Preface In the writeup I assume that readers are familiar with basic cryptographic terms such as AES, modes of encryption, MAC, etc. Also, I assume that readers can read and understand the servers’ source code. So I will only concentrate on the high-level parts of the solution. If you don’t understand…