They're related in that the derivation of session secrets is done through a simple modular exponentiation. Pretty much nothing else, from the generation of keypairs to the selection of groups to work in to the way parameters have to be checked, are the same.