This course focuses on secure communication built on information theory, which does not assume that an adversary has computational limitations. We will begin from the basics of information theory, ...