Which two of these are things an attacker can do with an encrypted RC4 data stream?

Which two of these are things an attacker can do with an encrypted RC4 data stream? (Choose two.)

Which two of these are things an attacker can do with an encrypted RC4 data stream? (Choose two.)

A.
use XOR to match the encrypted stream to itself, in order to retrieve the key

B.
filter out the keystream if the attacker gets two streams encrypted with the same RC4 key

C.
calculate the checksum of the encrypted stream

D.
retrieve the private key if the attacker has access to the public key

E.
flip a bit of the encrypted text, which will flip a corresponding bit in the cleartext once it is decrypted



Leave a Reply 0

Your email address will not be published. Required fields are marked *