Chapter 3 covers public key cryptography and message authentication, emphasizing the importance of verifying message authenticity and integrity against both passive and active attacks. It introduces various methods for message authentication, including the use of message authentication codes (MACs) and one-way hash functions, and the properties required for secure hash functions. The chapter highlights that while encryption provides confidentiality, authentication functions can be implemented separately to ensure message integrity without necessarily encrypting the message itself.