Have an exercise showing the students that even though the OTP is perfectly secret, it's malleable and can be tampered with.
Compare AES and OTP.
Homomorphisms are related. They can cause similar problems.
This can later lead into how hash functions help prevent such properties. And why those are a base for authentication and the authenticated encryption modes.