Chapter 11 discusses message authentication and hash functions, focusing on protecting message integrity and validating the originator's identity. It covers security requirements, message encryption methods, and describes message authentication codes (MACs) and hash functions, including their properties and requirements. The chapter emphasizes the need for secure MACs and hash functions due to potential attacks, highlighting the importance of avoiding collisions in their implementation.