Question

Task 1. Answer the following questions based on the RFC of Diffie-Hellman key agreement

https://www.ietf.org/rfc/rfc2631.txt. Reference the relevant sections in your answer but use your

own words.

1. How the cryptographic keying material derived from the shared secret number is typically used?

2. How the shared secret ZZ is defined?

3. Where the primality test is used? How the the robust primality test is defined?

4. Why the group parameter validation process is needed?

5. What is ephemeral-static mode and how is it different from static-static mode?