Text this: Use of decoy states in quantum key distribution