the family key (80 bits) may increase in future implementations, and therefore flexibility is needed in the standard.

        Dated: February 4, 1994.

        Samuel Kramer,
        Associate Director.


        Federal Information Processing Standards Publication 185

        Announcing the Escrowed Encryption Standard (EES)

        Federal Information Processing Standards Publications (FIPS PUBS) are issued by the National Institute of Standards and Technology (NIST) after approval by the Secretary of Commerce pursuant to section 111(d) of the Federal Property and Administrative Services Act of 1949 as amended by the Computer Security Act of 1987, Public Law 100-235.

        Name of Standard: Escrowed Encryption Standard (EES).

        Category of Standard: Telecommunications Security.

        Explanation: This Standard specifies use of a symmetric-key encryption (and decryption) algorithm (SKIPJACK) and a Law Enforcement Access Field (LEAF) creation method (one part of a key escrow system) which provides for decryption of encrypted telecommunications when interception of the telecommunications is lawfully authorized. Both the SKIPJACK algorithm and the LEAF creation method are to be implemented in electronic devices (e.g., very large scale integration chips). The devices may be incorporated in security equipment used to encrypt (and decrypt) sensitive unclassified telecommunications data. Decryption of lawfully intercepted telecommunications may be achieved through the acquisition and use of the LEAF, the decryption algorithm and the two escrowed key components.

        One definition of "escrow" means that something (e.g., a document, an encryption key) is "delivered to a third person to be given to the grantee only upon the fulfillment of a condition" (Webster's Seventh New Collegiate Dictionary). The term, "escrow", for purposes of this standard, is restricted to this dictionary definition.

        A key escrow system, for purposes of this standard, is one that entrusts the two components comprising a cryptographic key (e.g., a device unique key) to two key component holders (also called "escrow agents"). In accordance with the above definition of "escrow", the key component holders provide the components of a key to a "grantee" (e.g., a law enforcement official) only upon fulfillment of the condition that the grantee has properly demonstrated legal authorization to conduct electronic surveillance of telecommunications which are encrypted using the specific device whose device unique key is being requested. The key components obtained through this process are then used by the grantee to reconstruct the device unique key and obtain the session key which is then used to decrypt the telecommunications that are encrypted with that session key.

        The SKIPJACK encryption/decryption algorithm has been approved for government applications requiring encryption of sensitive but unclassified data telecommunications as defined herein. The specific operations of the SKIPJACK algorithm and the LEAF creation method are classified and hence are referenced, but not specified, in this standard.

        Data for purposes of this standard includes voice, facsimile and computer information communicated in a telephone system. A telephone system for purposes of this standard is limited to a system which is circuit switched and operating at data rates of standard commercial modems over analog voice circuits or which uses basic-rate ISDN or a similar grade wireless service.

        Data that is considered sensitive by a responsible authority should be encrypted if it is vulnerable to unauthorized disclosure during telecommunications. A risk analysis should be performed under the direction of a responsible authority to determine potential threats and risks. The costs of providing encryption using this standard as well as alternative methods and their respective costs should be projected. A responsible authority should then make a decision, based on the risk and cost analyses, whether or not to use encryption and then whether or not to use this standard.

        Approving Authority: Secretary of Commerce.

        Maintenance Agency: Department of Commerce, National Institute of Standards and Technology.

        Applicability: This standard is applicable to all Federal departments and agencies and their contractors under the conditions specified below. This standard may be used in designing and implementing security products and systems, which Federal departments and agencies use or operate or which are operated for them under contract. These products may be used when replacing Type II and Type III (DES) encryption devices and products owned by the government and government contractors.

        This standard may be used when the following conditions apply:

        1. An authorized official or manager responsible for data security or the security of a computer system decides that encryption is required and cost justified as per OMB Circular A-130; and

        2. The data is not classified according to Executive Order 12356, entitled "National Security Information," or to its successor orders, or to the Atomic Energy Act of 1954, as amended.

        However, Federal departments or agencies which use encryption devices for protecting data that is classified according to either of these acts may use those devices also for protecting unclassified data in lieu of this standard.

        In addition, this standard may be adopted and used by non-Federal Government organizations. Such use is encouraged when it provides the desired security.

        Applications: This standard may be used in any unclassified government and commercial communications. Use of devices conforming to this standard is voluntary for unclassified government applications and for commercial security applications.

        Implementations: The encryption/decryption algorithm and the LEAF creation method shall be implemented in electronic devices (e.g., electronic chip packages) which are protected against unauthorized entry, modification and reverse engineering. Implementations which are tested and validated by NIST will be considered as complying with this standard. An electronic device shall be incorporated into a cryptographic module in accordance with FIPS 140-1. NIST will test for conformance with FIPS 140-1. Conforming cryptographic modules can then be integrated into security equipment for sale and use in a security application. Information about devices that have been validated, procedures for testing equipment for conformance with NIST standards, and information about approved security equipment are available from the Computer Systems Laboratory, NIST, Gaithersburg, MD 20899.

        Export Control: Implementations of this standard are subject to Federal Government export controls as specified in Title 22, Code of Federal Regulations, Parts 120 through 131 (International Traffic of Arms Regulations-ITAR). Exporters of encryption devices, equipment and technical data are advised to contact the U.S. Department of State, Office of Defense Trade Controls for more information.

        Patents: Implementations of this standard may be covered by U.S. and foreign patents.

