Session 24 Dkim
Session 24 Dkim
INSTRUCTIONAL OBJECTIVES
LEARNING OUTCOMES
The DomainKeys was designed by Mark Delany of Yahoo! and enhanced through
comments from many others in 2004, later it was specified in RFC 4870. The
latest RFC for DKIM is 5585 issued by Internet Engineering Task Force (IETF)
Domain key identified mail protocol is one of the popular email authentication
protocol
The key is provided by the organization that is sending your email, for example
yahoo, Google etc.
In this session, we cover the working principle of DKIM (domain key identified mail)
Identity Verification
o As an assessment service of DKIM can differentiate between a domain (Signing Domain
IDentifier (SDID)) used by a known organization and a domain used by others. As such,
DKIM performs identification of messages associated with verifiable identities.
Verification
o After a message has been signed, any agent in the message transit path can verify the
signature to determine that the owner of the SDID took responsibility for the message.
Message recipients can verify the signature by querying the DNS for the signer's domain
directly,
CREATED BY K. VICTOR BABU
DKIM DESCRIPTION
DKIM?
Domain Keys Identified Mail (DKIM) is an email security standard that ensures
messages are not modified while traveling between the recipient and
sending servers.
DKIM permits organizations to take responsibility for transmitting a message in a
way a recipient can verify.
The organization can be the originating website, intermediary, etc. Their reputation
is the basis for evaluating whether or not to trust the message for delivery.
What is a DKIM Signature?
DKIM gives emails a signature header that is added to the email and secured with
encryption.
Each DKIM signature contains all the information needed for an email server to
verify that the signature is real, and a pair of DKIM keys encrypt it.
The originating email server has the 'private DKIM key,' which can be verified by the
receiving mail server or ISP with the other half of the keypair, called the 'public
DKIM key.'
These signatures travel with the emails and are verified along the way by the email
servers that move the emails toward their final destination.
CREATED BY K. VICTOR BABU
Use of DKIM
2. What is DKIM?
1. …DomainKeys Identified Mail (DKIM) is a protocol allowing for email authentication utilizing PKI.
Where does DKIM store its public certificate keys?
(a) …downloaded
(b) …uploaded
(c) …erased
(d) …transmitted
Reference Books:
1. 1. Cryptography and Network Security Principles and Practice, by William
Stallings, Pearson, 7th edition, 2017.
2. Cryptography And Network Security by Behrouz A. Forouzan, Debdeep
Mukhopadhyay, TataMcGraw Hill Education Private Limited, Fourth edition
2015.
3. William Stallings, “Network Security Essentials”, Pearson Education, 7th
Edition, 2017.
Sites and Web links:
4. 1. https://www.linkedin.com/learning/it-security-foundations-network-security-
15189799linkedin Programming Foundations: Algorithms https://
www.linkedin.com/learning/programming- foundations-algorithms
5. www.cise.ufl.edu/~sahni/cop3530
6. https://www.linkedin.com/learning/learning-cryptography-and-network-
security