Which two of these are things an attacker can do with an encrypted RC4 data stream?
(Choose two.)
A.
calculate the checksum of the encrypted stream
B.
filter out the keystream if the attacker gets two streams encrypted with the
same RC4 key
C.
use XOR to match the encrypted stream to itself, in order to retrieve the key
D.
retrieve the private key if the attacker has access to the public key
E.
flip a bit of the encrypted text, which will flip a corresponding bit in the cleartext
once it is decrypted