AES 4 rounds

RootMe Challenge: Classical attack on AES-128 reduced to 4 rounds: The encryption oracle available at the address below performs 4-round AES-128 encryption (the last round does not apply the MixColumns transformation). You can query as many chosen plaintexts as you need.

Exploit this reduction of the round number to recover the secret key and then retrieve the password to validate this challenge.

Time limitation 	None
Data limitation 	None