Option (i) Here some asymmetrical algorithms where we apply Hashing (Hashing is a method used to verify data integrity).
1. RSA - named after Rivest, Shamir, and Adleman (investor)
2. Diffie-Hellman (DH)
3. ElGamal - based on the DH echange
4.Digital Signature Algorithm (DSA)- created by NSA
5. Eliptic Curve Cryptography (ECC)
Here some most popular Hashing types
1. MD5 (Message Digiest 5)
2. SHA 1
3. SHA 2
4. SHA 3
So we can correctly say it is not injective (one to one).
Option (ii) DES (Digital Encryption Standard) is part of symmetric key algorithm where we use same key to encrypt the data and decrypt the data. so calculating we perform permutation.
Statement (ii) is true and the other is false