The two parties may detect such an eavesdropper by the disturbance of the states. Subsequently the two parties share a random secure key from which they may encode their data using a one-time pad ...