{"id":29751,"date":"2022-09-13T10:34:43","date_gmt":"2022-09-13T10:34:43","guid":{"rendered":"https:\/\/easydmarc.com\/blog\/?p=29751"},"modified":"2025-04-23T12:16:53","modified_gmt":"2025-04-23T12:16:53","slug":"what-is-dkim-a-bit-of-history","status":"publish","type":"post","link":"https:\/\/easydmarc.com\/blog\/what-is-dkim-a-bit-of-history\/","title":{"rendered":"What is DKIM? \u2013 A Bit of History"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">We live in a time when email scams are widespread. There have been many efforts to make this form of communication more secure. DKIM is one of them.\u00a0<\/span><\/p>\n<p><b>But what is DKIM?<\/b><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">How does it work? How did it come to be, and how does it improve email communications worldwide? In this blog post, we&#8217;re exploring all relevant aspects related to DKIM.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Let&#8217;s begin with a quick <\/span><b>DKIM definition<\/b><span style=\"font-weight: 400;\">. DKIM stands for DomainKeys Identified Email. DKIM is a security protocol that allows recipients to verify whether a genuine email domain sends all received messages. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">With DKIM, a private and encrypted digital signature is assigned to every email sent from your domain. Receiving servers then authenticate this digital signature using a public decryption key. DKIM also works as a filter to ensure the message&#8217;s content hasn&#8217;t been tampered with during traffic.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It was created out of the need to increase security in online communications. It&#8217;s one of the systems designed to replace the old Simple Mail Transfer Protocol (SMPT). It\u2019s also an integral part of <\/span><a href=\"https:\/\/easydmarc.com\/blog\/what-is-a-dmarc-policy\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">DMARC<\/span><\/a><span style=\"font-weight: 400;\">, working together with SPF.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Regarding <\/span><span style=\"font-weight: 400;\">DKIM vs. SPF<\/span><span style=\"font-weight: 400;\">, both protocols protect against spam, <\/span><a href=\"https:\/\/easydmarc.com\/blog\/what-is-spoofing-definition-and-explanation\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">spoofing<\/span><\/a><span style=\"font-weight: 400;\">, and <\/span><a href=\"https:\/\/easydmarc.com\/blog\/12-types-of-phishing-attacks-and-how-to-identify-them\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">phishing<\/span><\/a><span style=\"font-weight: 400;\">. However, there needs to be a comparison between DKIM vs. DMARC, as the latter improves and enhances the features of <a href=\"https:\/\/easydmarc.com\/blog\/email-authentication-how-to-authenticate-your-email-with-dmarc-dkim-and-spf\/\" target=\"_blank\" rel=\"noopener\">DKIM and SPF to provide unparalleled email security.<\/a><\/span><\/p>\n<p><span style=\"font-weight: 400;\">With DKIM, a digital signature is verified using cryptographic protocols. This process works using a key pair, one private and one public\u2014published in the DNS. That\u2019s where <\/span><a href=\"https:\/\/easydmarc.com\/blog\/dkim-record-how-to-create-add-and-check-dkim-records\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">adding a DKIM record to your DNS<\/span><\/a><span style=\"font-weight: 400;\"> comes in.<\/span><\/p>\n<p><a href=\"https:\/\/easydmarc.com\/blog\/what-is-dkim\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">What is a DKIM record?<\/span><\/a><span style=\"font-weight: 400;\"> Essentially, it\u2019s a DNS TXT record containing the public key that a receiving email server uses to match an email signed with a private key. While it\u2019s vital to know<\/span><span style=\"font-weight: 400;\"> how a DKIM record works<\/span><span style=\"font-weight: 400;\">, this post is more about how DKIM came to be.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">DKIM combines two security standards. The first one is the Enhanced DomainKeys created by Yahoo! which uses a public\/private key pair to verify an email. Based on a few specs, it relied on a basic binary system to decide when an email should be accepted or rejected in any inbox.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">DomainKeys was created by Mark Delany in 2004. The security protocols were enhanced and improved by many other team members. It was finally published in 2007. The backstory of DomainKeys can be traced to RFC 4870, superseded by RFC 4871. The basic structure of the system is registered under U.S. Patent 6,986,049.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The second security standard is Identified Internet Mail (IIM), created by Jim Fenton and Michael Thomas at CISCO. The original system used digital signatures included in the message of all emails sent to verify their legitimacy.