A secret message! The fairytale of DKIM

Once upon a time, the brave and handsome king of Rubrum Colatorium decided to send his beautiful and wise queen a message from the battlefield.

With enemies lurking all around, he needed to find a way to make sure no one got his hands on the secret communiqué.

He put his letter in a box, and put a padlock on it, for which only he had the key. When the queen received the box, she put her own padlock on the box as well (for which only she had the key) and sent the box with two locks back. The king took off his lock, and sent the box forth once more. The queen removed her lock, thereby opening the box. The box was always locked in transit, the contents secure.

This is exactly what happens in asymmetric cryptography.

DKIM (Domain Keys Identified Mail) which uses asymmetric cryptography, is one of the underlying technologies used by the DMARC protocol.

If you would like to learn more about DKIM, DMARC, and how they can protect your emails against spoofing, contact us, it’s what we do!

Stay secure!

PUBLISHED BY

tunc

16 Apr. 2019

SHARE ARTICLE:

Categories

Recent Posts

VIEW ALL
DMARC

Navigating G-Cloud 14 for DMARC solutions: A guide for former NCSC Mail…

Francesca Rünger-Field

Navigating G-Cloud 14 for DMARC solutions: A guide for former NCSC Mail Check users With the NCSC discontinuing key features of its Mail Check service, including DMARC aggregate and TLS reporting, after March 2025, UK public sector organisations must prepare for this change by transitioning to alternative email security solutions. To support this shift,…

Read more
DMARC

Mail Check is changing: What UK public sector organisations must know about…

Jack Lilley

The National Cyber Security Centre (NCSC) has suggested a change to Mail Check services starting on 24 March 2025. This change mainly involves ending DMARC aggregate reporting. This change comes as a measure to expand the services provided by Mail Check to any UK based organisation, while also limiting the cost and complexity of…

Read more
DMARC

Beyond DMARC: How Red Sift OnDMARC supports comprehensive DNS hygiene

Red Sift

Registrable domains and DNS play a crucial role in establishing online identity and trust, but their importance is often taken for granted. During new service setups, record updates are often overlooked, accumulating outdated entries. As infrastructure teams become increasingly overstretched,  services may be incorrectly shut down without proper cleanup, leaving behind a sprawl of…

Read more
DKIM

First look at DKIM2: The next generation of DKIM

Red Sift

In 2011, the original DomainKeys Identified Mail (DKIM1) standard was published. It outlined a method allowing a domain to sign emails, enabling recipients to verify that the email originated from an entity holding a private key that matches the public key published in the domain’s DNS records. Now in 2024, DKIM is ready for…

Read more