Which two of these are things an attacker can do with an encrypted RC4 data stream?

Which two of these are things an attacker can do with an encrypted RC4 data stream?
(Choose two.)

Which two of these are things an attacker can do with an encrypted RC4 data stream?
(Choose two.)

A.
calculate the checksum of the encrypted stream

B.
filter out the keystream if the attacker gets two streams encrypted with the
same RC4 key

C.
use XOR to match the encrypted stream to itself, in order to retrieve the key

D.
retrieve the private key if the attacker has access to the public key

E.
flip a bit of the encrypted text, which will flip a corresponding bit in the cleartext
once it is decrypted



Leave a Reply 0

Your email address will not be published. Required fields are marked *