Proton
What is DKIM?

DKIM is an email authentication method that verifies that a message hasn’t been tampered with in transit. Learn how it works and why you need it to protect your email domain.

Along with the other main email authentication methods, SPF and DMARC(new window), DKIM helps prevent email spoofing (messages with forged sender addresses), spam, and phishing attacks.

We explain DKIM, how it works, and why you need it to protect your domain and ensure your messages are delivered.

What is DKIM?
What is DKIM used for?
What’s the difference between DKIM, SPF, and DMARC?
How does DKIM work?
What is a DKIM signature?
What is a DKIM record?
What is a DKIM selector?
Why use DKIM?
Protect your domain
Improve email deliverability
Build your domain reputation
Easy DKIM setup with Proton Mail

What is DKIM?

DKIM (DomainKeys Identified Mail) is an open standard for email authentication that cryptographically “signs” an email, helping verify that its sender’s address hasn’t been forged (spoofed) and its message hasn’t been tampered with in transit.

DKIM ensures that an email sent from your domain (for example, @yourdomain.com) is signed with an encryption key owned by your domain. This verifies that it came from a legitimate email server, not an attacker’s server that spoofed your domain.

What is DKIM used for?

DKIM is one of the main methods email servers use to authenticate emails. Together with SPF and DMARC, email platforms use DKIM to identify spoofed addresses, helping to sort and prevent spam and potential phishing emails.

If you send emails from your own domain (for example, yourname@yourdomain.com), you should use DKIM to help prevent attackers from spoofing it. If you don’t use DKIM, messages from your domain could be marked as spam or rejected by receiving mail servers.

What’s the difference between DKIM, SPF, and DMARC?

DKIM, SPF, and DMARC are email authentication methods that are used together to verify that emails are genuine. Here are the different roles they play:

  • DKIM (DomainKeys Identified Mail) cryptographically verifies that the sender’s address and email contents haven’t been changed in transit.
  • SPF (Sender Policy Framework) verifies that an email has been sent from an IP address authorized to send emails from the sender’s domain.
  • DMARC (Domain-based Message Authentication, Reporting, and Conformance) makes sure that the domain in DKIM and SPF checks matches the sender’s domain in the From field. It also specifies how email service providers should deliver a message that fails both DKIM and SPF: They can accept, reject, or mark it as spam.

Learn how to set up DKIM, SPF, and DMARC with Proton Mail

Get Proton Mail button

How does DKIM work?

DKIM uses public-key cryptography(new window) to add a digital signature to an email.

The server sending the email uses its DKIM private key to “sign” the email. When the message arrives, the server receiving the mail verifies the signature using the corresponding DKIM public key.

Here’s what happens when you send an email with DKIM:

  1. The sending mail server creates a hash of the email contents (the From field, subject, message body, etc.) and encrypts it using a private key that only trusted sending mail servers know. 
  2. The server adds the hash to the email header in a DKIM signature.
  3. When the email arrives, the receiving mail server looks up the corresponding public key in your domain’s DNS records and decrypts the hash in the DKIM signature.
  4. The receiving mail server then generates its own hashes from the message body and the fields in the email and compares them with the decrypted hashes in the DKIM signature.
  5. If the hashes match, this verifies that the email hasn’t been changed while being sent, and it passes DKIM.

In short, if an email passes DKIM, we learn that: 

  • The message was sent from the domain in the DKIM signature
  • The message hasn’t been tampered with in transit

If a message fails DKIM, the email is treated as suspicious: The receiving server may send it to the recipient’s spam folder or reject it.

How DKIM works
How DKIM works

What is a DKIM signature?

A DKIM signature is a digital signature that’s added to an email header to allow the receiving server to verify cryptographically that the message hasn’t been tampered with.

