To start with, what precisely is DKIM? Nicely, DKIM is an e-mail authentication protocol. It features like a digital signature by inserting code within the e-mail header, which then will get encrypted.
The recipient’s e-mail server checks this code towards a public key saved on-line. If the codes match, it confirms your e-mail is real and hasn’t been tampered with on the way in which. This helps forestall scammers from spoofing your e-mail tackle and will increase the probabilities your e-mail lands within the inbox, not the spam folder.

In cryptography, key size is essential because it determines the energy of the encryption. DKIM keys are available in varied lengths, with 1024-bit and 2048-bit being the commonest. The size of the important thing impacts how tough it’s for an attacker to crack the encryption. Longer keys present stronger safety however can also require extra computational assets.
The 1024-bit DKIM key’s the usual cryptographic key used within the DKIM e-mail authentication protocol.
1024 refers back to the size of the important thing in bits; the longer the important thing and its mathematical complexity, the tougher it’s for hackers to crack. Whereas 1024-bit keys supplied a very good degree of safety up to now, stronger encryption strategies at the moment are obtainable.
A kind of stronger encryption strategies is the 2048-bit DKIM key. Now, because the title suggests, the first distinction between 1024-bit and 2048-bit keys is the size – 2048 is double that of a regular key.
With double the important thing size, 2048-bit keys present considerably stronger encryption and are thought-about extra future-proof. They’re the present really helpful normal for DKIM.
Whereas most e-mail senders attempt to ship real, priceless content material to their subscribers, a small variety of dangerous actors spoil the expertise for everybody else.
Spammers and phishers consistently attempt to exploit e-mail methods, tricking recipients into freely giving private data like passwords or infecting their gadgets with malware. These malicious practices are sometimes disguised as emails out of your firm, probably damaging your sender status and inflicting prospects to lose belief in your model. To guard your model, we strongly advocate you authenticate your campaigns.
E-mail authentication is a set of methods used to confirm the legitimacy of an e-mail message’s origin. It helps to make sure that the e-mail sender is who they declare to be, which is essential for sustaining the integrity and safety of your campaigns.
Now, there are three main e-mail authentication protocols are:
-
SPF (Sender Coverage Framework)
-
DKIM (DomainKeys Recognized Mail)
-
DMARC (Area-based Message Authentication, Reporting, and Conformance).
Every of those protocols serves a singular function in verifying e-mail authenticity and defending towards varied forms of e-mail fraud. Seeing as we’ve already checked out DKIM, we’ll shortly run by way of the remaining two protocols.
Think about you get a letter within the mail, however the return tackle simply says, “Belief me bro Inc.” Smells slightly fishy, proper? The SPF e-mail authentication can be like writing your full firm tackle and approved mailroom on the envelope.
SPF works by creating a listing of precisely who’s allowed to ship emails from a given area (like @yourcompany.com). While you obtain an e-mail, the recipient’s server checks this document to see if the e-mail really got here from a certified supply inside the firm. This helps forestall scammers from forging e-mail addresses and impersonating your organization.
Sadly, SPF and DKIM are sometimes not sufficient on their very own to make sure your area’s safety. To do this, you’ll must implement the ultimate authentication protcol – DMARC. This protocol primarily tells receiving servers what to do with messages out of your model once they fail both SPF or DKIM. Right here’s the way it works:
-
You arrange DMARC like a safety setting. It tells e-mail receivers what to do with emails that declare to be from you however fail a examine.
-
When somebody sends an e-mail together with your tackle, DMARC checks if the sender is permitted to make use of it. It is like verifying their ID.
-
If the e-mail passes, it goes by way of like regular. But when it fails, DMARC tells the receiver what to do with it, like transfer it to spam or reject it solely. This prevents scammers from impersonating you and tricking individuals.
It’s vital to notice that each Yahoo and Gmail would require bulk senders to implement DMARC with a minimal coverage of p=none which instructs receiving mail servers to log however to not take any motion. Whereas on the subject, it’s price going by way of among the different Yoogle necessities for e-mail senders.
Again in February 2024, Google and Yahoo launched necessary necessities for e-mail senders geared toward offering a greater, safer inbox expertise for customers. Now, it’s price noting that these necessities are merely finest practices which have existed for effectively over 10+ years now. In actual fact, many e-mail senders already meet them. The distinction is they are going to now be enforced.
Listed here are three key necessities you have to to prioritize:
-
E-mail authentication: Senders can be required to confirm their identities with the usual protocols SPF, DKIM, and DMARC.
-
Add a one-click unsubscribe header: Senders might want to implement a sound Checklist-Unsubscribe header inside emails in the event that they haven’t already, to permit recipients to simply choose out.
-
Solely ship emails customers need: Gmail and Yahoo are getting severe about spam monitoring and senders might want to guarantee they’re conserving beneath a set spam charge threshold.
These mandates will solely have an effect on bulk senders. Whereas Yahoo has steered away from giving a particular quantity, Google has set a determine of 5000 or extra messages to Gmail addresses in in the future.
We not too long ago sat down with Yahoo’s Senior Director of Product, Marcel Becker, Google’s Director of Product Anti-Abuse and Security, Anu Yamunan, and Sinch Mailgun’s Vice President of Deliverability, Kate Nowrouzi, to breakdown these new necessities and talk about what they imply for senders. You may watch the complete recap beneath:
All Sinch Mailjet customers’ sending domains will now default to a 2048-bit DKIM authentication, whereas present authenticated domains (1024-bit) might be up to date to the brand new normal, offering enhanced safety and reliability towards refined e-mail threats.
Along with 2048-bit DKIM, Sinch Mailjet now helps 4096-bit DKIM for even higher safety. Once more, this enables customers to decide on the next degree of encryption for his or her area authentication wants.
Contact our assist staff to get help together with your e-mail authentication protocol setup. Our staff of e-mail specialists can be very happy to reply any questions or considerations you could have.
Contact Help Crew