        Implementation Schedule: This standard becomes effective thirty days following publication of this FIPS PUB.

        Specifications: Federal Information Processing Standard (FIPS 185), Escrowed Encryption Standard (EES) (affixed).

        Cross Index

        a. FIPS PUB 46-2, Data Encryption Standard.

        b. FIPS PUB 81, Modes of Operation of the DES.

        c. FIPS PUB 140-1, Security Requirements for Cryptographic Modules.

        Glossary

        The following terms are used as defined below for purposes of this standard:

        Data-Unclassified voice, facsimile and computer information communicated over a telephone system.

        Decryption-Conversion of ciphertext to plaintext through the use of a cryptographic algorithm.

        Device (cryptographic)-An electronic implementation of the encryption/decryption algorithm and the LEAF creation method as specified in this standard.

        Digital data-Data that have been converted to a binary representation.

        Encryption-Conversion of plaintext to ciphertext through the use of a cryptographic algorithm.

        Key components-The two values from which a key can be derived (e.g., KU, + KU sub 2).

        Key escrow-The processes of managing (e.g., generating, storing, transferring, auditing) the two components of a cryptographic key by two key component holders.

        LEAF Creation Method-A part of a key escrow system that is implemented in a cryptographic device and creates a Law Enforcement Access Field.

        Type I cryptography-A cryptographic algorithm or device approved by the National Security Agency for protecting classified information.

        Type II cryptography-A cryptographic algorithm or device approved by the National Security Agency for protecting sensitive unclassified information in systems as specified in section 2315 of Title 10 United States Code, or section 3502(2) of title 44, United States Code.

        Type III cryptography-A cryptographic algorithm or device approved as a Federal Information Processing Standard.

        Type III(E) cryptography-A Type III algorithm or device that is approved for export from the United States.

        Qualifications: The protection provided by a security product or system is dependent on several factors. The protection provided by the SKIPJACK algorithm against key search attacks is greater than that provided by the DES algorithm (e.g., the cryptographic key is longer). However, provisions of this standard are intended to ensure that information encrypted through use of devices implementing this standard can be decrypted by a legally authorized entity.

        Where to Obtain Copies of the Standard: Copies of this publication are for sale by the National Technical Information Service, U.S. Department of Commerce, Springfield, VA 22161. When ordering, refer to Federal Information Processing Standards Publication 185 (FIPS PUB 185), and identify the title. When microfiche is desired, this should be specified. Prices are published by NTIS in current catalogs and other issuances. Payment may be made by check, money order, deposit account or charged to a credit card accepted by NTIS.

        Federal Information Processing Standards Publication 185

        Specifications for the Escrowed Encryption Standard

        1. Introduction

        This publication specifies Escrowed Encryption Standard (EES) functions and parameters.

        2. General

        This standards specifies use of the SKIPJACK cryptographic algorithm and a LEAF Creation Method to be implemented in an approved electronic device (e.g., a very large scale integration electronic chip). The device is contained in a logical cryptographic module which is then integrated in a security product for encrypting and decrypting telecommunications.

        Approved implementations may be procured by authorized organizations for integration into security equipment. Devices must be tested and validated by NIST for conformance to this standard. Cryptographic modules must be tested and validated by NIST for conformance to FIPS 140-1.

        3. Algorithm Specifications

        The specifications of the encryption/decryption algorithm (SKIPJACK) and LEAF Creation Method 1 (LCM-1) are classified. The National Security Agency maintains these classified specifications and approves the manufacture of devices which implement the specifications. NIST tests for conformance of the devices implementing this standard in cryptographic modules to FIPS 140-1 and FIPS 81.

        4. Functions and Parameters

        4.1. Functions

        The following functions, at a minimum, shall be implemented:

        1. Data Encryption: A session key (80 bits) shall be used to encrypt plaintext information in one or more of the following modes of operation as specified in FIPS 81: ECB, CBC, OFB (64), CFB (1, 8, 16, 32, 64).

        2. Data Decryption: The session key (80 bits) used to encrypt the data shall be used to decrypt resulting ciphertext to obtain the data.

        3. LEAF Creation: A Family Key (e.g., KF-1) shall be used to create a Law Enforcement Access Field (LEAF) in accordance with a LEAF Creation Method (e.g., LCM-1). the security equipment shall ensure that the LEAF is transmitted in such a manner that the LEAF and ciphertext may be decrypted with legal authorization. No additional encryption or modification of the LEAF is permitted.
        4.2 Parameters

        The following parameters shall be used in performing the prescribed functions:

        1. Device Unique Identifier (UID): The identifier unique to a particular device and used by the Key Escrow System.

        2. Device Unique Key (KU): The cryptographic key unique to a particular device and used by the Key Escrow System.

        3. Cryptographic Protocol Field (CPF): The field identifying the registered cryptographic protocol used by a particular application and used by the Key Escrow System (reserved for future specification and use).

        4. Escrow Authenticator (EA): A binary pattern that is inserted in the LEAF to ensure that the LEAF is transmitted and received properly and has not been modified, deleted or replaced in an unauthorized manner.

        5. Initialization Vector (IV): A mode and application dependent vector of bytes used to initialize, synchronize and verify the encryption, decryption and key escrow functions.

        6. Family Key (KF): The cryptographic key stored in all devices designated as a family that is used to create a LEAF.

        7. Session Key (KS): The cryptographic key used by a device to encrypt and decrypt data during a session.

        8. Law Enforcement Access Field (LEAF): The field containing the encrypted session key and the device identifier and the escrow authenticator.