A DKIM signature consists of a series of tags, like v=1, a=rsa-sha256, etc., as in this example:

Here’s what the main tags mean:

DKIM signature tagMeaningRequired?
v=1DKIM version number (should always be v=1) Yes
aAlgorithm used to create the digital signatureYes
dDomain name (used with the DKIM selector to locate the public key)Yes
sDKIM selector (used to locate the public key — see below)Yes
tSignature timeNo
xExpiration timeNo
bhHash of the message bodyYes
hList of the header fields included in the signature (separated by colons)Yes
The digital signature generated from bh and h and signed with the private keyYes
What DKIM signature tags mean

When a sent email arrives, here’s how the DKIM signature is checked:

  1. The receiving mail server uses the DKIM selector (s) and domain name (d) to locate and fetch the public key and decrypt the digital signature (b).
  2. The server then creates its own hash from the message body and checks it matches the hash in the bh field. Then it creates a hash of the headers (including the DKIM signature containing the bh field) and compares that hash with the digital signature it decrypts using the public key.
  3. If these hashes match, this verifies that the email hasn’t been altered and the message passes DKIM.

What is a DKIM record?

A DKIM record is where the DKIM public key is stored. The DKIM record is published and publicly available on a domain’s DNS server, so any receiving mail server can retrieve it to verify a DKIM signature.

A DKIM record includes:

  1. The DKIM selector
  2. The email domain
  3. The public key

By looking for a particular DKIM selector and domain name, a receiving email server can find the corresponding public key to check a DKIM signature.

What is a DKIM selector?

A DKIM selector is a unique name that indicates where the public key is stored in a domain’s DNS server. It’s stored together with your domain name in a DKIM record.

When you send an email with DKIM, the DKIM selector is included in the DKIM signature as an s= tag. In the example below, the DKIM selector is protonmail2

You can see the DKIM selector for your domain by emailing yourself and checking the DKIM signature in the email header.

Why use DKIM?

If you have your own domain name, we strongly recommend implementing DKIM, SPF, and DMARC. Here’s why:

Protect your domain

DKIM makes it hard for attackers to send emails pretending to be from your domain (email spoofing). Enabling DKIM will help to prevent bad actors from using your domain for spam or phishing attacks.

Improve email deliverability

Emails with a DKIM signature appear more legitimate and can be verified by a receiving mail server. So implementing DKIM for emails you send reduces the chances of them ending up in the spam folder. 

Build your domain reputation

The more you send emails that pass DKIM and other authentication checks, the more you improve your domain’s sending reputation with internet service providers (ISPs) and email providers. So DKIM can help improve your emails’ deliverability over the long term. 

Easy DKIM setup with Proton Mail

If you have your own domain, it’s easy to set up email authentication to protect it with a Proton Mail paid plan. We take you step by step through the process of setting up your custom domain with DKIM, SPF, and DMARC authentication.

Set up a single domain with Proton Mail Plus or get Proton Unlimited with support for three domains, 15 addresses, 500 GB of storage, and unlimited hide-my-email aliases.

If you have a business, secure your email with Proton for Business. If you don’t have a domain and just want secure email that respects your privacy, get our Proton Free plan.

All Proton plans include end-to-end encrypted Proton Mail, Proton Calendar, Proton Drive, and Proton VPN(new window).

So join us, and stay secure!

Secure your emails, protect your privacy
Get Proton Mail free

Related articles

How to delete all photos from Google Photos
Using Google Photos to store and share your pictures means allowing the company to see, analyze, and process them. Many people concerned about their privacy have taken steps to move away from the Google ecosystem, despite the company’s efforts to hid
Proton Wallet
  • Product updates
  • Proton news
  • Proton Wallet
WHAT IS PROTON WALLET? Our long-term vision is for Proton Wallet to be a digital wallet that gives you full control of your digital assets. While the type of assets that you can hold in Proton Wallet may evolve over time as we add more capabilities
  • Privacy guides
Bitcoin is an innovative payment network that leverages peer-to-peer transactions to remove the need for a central bank. Bitcoin has revolutionized the core principles of value exchange by showing that a network of fully independent nodes can operate
Proton Wallet is a digital asset wallet that currently supports self-custody on-chain Bitcoin. In this article, we review the key features and security architecture that make Proton Wallet a private and secure wallet that is as easy to use as email.
proton scribe
Most of us send emails every day. Finding the right words and tone, however, can take up a lot of time. Today we’re introducing Proton Scribe, a smart, privacy-first writing assistant built right into Proton Mail that helps you compose and improve yo
People and companies are generally subject to the laws of the country and city where they are located, and those laws can change when they move to a new place. However, the situation becomes more complicated when considering data, which can be subjec