摘要:With ever-increasing network connectivity, message integrity and authenticity are critical. The primary building component of message integrity is cryptographic hash the functions. Hash functions are utilized and developed in a variety of ways. The purpose of this study is to a propose and discuss the new keyed hash function. The Hash function and the Henon map are used in this suggested technique. For whatever length of input, this technique generates a 128-bit hash code. The function hashes a message with a key so that an intruder who doesn't know the key can't fabricate the hash code, and so it meets a security, authentication, and integrity requirements for the communication in a network. The paper explains the function design an algorithm, as well as its security and implementation details. The simulation findings suggest that a text authentication and forensics algorithm with strong tampering localization ability may be utilized to authenticate and forensics text authenticity and integrity.