I. Introduction
With the advent of quantum computers, the currently used security methods are in danger of being broken. In contrast, information theoretic security imposes no constraints on the attacker’s computational power. Therefore, it is of increasing importance to develop and verify information theoretically secure schemes in order to be able to employ them in future technologies. The seeded modular coding scheme is an interesting technique for achieving post quantum security and concurrently supporting key 6G requirements such as latency and reliability [1]. Altogether, this is crucial to achieving trustworthiness of 6G, with trustworthiness being central to 6G due to its ubiquitous applications [1], [2].