0. Check the version of OpenSSL. 1. Check the correctness of implementation of md5 from OpenSSL. 2. Compute hash of empty string. Save it as binary to file. 3. Use enc command and transform hash to base64. 4. Check padding of "000", "0000","00000",... transformed to base64. 5. How hash is changed if 1 bit of message is changed? Check! 6. Compute sha1 hash of shattered-1.pdf and shattered-2.pdf. Open both files and see differences. 7. Check integrity of OpenSSL.exe file (hash of file is published). 8. Check correctnes of AES implementation. 9. Generate random key K. 10. Encrypt random string using AES128 with key K. 10. Check ciphertext when key 1 bit of K or plaintext was changed. 11. Use key and encrypt file.txt of many (>100x) 11111111.... to file.ecb using ecb mode. Do you see any pattern? 12. Print file file.ecb to base64. Do you see any pattern? 13. Repeat 6. with cbc mode. Do you see any pattern? 14. Encrypt 1, ..., 15 (with AES) bytes of ones ("11..."). What padding was used. 15. Encrypt 16 bytes of ones with AES. What was used as padding and why?