        5. Implementation

        The Cryptographic Algorithm (i.e. SKIPJACK) and a LEAF Creation Method (e.g., LCM-1) shall be implemented in an electronic device (e.g., VLSI chip) which is highly resistant to reverse engineering (destructive or non-destructive) to obtain or modify the cryptographic algorithm, the UID, the KF, the KU, the EA, the CPF, the operational KS, and any other security or Key Escrow System relevant information. The device shall be able to be programmed/personalized (i.e., made unique) after mass production in such a manner that the UID, KU (or its components), KF (or its components) and EA fixed pattern can be entered once (and only once) and maintained without external electrical power.

        The LEAF and the IV shall be transmitted with the ciphertext. The specifics of the protocols used to create and transmit the LEAF, IV, and encrypted data shall be registered and a CPF assigned. The CPF (and the KF-ID, LCM-ID) shall then be transmitted in accordance with the registered specifications.

        Various devices implementing this standard are anticipated. The implementation may vary with the application. The specific electric, physical and logical interface will vary with the implementation. Each approved, registered implementation shall have an unclassified electrical, physical and logical interface specification sufficient for an equipment manufacturer to understand the general requirements for using the device. Some of the requirements may be classified and therefore would not be specified in the underclassified interface specification.

        The device Unique Key shall be composed of two components (each a minimum of 80 bits long) and each component shall be independently generated and stored by an escrow agent. The session key used to encrypt transmitted information shall be the same as the session key used to decrypt received information in a two-way simultaneous communication. The Lead Creation Method (LCM), the Cryptographic Protocol Field (CPF), and the Family Key Identifier (KF-ID) shall be registered in the NIST Computer Security Object Register.

        This standard is not an interoperability standard. It does not provide sufficient information to design and implement a security device or equipment. Other specifications standards will be required to assure interoperability of EES devices in various applications. Specifications of a particular EES device must be obtained from the manufacturer.

        The specification for the SKIPJACK algorithm are contained in the R21 Informal Technical Report entitled "SKIPJACK" (S), R21-TECH-044-91, May 21, 1991. The specifications for LEAF Creation Method 1 are contained in the R21 Informal Technical Report entitled "Law Enforcement Access Field for the Key Escrow Miscrocircuit" (S). Organizations holding an appropriate security clearance and entering into a Memorandum of Agreement with the National Security Agency regarding implementation of the standard will be provided access to the classified specifications. Inquiries may be made regarding the Technical Reports and this program to Director, National Security Agency, Fort George G. Meade



        Return to main Clipper page.


        Return to the CPSR home page.


        Send mail to webmaster.

        Archived CPSR Information
        Created before October 2004
        Announcements

        Sign up for CPSR announcements emails

        Member login
        Not a member yet?
        Ongoing Projects
        > Elections Project
        > Public Sphere Project
        > Liberating Voices! Pattern Language Project
        Chapters

        International Chapters -

        > Canada
        > Japan
        > Peru
        > Spain
                  more...

        USA Chapters -

        > Chicago, IL
        > Pittsburgh, PA
        > San Francisco Bay Area
        > Seattle, WA
        more...
        Why did you join CPSR?

        The need for CPSR's activities has never been greater.

         
         

