Tags: crypto aes 

Rating: 0

We need to implement the inverse of the `permute` function to get the required values which we need to send to the server to get the flag.

`permute` performs 10 rounds of AES encryption using the hardcoded table which performs SubBytes, ShiftRows and MixColumns in one step.

The `solve_xor_parallel` function takes the 4 values output by one round of AES and inverts this to find the 4 original values, and it does this 9 times to get the original input passed to `permute`