<s>
The	O
BEAR	O
and	O
LION	B-Algorithm
block	O
ciphers	O
were	O
invented	O
by	O
Ross	O
Anderson	O
and	O
Eli	O
Biham	O
by	O
combining	O
a	O
stream	B-Algorithm
cipher	I-Algorithm
and	O
a	O
cryptographic	B-Algorithm
hash	I-Algorithm
function	I-Algorithm
.	O
</s>
<s>
Both	O
are	O
3-round	O
generalized	O
(	O
alternating	O
)	O
Feistel	B-Algorithm
ciphers	I-Algorithm
,	O
using	O
the	O
hash	B-Algorithm
function	I-Algorithm
and	O
the	O
stream	B-Algorithm
cipher	I-Algorithm
as	O
round	O
functions	O
.	O
</s>
<s>
BEAR	O
uses	O
the	O
hash	B-Algorithm
function	I-Algorithm
twice	O
with	O
independent	O
keys	O
,	O
and	O
the	O
stream	B-Algorithm
cipher	I-Algorithm
once	O
.	O
</s>
<s>
LION	B-Algorithm
uses	O
the	O
stream	B-Algorithm
cipher	I-Algorithm
twice	O
and	O
the	O
hash	B-Algorithm
function	I-Algorithm
once	O
.	O
</s>
<s>
The	O
inventors	O
proved	O
that	O
an	O
attack	O
on	O
either	O
BEAR	O
or	O
LION	B-Algorithm
that	O
recovers	O
the	O
key	O
would	O
break	O
both	O
the	O
stream	B-Algorithm
cipher	I-Algorithm
and	O
the	O
hash	B-Algorithm
.	O
</s>