        “Certainly. That seemed to be the purpose, in the London hotel. A person as clever as that must have planned this entire affair and has undoubtedly accomplished his wish and vanished long ago—or else he can never be caught because we have no way to discover him.” But she only answered that that was unlikely and slipped her arm around his neck, as she added that if anything were to happen to him, she would not have one real friend in the world. There was something pathetic in the quiet realization of her loneliness. "You're a liar," said Shorty hotly. "You didn't git out o' the regiment because it stole niggers. That's only a pretend. The rear is full o' fellers like you who pretend to be sore on the nigger question, as an excuse for not going to the front. You sneaked out o' every fight the regiment went into. You got out of the regiment because it was too fond of doin' its duty." His volubility excited that of the "Captain," who related how he had been doing a prosperous business running a bar on a Lower Mississippi River boat, until Abolition fanaticism brought on the war; that he had then started a "grocery" in Jeffersonville, which the Provost-Marshal had wickedly suppressed, and now he was joining with others of his oppressed and patriotic fellow-citizens to stop the cruel and unnatural struggle against their brethren of the South. As he reached the top of the bank a yell and a volley came from the other side of the creek. Shorty joined him at once, bringing the two boys on the engine with him. "I'll look out for that." "That is," Dr. Haenlingen said, "fools like you." Rogier opened his mouth, but the old woman gave him no chance. "People who think psychology is a game, or at any rate a study that applies only to other people, never to them. People who want to subject others to the disciplines of psychology, but not themselves." "There are spots the steel's never covered," he said. "You can tunnel through if you're lucky." A pause. "I—" "No—it's just something one enjoys, same as cakes and bull's-eyes. I've kissed dozens of people in my time and meant nothing by it, nor they either. It's because you've no experience of these things that you think such a lot of 'em. They're quite unimportant really, and it's silly to make a fuss." "I ?un't that. I'm just a poor labouring man, wot loves you, and wot you love." HoME免费国产一级毛卡片视频app ENTER NUMBET 0017
        www.nihe9.net.cn
