An Analysis of the Hermes8 Stream Ciphers