Prevention of the Man-in-the-Middle Attack on Diffie–Hellman Key Exchange Algorithm: A Review