Q: 2
Which attack is the network vulnerable to when a stream cipher like RC4 is used twice with the same
key?
Options
Discussion
Option C makes sense here. With stream ciphers like RC4, reusing the same key means attackers can analyze only ciphertexts to find patterns due to how XOR works. Pretty sure this is the weakness they test for, but let me know if you disagree.
C vs B-if the attacker somehow gets even a tiny known plaintext, doesn't this open up B as well? But with just ciphertext repeated key streams, C seems correct.
C tbh
C If you reuse the same key with a stream cipher like RC4, attackers just need ciphertexts to start spotting XOR patterns, so even without plaintext they can recover info. Seen this called out in a few practice sets.
Be respectful. No spam.