        www.fange5.net.cn
        mubu5.net.cn
        www.tibu7.net.cn
        qinbu6.com.cn
        youle9.com.cn
        huaqu7.net.cn
        sixue5.net.cn
        www.fenda3.net.cn
        www.52v5y6.net.cn
        大胆胖女人体艺术 性爱333哥哥干哥哥干嘛哥哥讨厌 乳交写真 h女同电视剧 华人在线伦理电影 人妻系列成人动漫 日本美女露b高清图片 美女黑木耳处照 WWW.GAN860.COM WWW.LED6918.COM WWW.HQ-ZSW.COM WWW.OPP999.COM WWW.BJBJ100.COM WWW.HHH307.COM WWW.JAVCHAN.COM WWW.TCBGC.COM WWW.BJZJQF.COM WWW.02MK.COM WWW.987BB.COM WWW.XMBJGS.COM WWW.VERISIGN.COM WWW.HHH437.COM WWW.AOFEINI.COM WWW.BBB549.COM WWW.NENNENLU.COM WWW.HHH018.COM ABU.OMAR WWW.BBB598.COM 大肉棒丝袜裤性奴 欧美丰满美女图 半夜成人影院 晚上电影网址 东京热制服群交www51gannet 高清播放成年网站 在线成人国产打飞机 台湾综合网首页 第九月激情网yuyongniancom 制服丝袜AV无码专区 色色资源站色色资源站影院色色资源站在线影院 狠插猛干舅妈 爸爸日我逼逼 玛雅maya十八岁 nass系列合集 东方AV在西安 蝌蚪窝kedou2www980022com 亚洲丝袜偷拍论坛 迷人av 90色吧影院 μs浏览器成年影院 毛片人兽性交的视 www操酷狗com caopporn超碰 小明看看首页看www1234zacom UC色片 大唐淫乱 美剧排行榜 97yy成人 米奇第四色做爱 我想看鸡巴插小逼免费片 青青草视频观 狠狠干迅雷 少妇诱惑舞蹈 全家乱淫交换 玩弄阴道 www484ppcom lululuAV 母女交换啊啊啊啊 爱幼幼社区 丝袜3av网 九色撸撸 最新三级片电影 日韩AV-撸波波影院 susu62avav www7s 色色色999曰韩国拍 大黑鸡巴性交 有个黄色网站的网址是wwwkou多少 迅雷下载自拍偷拍 苹果手机在线看片网址 av闲人吧av在线看 云播欧美 五月五婷婷AV 成人校园乱伦密史 推女郎色图 涩人阁第四影院 无毛萝莉在线观看 香蕉一淫 wwwavtt98com 啊啊啊老公不要图片 邪恶漫画之嫂嫂受孕 京东人妻50 韩国黄色的三级片 淫荡妻成人3p小说 黄色片毛wwwjlnqkaqbwocn 社旗黑社会老大王燕 肉棒被淫穴亲亲快播 女同无码先锋 冯仰妍16分钟在线视频 丁香五月婷婷人与兽 www789cgcom mmtt44校园春色 欧女性生殖真人图片 丝袜旗袍露脸 主播身材诱惑国产 国产露脸母子 在线播放成人网 www色色www44tutucom 性感欧美第二十期成人网 屄一样的花 色交录像 av天堂网2016 幼女逼被插 成熟俄罗斯女人与性 村上凉子演过的近亲黄色电影 熟女自慰影片看快播 青毛极品画眉鸟图片 网业的黄se电影2014 大妈三人性交 强奸乱伦制服诱惑亚洲bt迅雷下载 熟女网微博 俄罗斯幼网站 冰漪图片欣赏 干妈的肥穴真好玩 乳罩口交 90后模特色图 欧美浪屄图 大胆人体美女私处艺术图片 幼女做爱种子下载 60老女床上视频激情 绫香是a片的 新娘 小穴 高清裸体炮图 人和动物片片 av台湾无码 欧美大屁股熟女俱乐部 打炮超碰在线视频 小色迷ge av资源网ye123 少女的b上没长毛的b 最人体大胆女艺术 日美女阴道 迅雷看看菅野亚梨沙 东北成人网论坛 自慰门mp4 通辽市信息港 小学生心理测试题 肏女大学生的经历 930影院手机版 30p亚洲性交 色色区 116田255田163田176把田字换城 黑人体艺 我和妈妈的激情性爱故事 上午鲁下午鲁 本多快播下载 丝袜足交视频晚上碰99 xxx4tubetv 大逼tu 淫荡小妞被插15p 成人网玉环网狗奴舔脚视频 nanrenaikandirenti 视频裸聊裸性爱裸肏屄裸口交 青涩基地 入屄爽鸡巴 屄肏文章 美国操逼片视频 淫荡日本小说 丰满人妖的性爱 日本人兽片番号 美女午夜爱爱网 国语干老太太逼快播 大胆人体艺术电影 WWWSEWGPCOM 清狗人体艺术 kkbokk自拍图片 秘密爱中的做爱是真的吗 大奶裸体人体艺术图片 屄草垮 东京热手机版 佐佐木希作品快播播放 色姐姐自拍 gogo人体高清人体孙俪 ppp邪恶动态成人图 韩国sheyiye 日本幼女破处网 午夜伦理av男人的天堂wwww6080com 看8o后操B射 国产自拍热99www99kk5com WWW淫民色色色 96插妹妹sexsex88com 激烈抽插漂亮大奶妹 欧美黄人成人视频 湖南妹子艳照门 一条莉音肛交 91色妹妹AV hulisecow 我和淫荡美女操逼的故事 欧美人妻被迫 日日拍嗷嗷拍 波多野结衣操老师 偷拍自拍泳衣 黄女人京东干 韩国美女捰体mm照片 国产国语偷拍在线视频 中国av教育 wwwxingqingzhongrencn 山毛人体艺术 丰臀骚妇 操 俄 快播 遮天 有声小说 春色满员 日本minato h网 你懂得 有没有动漫h网 给我一个h网 谁给个无毒的h网 东京热真做 手机看黄片怎么看 5252黄色小说 大色鸟 色界论坛 生殖器官 我去摸逼 成人文章网 models视频 哥去射中文网 色撸橹 