<s>
In	O
cryptography	O
,	O
3-Way	B-Algorithm
is	O
a	O
block	O
cipher	B-Application
designed	O
in	O
1994	O
by	O
Joan	O
Daemen	O
.	O
</s>
<s>
It	O
is	O
closely	O
related	O
to	O
BaseKing	B-Algorithm
;	O
the	O
two	O
are	O
variants	O
of	O
the	O
same	O
general	O
cipher	B-Application
technique	O
.	O
</s>
<s>
3-Way	B-Algorithm
has	O
a	O
block	O
size	O
of	O
96	O
bits	O
,	O
notably	O
not	O
a	O
power	O
of	O
two	O
such	O
as	O
the	O
more	O
common	O
64	O
or	O
128	O
bits	O
.	O
</s>
<s>
The	O
figure	O
96	O
arises	O
from	O
the	O
use	O
of	O
three	O
32	O
bit	O
words	O
in	O
the	O
algorithm	O
,	O
from	O
which	O
also	O
is	O
derived	O
the	O
cipher	B-Application
's	O
name	O
.	O
</s>
<s>
When	O
3-Way	B-Algorithm
was	O
invented	O
,	O
96-bit	O
keys	O
and	O
blocks	O
were	O
quite	O
strong	O
,	O
but	O
more	O
recent	O
ciphers	B-Application
have	O
a	O
128-bit	O
block	O
,	O
and	O
few	O
now	O
have	O
keys	O
shorter	O
than	O
128	O
bits	O
.	O
</s>
<s>
3-Way	B-Algorithm
is	O
an	O
11-round	O
substitution	B-Algorithm
–	I-Algorithm
permutation	I-Algorithm
network	I-Algorithm
.	O
</s>
<s>
3-Way	B-Algorithm
is	O
designed	O
to	O
be	O
very	O
efficient	O
in	O
a	O
wide	O
range	O
of	O
platforms	O
from	O
8-bit	O
processors	O
to	O
specialized	O
hardware	B-Architecture
,	O
and	O
has	O
some	O
elegant	O
mathematical	O
features	O
which	O
enable	O
nearly	O
all	O
the	O
decryption	O
to	O
be	O
done	O
in	O
exactly	O
the	O
same	O
circuits	O
as	O
did	O
the	O
encryption	O
.	O
</s>
<s>
3-Way	B-Algorithm
,	O
just	O
as	O
its	O
counterpart	O
BaseKing	B-Algorithm
,	O
is	O
vulnerable	O
to	O
related	O
key	O
cryptanalysis	O
.	O
</s>
