A secret message! The fairytale of DKIM

Once upon a time, the brave and handsome king of Rubrum Colatorium decided to send his beautiful and wise queen a message from the battlefield.

With enemies lurking all around, he needed to find a way to make sure no one got his hands on the secret communiqué.

He put his letter in a box, and put a padlock on it, for which only he had the key. When the queen received the box, she put her own padlock on the box as well (for which only she had the key) and sent the box with two locks back. The king took off his lock, and sent the box forth once more. The queen removed her lock, thereby opening the box. The box was always locked in transit, the contents secure.

This is exactly what happens in asymmetric cryptography.

DKIM (Domain Keys Identified Mail) which uses asymmetric cryptography, is one of the underlying technologies used by the DMARC protocol.

If you would like to learn more about DKIM, DMARC, and how they can protect your emails against spoofing, contact us, it’s what we do!

Stay secure!

PUBLISHED BY

tunc

16 Apr. 2019

SHARE ARTICLE:

Categories

Recent Posts

VIEW ALL
Security

How to drive cybersecurity as a top business priority

Jack Lilley

Everyone has a role to play in protecting the enterprise. Whether you’re shaping strategy or implementing solutions, aligning efforts to mitigate critical risks ensures a stronger, more resilient enterprise. If you missed Red Sift’s recent webinar on “From Data to Buy-In: Driving Cybersecurity as a Top Business Priority” we’ve got you covered. The session…

Read more
DMARC

BreakSPF: How to mitigate the attack

Red Sift

BreakSPF is a newly identified attack framework that exploits misconfigurations in the Sender Policy Framework (SPF) a widely used email authentication protocol. A common misconfiguration involves overly permissive IP ranges, where SPF records allow large blocks of IP addresses to send emails on behalf of a domain. These ranges often include shared infrastructures like…

Read more
Certificates

Never miss an expiring certificate again with Red Sift Certificates Lite

Francesca Rünger-Field

SSL/TLS certificates are the backbone of secure, uninterrupted digital experiences—but managing them effectively to prevent downtime remains a persistent challenge. With browser and certificate authorities looking to reduce certificate durations to as little as 90 or even 47 days, keeping track of renewals has never been more critical. That’s why we’re excited to introduce…

Read more
DMARC

Navigating G-Cloud 14 for DMARC solutions: A guide for former NCSC Mail…

Francesca Rünger-Field

Navigating G-Cloud 14 for DMARC solutions: A guide for former NCSC Mail Check users With the NCSC discontinuing key features of its Mail Check service, including DMARC aggregate and TLS reporting, after March 2025, UK public sector organisations must prepare for this change by transitioning to alternative email security solutions. To support this shift,…

Read more