A secret message! The fairytale of DKIM

Once upon a time, the brave and handsome king of Rubrum Colatorium decided to send his beautiful and wise queen a message from the battlefield.

With enemies lurking all around, he needed to find a way to make sure no one got his hands on the secret communiqué.

He put his letter in a box, and put a padlock on it, for which only he had the key. When the queen received the box, she put her own padlock on the box as well (for which only she had the key) and sent the box with two locks back. The king took off his lock, and sent the box forth once more. The queen removed her lock, thereby opening the box. The box was always locked in transit, the contents secure.

This is exactly what happens in asymmetric cryptography.

DKIM (Domain Keys Identified Mail) which uses asymmetric cryptography, is one of the underlying technologies used by the DMARC protocol.

If you would like to learn more about DKIM, DMARC, and how they can protect your emails against spoofing, contact us, it’s what we do!

Stay secure!

PUBLISHED BY

tunc

16 Apr. 2019

SHARE ARTICLE:

Categories

Recent Posts

VIEW ALL
DMARC

Over 60% of healthcare organizations remain unprotected against data breaches

Sean Costigan

Introduction Red Sift’s analysis of healthcare organizations that reported large breaches to the Department of Health & Human Services (HHS) in 2023-2024 uncovered a troubling trend: post-breach, 61% remain unprotected against phishing and domain spoofing due to weak or nonexistent DMARC policies. DMARC (Domain-based Message Authentication, Reporting & Conformance) is a widely recognized security…

Read more
Awards

Red Sift wins 2025 Cybersecurity Excellence Award for OnDMARC

Jack Lilley

Executive Summary: Red Sift OnDMARC has been recognized with the 2025 Cybersecurity Excellence Award for its advanced email security solutions. By leveraging AI-powered tools like Red Sift Radar for security issues and Dynamic DNS Guardian for real-time monitoring, OnDMARC provides businesses with robust protection against phishing, spoofing, and business email compromise (BEC).  Key takeaways:…

Read more
Product Release

Red Sift’s Winter ‘24/’25 Quarterly Product Release

Francesca Rünger-Field

This quarter, we’re making security faster, smarter, and more proactive with updates that improve threat detection, reduce manual work, and prevent threats before they escalate. Highlights include: Brand Trust  Executive Impersonation: Detect unauthorized use of leadership identities By uploading and managing executive images in Brand Trust, security teams can detect and monitor unauthorized use…

Read more
AI

Enhanced logo detection with AI: A hybrid approach

Phong Nguyen

Executive Summary: Accurate logo detection is essential for protecting brands against misuse and fraudulent activities. Red Sift’s hybrid AI approach enhances detection precision, effectively balancing the reduction of false positives with the identification of genuine threats. This article: Introduction Logo detection is crucial for brand protection, helping identify logo misuse in lookalike domains and fraudulent…

Read more