Bob and Alice plan to use the basic Diffie-Hellman key exchange protocol to share a secret key, which they can then use to share information securely. Trudy wishes to get access to the information that they send to each other. What is an attack that she can mount to get hold of this information? What is an approach that Bob and Alice can use to prevent her from succeeding?