Experimenting with AES-128 symmetric key cipher.using python please.
PART 2: you will try to use "brute force" to decrypt an encrypted message, where you only have the first 96-bits of the 128-bit secret key (last 4 bytes of the secret key are missing!) The program should be called "findk", and should deal with two files that contain the encrypted text as a stream of bytes and the first 96-bits of the key, respectively. The program should print out on standard output the missing 4 bytes of the key in hexadecimal, the decrypted message and the time it took to find the correct key.o To test this part, here is the encrypted file (ciphertext2.dat), and the first 96-bits of the key (partial-key.dat) Hint: the original message starts with the word "Salam".
partial key is b'\x01{:\xec<>
ciphertext2 is b"\xda\xfd.\x10\xab\x18\x0b@\xfd;\xeb\x18\x87\x98I\xbb:\xd1\x0fH\x1f>\xa4\xe9\xf3\xf5$\x05\xbd\xb0%\xe2\xee#\x8a\xaf4\xf1H\x12\xcc\x96\x96\xf6\xcd\xa9w\x8d\x9a\x99\xba\xb96oy\x01\xb5D\xc1\xf6\xfc\xe4'J'\xa4\xc6\xd4\xab(\xea\xc3\xc3X\xe8-\xe2\xd6\xe2\xea\xb5\xc2\xce\x19\x9a\xc5\xd4\xd9\xaetI\xfb!9\x1e%\x9bcy~uZ\x8ft\\\xd3,\\\xe6j \xc0"
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here