Chapter 11 of 'Cryptography and Network Security' discusses cryptographic hash functions, emphasizing their role in data integrity and security applications. It explains the properties of good hash functions, the generation and use of message digests for authentication, and the implementation of message authentication codes (MACs) and digital signatures. The chapter also covers various applications of hash functions, such as password protection and intrusion detection, while highlighting potential attack vectors and the importance of secure implementations.