日日 撸友网 撸射网 撸飘飘少女 喜爱se在线播放 亚洲 另类 春色 3d漫画 白洁 链接 深爱开心五月图片区 av12电影手机版无码 2019午夜AV yitunhuo最新链接 avbus 最新地址 免费剧情漫画 snis-937在线 少女潘金莲一老司机看电影 大爱撸免费在线影院 中口韩特级大黄片 特区爱奴无剪辑 免费视频在线观看国产情侣自拍 性奴小说视频 小泽玛利亚bd视频 日本学生妹自慰视频 日本淫a片在线观看 日本熟女人妻视频 荡女婬春神马影院 情艺中心在线紧急 JJJ347 古侠武典小说天堂 色喇叭国产自拍 amt005磁力链接 迷奸美女伦理片 成人avav 射射射日日视频 国产群交在线观看 厕所女人偷拍到的手淫视频 大香蕉本色成人视频 翘臀少妇内射50p 女人鸡吧 国产牛牛热线视频 你懂百度资源 白嫩寡妇巨乳伦理电影 国产自拍小视视频 秋月小町av 迅雷下载 小视频胸大的 萝莉无圣光小鸟酱百合 老炮儿琪琪看片 我要黄片儿强奸的黄片三级黄片 人人操 视频 4422n xvideos中国人双飞 播放s片韩国毛片一级 Chinahomevoid 一本道高清AV电影网 窝窝电影之大香蕉 超屌爽 caoporn91视频在线 av在线直播 ssni-261在线 300mium-086 超碰首页 vr格式 色久悠悠青草 福利上瘾怎么播不了 福利视频优衣库完整版 xxoo又黄又色 111番漫画 亚洲黄片在线 av电影中文字幕 小依天堂 色999色屌丝 1769hz在线 蝌蝌窝2018地址蚪蝌窝 大香蕉色影 VVTcc秋霞影院 亚洲成交毛片 日本高清无码高评分 舔少妇屄屄 草莓慕斯塔的全套magnet 十八禁资源群 七月丁香网水野朝阳 三级黄线下载 旅游时看到蜜桃臀想操 爱色影激情在线002 日本无吗无卡高清在线观看 76zy 老司机午夜Ⅹ0 2588影院 校园激情自拍偷拍 汤姆影视avtom 扩阴无码 mp4 美女逼逼视频 强奸女大学生 下载magnet 深喉口爆群交在线视频 曰b镜头给你看看 玲木波多 gav免费播放成人大片 亚洲破除系列 百变女神魅心户外大马路 wwwxy14app 开放90后在四虎线观看 91性交视频 香蕉网络电视 校园春色激情 爱视频 校服白丝污视频 波野结多依 magnet 周晓琳视频下载 mkck-194 show网站公路黄色网站干她舒服 国产直播小嫰女直喷自摸阴蒂 94福利社区会员 www559955com 视频 国产 大胸 在线 日本伦理影院 秋霞一级毛片 www5y95con 久久人人97 狂燥空姐小穴 怪兽AV动漫 国产偷啪棚户区站街女在线观看 被同事扣出水视频 爆乳啪啪啪视频网站在线观看 藏精阁第一福利宅男搬运工 jjkkrrrr 大香蕉人伊在线这是我的网站 800AV最新地址 av网址站 91x视频成人教育a v 联合中英美 成人娱乐av男人的天堂 光棍影院2017鬼父 u15 天堂图片区 成人福利影院免赞网站 陈慧二字图片 二级艳舞黄色视频 3成人视屏在哪看? 自慰视频福利在线看 快播成人电影五福影院 夫妻房事做爱动作大片一级黄色 - 资讯搜索 老男人和胖女人做爱视频卜 在线福利gv 写真av全裸影院 日韩无码180 最近网上怎么看不到小视频 XXx在线视频 影音先锋成人伦理无码 藤井蕾娜迅雷种子 福利片优播看看 在线看 操逼视频啊啊好舒服 采精的小蝴蝶在线观看 国产偷拍自拍91 噢门毛片 啪啪叫床视频 亚洲av在线播放人妻 maomi8686 咪咪网 国产自拍 母乳新人协和 chengrendianyingzipai 国家福利是什么狗屁 女日本女日直播视频 迅雷下载地址 混血哥双飞高颜值的上海177制服 空姐办公室乱欲 3d动漫在线播放 色姑娘棕色姑娘综合站 极品清纯大奶90后妹纸自慰视频 曰b黄色视 狂操空姐骚穴 成年人大片网站 日韩女优无码性交视频 淫妻小说 同性视频网站 黄色网站大全 欧美4p番号 黄片网站啪啪视频 啪啪游戏视频 男女上床尻屄视频 淫shipin 汤姆影院AVt0n rd845影音先锋 都市凌香录在线有声 9191偷拍在线播放 黄色一号视 CLUB-162可以搞的人妻回春按摩3中出交渉偷拍 自拍图片专区12p 亚洲图片欧美图片天堂网 影音先锋av资源tokyo 6seavcom 香蕉丁香网 后入极品美女自拍 好屌色在线精品网站 艺校女生贴身衣物 女人B脱毛视频 大棒棒塞进洞洞的视频 爱福利视频cc 4438成人黄色视频 艾迪av无码 三级片视频图片 色狼群免费小视频 欧美性受群交视频1在线播放 爱看影院视频伦理 国产自拍HHHHH 人体手机壁纸 草杨幂的小说 至爱色色图 艳欲迷墙 新色猫咪导航网站 欧美性爱黄色淫淫网 张筱雨的淫荡 顶级姑娘大胆人体摄影 宫崎葵寄生木下载 口述6p a片在线看 中欧人体美鲍艺术 日本被老公的领导调戏 各种犬的性能力 huang片网 成人激情乱伦大集合 日本成人漫画网站 欧美性交电影先锋播放人与动物 普通话淫荡对白山东94年的大奶小姑娘和男友 看裸体漏阴道 日本女人的阴性毛 操人体模特 欧美裸模大胆露阴图 乱伦家庭母子小说 筱原凉子av先锋影音 每晚小姨骗我上床 风骚淫荡妈妈做小姐 WWW_280_COM � 做爱嫩穴 草裙 女人大奶子撸撸色图 偷偷拍影院 性感美女性器 操尿图片 美阴图 xxxsexeurpe 冠希哥亚洲视频 母子115网盘 苍井空护士水蓝色裤袜全集 妈妈的肥乳 丝袜做爱少妇 非州大炮干亚州少 美女性感视频网站有哪些 日韩考屄视频 李静仪 西湖是哪个省的 钢铁侠1国语 朴唛妮28部全集 波多野结衣是哪个公司的 幼女插进 国产女主调教视频在线 骚逼美女网 罗李芳身份证 父亲顶入亲生女儿小说 自拍偷拍欧美论坛 成人偷拍自拍自拍 美女三级黄色美图 