New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil 212-81 Exam - Topic 10 Question 2 Discussion

Actual exam question for Eccouncil's 212-81 exam
Question #: 2
Topic #: 10
[All 212-81 Questions]

Which one of the following is an algorithm that uses variable length key from 1 to 256 bytes, which constitutes a state table that is used for subsequent generation of pseudorandom bytes and then a pseudorandom string of bits, which is XORed with the plaintext to produce the ciphertext?

Show Suggested Answer Hide Answer
Suggested Answer: C

RC4

https://en.wikipedia.org/wiki/RC4

RC4 (Rivest Cipher 4 also known as ARC4 or ARCFOUR meaning Alleged RC4, see below) is a stream cipher. While it is remarkable for its simplicity and speed in software, multiple vulnerabilities have been discovered in RC4, rendering it insecure. It is especially vulnerable when the beginning of the output keystream is not discarded, or when nonrandom or related keys are used. Particularly problematic uses of RC4 have led to very insecure protocols such as WEP.

The key-scheduling algorithm is used to initialize the permutation in the array 'S'. 'keylength' is defined as the number of bytes in the key and can be in the range 1 keylength 256, typically between 5 and 16, corresponding to a key length of 40 -- 128 bits. First, the array 'S' is initialized to the identity permutation. S is then processed for 256 iterations in a similar way to the main PRGA, but also mixes in bytes of the key at the same time.

Incorrect answers:

Blowfish -has a 64-bit block size and a variable key length from 32 bits up to 448 bits. It is a 16-round Feistel cipher and uses large key-dependent S-boxes. In structure it resembles CAST-128, which uses fixed S-boxes.

Twofish -is a symmetric key block cipher with a block size of 128 bits and key sizes up to 256 bits.

PIKE-stream cipher was invented by Ross Anderson to be a 'leaner and meaner' version of FISH after he broke FISH in 1994. Its name is supposed to be a humorous allusion to the pike fish.


Contribute your Thoughts:

0/2000 characters
Asuncion
4 months ago
Wow, I didn't know RC4 used such a wide key range!
upvoted 0 times
...
Colby
4 months ago
I thought Blowfish was more popular for this kind of thing.
upvoted 0 times
...
Frederica
4 months ago
Wait, are we sure it's not Twofish?
upvoted 0 times
...
Elenore
4 months ago
Agreed, RC4 is the one that fits this description.
upvoted 0 times
...
Rima
4 months ago
Definitely RC4, it's known for variable length keys.
upvoted 0 times
...
Sophia
5 months ago
I feel like Blowfish was mentioned in a similar context, but it uses fixed-length keys, so I don't think it's the right choice here.
upvoted 0 times
...
Kenny
5 months ago
I'm a bit confused; I thought Twofish also dealt with variable key lengths, but it doesn't use XOR in the same way as RC4 does.
upvoted 0 times
...
Marsha
5 months ago
I remember practicing a question about stream ciphers, and RC4 was definitely one of the examples. It fits the description pretty well.
upvoted 0 times
...
Nicholle
5 months ago
I think the answer might be RC4, but I'm not entirely sure if it specifically mentions the variable length key.
upvoted 0 times
...
Bong
5 months ago
This is a good opportunity to apply my knowledge of viral diseases. I'll carefully consider each option and eliminate the ones that don't fit the criteria.
upvoted 0 times
...
Floyd
5 months ago
I think the command is related to event logs, but I can't remember if it's Get-EventLog or Get-WinEvent that we used in the lab.
upvoted 0 times
...
Micaela
5 months ago
Hmm, I'm a little unsure about the distinctions between the different threat intel types. I'll need to review my notes to make sure I understand which ones provide the context and situational awareness that the SIEM would use.
upvoted 0 times
...

Save Cancel