Match the following cryptographic algorithms with their design issues :
$ \begin{array} {cIcI} & \textbf{List-I} & & \textbf{List-II} \\ \text{a.} & \text{DES} & \text{i.} & \text{Message Digest} \\ \text{b.} & \text{AES} & \text{ii.} & \text{Public key} \\ \text{c.} & \text{RSA} & \text{iii.} & \text{56-bit key} \\ \text{d.} & \text{SHA-1} & \text{iv.} & \text{128-bit key} \\ \end{array}$
- $\text{a-ii, b-i, c-iv, d-iii}$
- $\text{a-iii, b-i, c-iv, d-ii}$
- $\text{a-iii, b-iv, c-ii, d-i}$
- $\text{a-iv, b-i, c-ii, d-iii}$