<s>
In	O
cryptography	O
,	O
the	O
Iraqi	B-Algorithm
block	I-Algorithm
cipher	I-Algorithm
was	O
a	O
block	O
cipher	O
published	O
in	O
C	B-Language
source	O
code	O
form	O
by	O
anonymous	O
FTP	O
upload	O
around	O
July	O
1999	O
,	O
and	O
widely	O
distributed	O
on	O
Usenet	B-Application
.	O
</s>
<s>
It	O
is	O
a	O
five	O
round	O
unbalanced	B-Algorithm
Feistel	I-Algorithm
cipher	I-Algorithm
operating	O
on	O
a	O
256	O
bit	O
block	O
with	O
a	O
160	O
bit	O
key	O
.	O
</s>
<s>
However	O
,	O
like	O
the	O
S-1	B-Algorithm
block	I-Algorithm
cipher	I-Algorithm
,	O
it	O
is	O
generally	O
regarded	O
as	O
a	O
hoax	O
,	O
although	O
of	O
lesser	O
quality	O
than	O
S-1	O
.	O
</s>
<s>
Because	O
it	O
has	O
a	O
constant	O
key	B-Algorithm
schedule	I-Algorithm
the	O
cipher	O
is	O
vulnerable	O
to	O
a	O
slide	O
attack	O
.	O
</s>