欧美色图漂亮的女主持人 百度日本强奸电影 腾讯联合藤下梨花 欧美黄色电影怎摸进 丁香五月中字欧美三级 俄罗斯美眉的逼 姑娘人体摄影 男用壮阳喷剂 西西人艺网极品粉嫩美鲍70p中国人体 美女爱鸡巴快播 日本女优吉吉 国内成人露脸 搞女儿 外国男人操中国骚逼 94草b 日韩炮图图片 大鸡巴哥哥草骚屁眼 小学生幼女av 西西学生人体 东热操屄图 女王性侵小说 色八阁 欧州毛片5 ccm99oinet 人体艺体阴部插图片 处女做爱av视频 se色撸撸 非洲黑人日本女人 姐妹乱伦专辑下载 老妇的性事小说 自拍偷拍先锋视屏 www45hucom 13骇人游戏美国版在线视频 日本妓女被操的电影 三级片免费在线网站 完美动态艺术 姐姐和弟弟操逼 人妻小黎19p WWW233SIHUCOM 2017男人天堂在线77bbs787com 美女人阴口毛 52草逼 艳照门肛交 爷爷操幼幼书 mm365小说 成人处女被操视频 综合承认在线 美艳国模裸体完美展示 新视觉影院ios 白虎的嫩穴 操白虎屄视频 琪琪影院经典片 日韩av综合网magnet 自拍偷拍动漫视频手机播放 japhd日本55 熟妇漫画合集 日本av淫乱小穴 tube8xxxfree 自拍偷拍校园春色撸一撸 干空姐的小穴 哥哥干妹妹wwwggwmmcom 狠狠草狠狠干青青草 想老公的大肉棒了 亚洲荡 儿童爱爱网站 啊不要人家小穴都湿了 啦啦队宝贝av资源 奇色手机影视 夜夜撸勾引骚女亚洲 涩站网 永久束缚少女小说 塞尔维亚人体艺术 在线免费观看动物敲门 谷露英语 tube幼子 1069gv同影网 色人www46ltcom 超碰淫淫网 性爱影片名称 秋霞福利小说书 我要看一丝不挂女人的逼逼和大奶子图片 黄色网站偷拍自拍亚洲熟女乱伦丝袜 韩国x档案全文 我的娇艳淫荡妻子 母子姐姐做爱图 人妻淫淫网 2017年夫妻群 李梅大屁股 酒店后入在线视频 极品美腿人妻系列 一天让多个女人发黑木耳照片给我 制服诱惑丝袜美腿亚州电影 图片如题在线电影观看地址 撸色淫乱图 夜间电影a免费 野蛮部落的性生活 爱库99bt 香港三级先锋 免费在线黄色小说阅读最新yy黄id 大色逼 丝袜性奴老师 呢女同 操大美幼 三十七度二百度云 东京热制服群交www51gannet 35gao在线福利免费观看 wwwav882com 农夫激情基地 自拍亚洲中文字幕日韩欧美 武汉玩小姐 哥哥噜狠噜噜 色爷爷影院 WWW52色C0m 怡春院分站 京香juliaav视频免费观看 朋友淫荡的妈妈我可以操你妈妈吗 插女儿的小屁眼小说百度 免费黄色电影76yrcom 天天射鲁一鲁 色窝窝黄站小说 能看的在线av站 调教型a片 meiguose 欧美末成年处女图片 久草李雅 陈勤勤的所有肉偿视频 类似达酷的网站 有基zzcom 2000激情影院 先锋av资源在线 jizzjizz有jj和bb两性器宫人 五月激情夜 国产偷拍一在线观看视频 女子柔术视频裸体大全 n0015叶丽美先锋影音 波多野结衣性感写真 轮奸淫荡的妻子_ 搜索www108yucom 我用假阴茎的小说 人妻淫色删除 成人性爱视频在线观看 淫奇艺影院欧美Av 超级碰caoporm 与邻居三少妇 精品自拍美女 久草sdde wwwer37comwwwer37com 女人尿尿的器官 500资源网视频在线 在线视频无本道狂野 大咪咪乳房表妹大肥逼 sm性奴人妻母狗调教色图 gayandguy亚洲 成人丝袜视频大全集 刘可颖欢乐岛 素人啪啪啪 办公室av下载 688ttfcom 新鲜大吉鲍 亚洲制服av 金瓶梅之鸳鸯戏床小说 亚洲色之图 在线秘密AV 人妻五月天在线下载 熟妇乱伦图片区 76资源网妈妈的朋友 处女宫电影 另类在线先锋 黄色a片免费看 性交触视频 玖玖总站资源青草 japanyellowmovie 形形色色五月天 射射草 大伯影视 身穿民族服饰的中国少数民族漂亮美女大胆人体艺术7国内 www淫色色淫com奇米综合网 那里有龙珠色片 东方亚洲av东方亚洲狠撸 wwwpu628com 人与兽性毛片 nnyythunder AV天堂wqng 黄色aA片magnet 色wwwcomcn 丝袜巨乳人妻连裤袜 祼体美女露阴图 91在线最新官方地址发布页 欧美av电影幼幼片 nipingdebi 狗交的张柏芝 屄 图 p 黑 新片欧美十八岁美少 苍井空露阴道阴毛图片 肥佬影音适合的网站 福原爱谈av 老女人13p 360爸爸操死我吧舒服死了txttxt在线免费阅读 影视先锋伦理电影 夫妻交换操屄俱乐部 伦理txt 人体艺术toupian 做爱乱伦先锋电影 高树三姐妹txt小说 千草忠夫 父女性爱母子性交 147小泽玛利亚人体 好有肉感好甜美 中学女生三级小说 上原结衣哥哥射 快播韩国主播视频 婷婷快播网址是多少 岳母 奶子 熟母 电车 岳母 父女做爱的自述 苍井空白浆av 外国美女阴部写真 徐子淇面相 抗衰老产品 天通苑尾货市场 精灵的守护者 周国平散文读后感 艾灸视频 WWWBJ8080COM 天堂文学占有大姨子的身体 老奶奶勾引青年开房床上变态做爱 护士美女裸体照 多毛阴道图片 欧美性急交 当阴经插入美眉bb里的那一刻 欧美淫乱猛图 狠狠射ssdy 男人玩充气仿真娃娃 成人激情黄色乱伦电影下载 欧美性爱潮喷集锦 日本乡村义母 3圾片大全快播文件 熟女欧美亚洲 操老浪屄 露阴部人体艺术 每日更新的色站 亚州色图波多野结衣性交图片 幼幼强奸摸奶 黄色我和姐姐在公交车上 欧美裸体漏阴图 能看影院大片的软件 陈冠希qvod 卓依琳的做爱电影 大奶金发美女吃鸡巴 少妇美女做爱色图 12345678性爱 肏屄香小说 黑人对性的看发 干大屄人体 WWW827724COM 我和少女3p日记 雅玛小说网 淫荡妇女优 人体艺术开档 小说鸡巴淫城 