https://www.ietf.org/rfc/rfc2631.txt. Reference the relevant sections in your answer but use your
own words.
1. How the cryptographic keying material derived from the shared secret number is typically used?
2. How the shared secret ZZ is defined?
3. Where the primality test is used? How the the robust primality test is defined?
4. Why the group parameter validation process is needed?
5. What is ephemeral-static mode and how is it different from static-static mode?