1. During decryption, we use the Inverse Initial Permutation (IP-1) before the IP. a) True b) False AnswerAnswer: a [Reason:] IP-1 is the first step and the last step is IP during decryption. 2. A preferable cryptographic algorithm should have a good avalanche effect. a) True b) False AnswerAnswer: a [Reason:] Thus statement is true…