Deadline 26.9.2018 8:00 1. Generate random key K using generator seeded with single byte 0x00. [1 point] 2. Generate random key IV using generator seeded with key K. IV should be of appropriate size with respect to used cipher in 3. [1 point] 3. Encrypt securely the message "This is my UCO_XXXXXX" (use your real UCO) to file (ciphertext.txt). [2] 4. Compute MAC of the message using sha256 with string "sharedsecret" used as shared secret. [2] 5. Decrypt ciphertext.txt to plaintext.txt and verify the MAC. [2] 6. Based on shattered-1.pdf, shattered-2.pdf find different SHA1 collision.[2] Hint: SHA1 design is Merkle–Damgård construction. Describe entire process, commands you used in Desc_xxxx.txt (xxxx stands for your UCO). Archive all files (so it can be opened in Windows 10 without installation of additional SW) and submit it as a single file into IS.