秒播国产偷拍视频在线观看 色哥哥帝国军情 鲛岛琉生如狼 俄罗斯成人激情电影 自慰国语三级欧美 狠狠射黄色电影 小女孩阴部视频自慰视频 美国四级在线云播放 `国产自拍色 百度影音幼幼 与淫荡女医生做爱 tunfeixiaoyizitu 小人大鸡巴干熟 荒野嗯啊 少妇逼逼超嫩 草榴社区文学区 哥哥轻点好疼好大 五月停停五月天47cccccom Av激情网 自慰偷拍亚洲天堂 亚欧图片有声 wwwbbb560von 超碰痴汉空姐 撸撸鸟AV亚洲色图 老熟女内裤丝袜图片 后女QQ上买内裤 日本美女色色色 百度一下luotiyis 快播成人日本幼女系列 插插插总和我 少女插p色图 操逼性交被人操了小说 美国免播放器射吧 有声小说色 春色堂永远 h网是什么意思 www黄色录像com www访问 东京热导航 东京热401 东京热toky 为什么酒色网 酒色酒色网 酒色网 网站 黄色小说集 葵つかさ 悦来客栈 爱色就色网 高处女电影 狼人电影网 我色淫我乐 99999AV电影 百撸社区 撸踏踏20以下禁止入内 日本Av饭免费观看 人人看91视频直播 白色手机天堂网站 gav成人网站在线 女优磁力链接在线观看 ooxx老湿影院 情侣不雅激情实拍papa 日韩精彩短视频 樱木莉爱无码 MP4下载 影音先锋 av资源 日本头交视频哪里看 美脚妻连体袜在线播放 深喉吞精中国 yuputuan01 在丈夫面前福利视频 影院电影手机观看综合网 rav 无码 eee119猫咪网 live 图 无码 蓝沢润av迅雷下载 有bi吗va视频 网红做爱迅雷下载 mp4 超频在线 prisonschool里番免费看 41st福利视频 999西瓜视频 久久爱国产自拍偷拍 在线搞 午夜福利免费视频50集 红楼78电影网 韩国片神马影院 性奴电击灌肠调教视频 大爷操免费 桥本麻衣子398 艳m迅雷在线观看 艳姆秋霞影院 幼i交18girl renyidongwujiaopei 黄片狼人与岛 犬屋敷 影院 希咲彩大战黑人 福利757午夜云播 45tom影院 色王者 欧洲性x xx 铃原爱蜜莉在线无码 yuzuki柚木 国内自拍第五 草b在线免费视频 美女 youzzjj影视 a v淘宝在线观看 松坂美纪 23riri新地址 ipx072在线观看 在线视频 就是操 xo色视频 黄色干逼 视频在线观看 瓜皮影院韩国伦理片 幼女视频吗 光棍影院福利在线看 快点插我快来了视频 18v韩国主播 一本道国产在线97 免费看黄尤美 长泽梓所有无码高清在线 桃谷绘香里高清无码 西瓜 avxxxx 老是免费十分钟影院 射丝袜足 在线影院 国产名人女神学生 奉仕在线播放视频 大空美绪 手机免费视频在线观看 苍井空无码 换妻 偷拍 任你不一样的搞法搬运工 miad-812 92看看电 影网100午夜合集 黄色网站在线浏览 337p日本人 性爱vn 露脸怒草发廊高颜值小姐 小彩的屁眼 鸭子av性 性抽插视频福利 哪有松岛枫电影 亚洲人妖在线资源 看两性啪啪真人免费大黄片 哥也射综合 影音先锋2019a v源站 裸聊视频在线播放 哥去射偷拍自拍在线观看 欧美黄A片天天影院 小仙女思妍手机在线视频 黄色AV导航 偷窥盜摄在线播放 撸一炮 炮一炮在线视频 类似51abab 自拍色人阁 视频二区学生系列知名国产 一部影院b 肉蒲团之极乐净土免费观看 苍井优一本道在线 操逼视频中文字幕 变态碰碰强奸 北嵨杏 金蒲团直播艳艳 亚洲日韩激情文学 长泽梓AV在哪看 成人极速性生活视频 草帽AV ppppmmmmmm 朝桐光视频 陈冠希迅雷 全套bt种子 变态熟女在线 ssni磁力链接 成人时平在线播放免费 被轮j的校花高晓 草根艳舞团 县城全裸淫荡火爆 苏小欣磁力下载 丁香五月欧洲大香蕉 快播麻辣影院 人人操人人日视频 白鸟樱 无码 在线 琪琪色在线影院福利视频群 性感女主播0 日批又黄又色的动态视频 超高级国王游戏电影 那有小姐操逼视频 爆乳自拍偷拍 苍老师操b 果宝张筱雨 国产自拍伦理片久久热 国产私人玩物视频在线 freex性日韩免费视频 亚洲成人0887 伊人性爱 极品白嫩美女主播极尽诱惑,喜欢的不要错过16 wankz视频日本 最新制服丝袜 爱沢花梨加勒比 magnet 2018最新AV福利中国 yut2 uuu777在线观看 a4yy万利达首播影院官网 青青草i在线视频 舔阴蒂日本 伦理逼 麻条北妃 色男人福利论坛 色婷亚洲五月 饥渴的熟妇番号 青青草kjii 强奸资源网站 鸡宝 肥佬影院 精品福利影院 教室诱惑夹笔杆番号 鲍粉逼 夜用影院 91凤吟鸟唱 sigua 888com 女同性恋做激情视频 和寡妇干b 缓冲小视频厨房干 丝袜美腿品玉小说下载 sheyujie 1000部啪啪啪视频日本 短发气质美女小秘书公司聚会被领导算计喝多了带到酒店蹂躏 色福利亦航 丝袜女同性恋接吻女子磁力 卡在电梯里的av系列 韩国ck青草直播 OX做暧昧免费视频 中学老师在线视频 免费v片在线观看2320 好B网视频在线 农村夫妻生活偷拍视频 主播走光 磁力 艹小穴视频 97总站人妻在线视频 老鬼色综合 Caoii∪1024 超清:90后巨乳美女被色狼疯狂摸胸吸吮后······ 高清 福利小视频 【19禁热舞】-诱惑视频- 视频在线观看 - 爆米花视频 内射肉丝视频 三上悠亚xz av网站在线免费观看幼嫩 动漫靠逼18岁视频 虎牙高管潜规则视频 ddoox校园 新城春奈影音 美女野外艺术写真 WWW_YESEGE_NET 和美女明星做爱舒服吗 人与动物电影大全 66电影成人电影 毛篇片地址大全 亚洲美图t 百度马六人体艺术鲍 妇乱艺术穴图 男模王魅经典全见图 操骚逼妈妈中文对话 操逼涩蝴蝶 亚洲视频人妻按摩 少妇在线内射 yijidianyeng