Downgrade Attack and its Prevention Explained