Published on

What is DKIM?

Authors
  • avatar
    Name
    Skip2 Networks
    Title
    Content Manager
    Twitter

DKIM

What is DKIM?

DomainKeys Identified Mail (DKIM) is an email authentication protocol that allows organizations to digitally sign their outgoing emails, providing recipients with a cryptographic method to verify that messages genuinely originated from the claimed sender and haven't been tampered with during transmission. DKIM works by adding a digital signature to email headers using public-key cryptography. When an email is sent, the sending server creates a unique hash of specific email components and encrypts it with a private key. The corresponding public key is published in the sender's DNS records, allowing receiving mail servers to decrypt and verify the signature.

This authentication mechanism has become increasingly important as email security threats continue to evolve. DKIM helps combat email spoofing, phishing attacks, and domain impersonation by providing a reliable way to verify sender authenticity. Major email providers like Gmail, Outlook, and Yahoo use DKIM verification as part of their spam filtering algorithms, meaning properly configured DKIM can significantly improve email deliverability rates. For businesses relying on email marketing, transactional emails, or any form of email communication, DKIM implementation is essential for maintaining sender reputation and ensuring messages reach their intended recipients.

DKIM Implementation Example

An e-commerce company notices their order confirmation emails are frequently landing in customers' spam folders, causing confusion and support tickets. After implementing DKIM, they generate a public-private key pair and publish the public key in their DNS records as a TXT record at "selector1._domainkey.company.com". Their email server now signs all outgoing messages with the private key. When Gmail receives an order confirmation, it automatically looks up the public key from DNS, verifies the signature, and recognizes the email as legitimate, delivering it directly to the customer's inbox instead of the spam folder.

DKIM Record Components

ComponentExamplePurpose
Selectorselector1Identifies which key pair to use
Domaincompany.comThe domain being authenticated
Public KeyMIGfMA0GCSqGSIb3...Cryptographic key for verification
DNS Recordselector1._domainkey.company.comWhere the public key is published

DKIM Configuration Elements

  • Key Length - Typically 1024-bit or 2048-bit RSA keys
  • Signature Algorithm - Usually RSA-SHA256 for security
  • Canonicalization - How email content is normalized before signing
  • Selector Rotation - Regular key updates for enhanced security
  • Body Hash - Ensures email content hasn't been modified

Benefits of DKIM Implementation

  • Improved Deliverability - Better inbox placement rates
  • Brand Protection - Prevents domain spoofing and impersonation
  • Compliance Support - Meets requirements for DMARC policies
  • Reputation Building - Establishes trust with email providers
  • Security Enhancement - Detects message tampering during transit

Learn more

Explore the entire CDN Glossary

Skip2 CDN Glossary

Sign up for our newsletter

Get Started