Milestone#3 Ethical Hacking

Given an unencrypted AES key and an encrypted message, (attached) build a solution to decrypt the encrypted message and display its contents.

read more