A quantum effect/function (I am not a quantumnist, so) : http://www.nytimes.com/2012/11/20/t...ugh-to-improve-internet-security-cheaply.html
a technique for making infinitesimally short time measurements needed to capture pulses of quantum light hidden in streams of billions of photons transmitted each second in data networks. Scientists used an advanced photodetector to extract weak photons from the torrents of light pulses carried by fiber optic cables, making it possible to safely distribute secret keys necessary to scramble data over distances up to 56 miles.
Such data scrambling systems will most likely be used first for government communications systems for national security. But they will also be valuable for protecting financial data and ultimately all information transmitted over the Internet.
The approach is based on quantum physics, which offers the ability to exchange information in a way that the act of eavesdropping on the communication would be immediately apparent. The achievement requires the ability to reliably measure a remarkably small window of time to capture a pulse of light, in this case lasting just 50 picoseconds — the time it takes light to travel 15 millimeters.
“We can pick out the quantum photons from the scattered light using their expected arrival time at the detector,” Dr. Shields said. “The quantum signals hit the detector at precisely known times — every one nanosecond, while the arrival time of the scattered light is random.”
Despite their ability to carry prodigious amounts of data, fiber-optic cables are also highly insecure. An eavesdropper needs only to bend a cable and expose the fiber, Dr. Shields said. It is then possible to capture light that leaks from the cable and convert it into digital ones and zeros.
“The laws of quantum physics tell us that if someone tries to measure those single photons, that measurement disturbs their state and it causes errors in the information carried by the single photon,” he said. “By measuring the error rate in the secret key, we can determine whether there has been any eavesdropping in the fiber and in that way directly test the secrecy of each key.”
So you can tell if someone has intercepted the information or not. So? They already have what they wanted and if they can use it before you have a chance to change the usefulness said information, then you knowing they listened in isn't that useful. You could always send test signals to test if the line is secure or not, and then not send if it's shown to be compromised, but then there would have to be some security of systems there too so that the interceptor doesn't just send back an 'all clear' signal regardless of what the receiver knows.
I read about this back in college. It's been a few years and it's still not being used.