Which two of these are things an attacker can do with an encrypted RC4 data stream? (Choose two.)
A.
use XOR to match the encrypted stream to itself, in order to retrieve the key
B.
filter out the keystream if the attacker gets two streams encrypted with the same RC4 key
C.
calculate the checksum of the encrypted stream
D.
retrieve the private key if the attacker has access to the public key
E.
flip a bit of the encrypted text, which will flip a corresponding bit in the cleartext once it is decrypted