In cryptography, there are many ways to make a secure scheme weak by neglecting just one small detail. Some of these mistakes are not uncommon even among security practitioners. In this assignment, you will play the role of the attacker and see how easy it is to exploit one such oversight.
            One by one, ten plaintext sentences (in ASCII, including spaces, starting with a capital letter) were
            encrypted using 256-bit key AES in CTR mode. Each of the sentences is short enough to fit into two AES
            blocks (the rest of the second block is padded with sufficiently many zero bytes so that the total length of
            the padded sentence is exactly 32 bytes — e.g., b'This is a two block sentence.\x00\x00\x00' in
            Python notation)
            and the $n$-th sentence begins at the beginning of the $(2n-1)$-th block for all $n \in \{1, 2, \ldots, 10\}$.
            Unfortunately, the counter got reset to the string of 128 zero bits each time a sentence was being encrypted
            (thus the value b'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\0x00') was used
            for the first
            block of each sentence, while the value b'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\0x01'
            was used for the second block of each sentence). You have intercepted the concatenation of the ciphertexts
            (in hexadecimal, i.e., base 16); you can find it on this server under the path
                /hw02/input/1234, where you replace
                1234 with your UCO.
        
            Submit two files solution.txt and src6.py (if you did not implement step 6, submit an empty file),
            into the HW02 vault.
        
solution.txt whose first three lines are (all in hexadecimal):
                src6.py with the source code you used
                for encryption in step 6. The code should be commented on – comments should shortly explain what the
                used functions do.
            
            You can find an example solution in the file example_solution.txt in the IS 
            here (the values are just an illustration, while the reasoning shows what level of detail we expect).
            Please make sure to use the same formatting (no string prefix, one newline character)
            for your submission as in the example, otherwise you might lose points.