A secret message! The fairytale of DKIM

Once upon a time, the brave and handsome king of Rubrum Colatorium decided to send his beautiful and wise queen a message from the battlefield.

With enemies lurking all around, he needed to find a way to make sure no one got his hands on the secret communiqué.

He put his letter in a box, and put a padlock on it, for which only he had the key. When the queen received the box, she put her own padlock on the box as well (for which only she had the key) and sent the box with two locks back. The king took off his lock, and sent the box forth once more. The queen removed her lock, thereby opening the box. The box was always locked in transit, the contents secure.

This is exactly what happens in asymmetric cryptography.

DKIM (Domain Keys Identified Mail) which uses asymmetric cryptography, is one of the underlying technologies used by the DMARC protocol.

If you would like to learn more about DKIM, DMARC, and how they can protect your emails against spoofing, contact us, it’s what we do!

Stay secure!

PUBLISHED BY

Red Sift

16 Apr. 2019

SHARE ARTICLE:

Categories

Recent Posts

VIEW ALL
Product Release

Red Sift’s Quarterly Product Release, Fall 2025

Francesca Rünger-Field

This Fall marks a major expansion of Red Sift Brand Trust with the launch of Social Media Monitoring, a new add-on that helps organizations detect and respond to fraudulent company and executive profiles across platforms such as Facebook, Instagram, LinkedIn, TikTok, and X. By extending protection beyond domains, Brand Trust now gives security teams…

Read more
AI

Red Sift’s AI Agent, Part III: Performance in action

Phong Nguyen

This is the third article in our AI Agent series. In Part 1, we introduced Red Sift’s AI Agent for lookalike classification – an intelligent solution for handling the ambiguous cases that rule-based automation can’t confidently resolve, offering analyst-grade triage autonomously. In Part 2, we took readers behind the scenes to explore the engineering…

Read more
Finance

41% of top Fintech companies are vulnerable to email phishing

Jack Lilley

Only 26% of leading Fintechs enforce DMARC at p=reject, the strongest protection against spoofing by bad actors. Phishing remains a top driver of breaches and fraud. Financial services are a prime target because email moves money, resets passwords, and confirms identity. Verizon’s 2025 Data Breach Investigations Report again lists social engineering and phishing among…

Read more
Certificates

New in Certificates Lite: Active certificate scanning and smarter expiry alerts

Francesca Rünger-Field

A quick recap Earlier this year, we launched Red Sift Certificates Lite, the free TLS certificate expiration monitoring service recommended by Let’s Encrypt. Since launch, thousands of organizations have adopted it to track their certificates and avoid expiry-related outages. What we heard from customers At launch, we had adopted Let’s Encrypt’s approach for consistency…

Read more