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Today, the <\/span><span style=\"font-weight: 400;\">DKIM signature<\/span><span style=\"font-weight: 400;\"> is visible to receivers as an additional message header, and the verification takes place via the Mail Transfer Agent (MTA). It&#8217;s an integral part of DKIM and DMARC technology.<\/span><\/p>\n<h2><b>DomainKeys by Yahoo!<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">When Yahoo! created DomainKeys, the goal was to implement a verification system for the sending domain and body of an email. The mechanism was based on quick inspections with a straight &#8220;yes or no&#8221; approach, delivering emails to the spam folder or inbox.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This signature-based authentication standard initially used a key pair, one private and one public.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The process is very similar to modern DKIM protocols. But the workaround was more complex. There are two distinct processes, one from sending servers and the other from receiving servers.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Yahoo! designed DomainKeys to help organizations such as banks, ecommerce stores, etc. combat email spoofing and phishing attacks while protecting users. The proposed open-standard authentication standard would become DKIM as we know it today, with the collaborative efforts of industry leaders like IBM, Microsoft, VeriSign, and CISCO.<\/span><\/p>\n<h2><b>Identified Internet Mail by CISCO<\/b><\/h2>\n<p><b>What is DomainKeys Identified Mail<\/b><span style=\"font-weight: 400;\"> without Identified Internet Email, or IIM, created by CISCO? This system offered a means to apply cryptographic signatures to email messages for verification purposes. Recipient servers could check the signature, verify the sender&#8217;s domain, and authenticate the message.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Email administrators could operate this system using Mail Transfer Agents (MTA) or Mail User Agents (MUAs) to authenticate the source of emails.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Both methods used public and private keys, allowing senders to sign their outgoing messages. However, receivers needed the same specialized software as senders to verify the integrity of the signature.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">According to the Internet Draft published by Cisco in 2005, the goal of IIM was not only about combatting email spoofing. Identified Internet Mail was also designed to give recipients the ability to classify and prioritize desired emails.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">By providing a mechanism to differentiate authentic mail from unsolicited spam and other emails, CISCO wanted to build a foundation for reputation and accreditation tools. The inventors hoped that a combination of such specifications would ultimately marginalize spam and fraudulent emails to the extent that they wouldn\u2019t be as problematic anymore.<\/span><\/p>\n<h2><b>How DKIM Came Together<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Yahoo! and CISCO realized the potential of their technologies and decided to merge them into a single security protocol in 2007. Their collaboration set the basis for the IETF standards that eventually led to the creation of STD 76, currently known as the RFC 6376.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">First published in 2011, this document details\u00a0 DKIM protocols and how they should work.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Multiple email service providers thoroughly tested DKIM. Despite its bumpy start, it finally became a fixture with Yahoo!, Gmail, AOL, and FastMail. When it was first applied, the strict verification process discarded millions of messages lacking a digital signature.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The early adopters of the policy decided to change their mail list software instead of making changes to DKIM.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Today, DKIM is one of the three central policies included in DMARC protocols and one of the primary components of email security. DKIM has not remained stagnant, and it&#8217;s constantly being improved. RFC 8301, issued in 2018, updated the sizes of all digital keys from 512-2048 bits to 1024-4096 bits. RFC 8463, published the same year, added a new key type that made public keys shorter and more robust.<\/span><\/p>\n<h2><b>Final Thoughts<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Knowing <\/span><b>what DKIM authentication<\/b><span style=\"font-weight: 400;\">\u00a0<strong>helps<\/strong> you understand its importance in securing your email domain.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">DKIM is a signature-based email authentication protocol that validates your domain as a verified sender, protecting your recipients and your company\u2019s brand reputation from fraudulent exploits.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">DKIM was created by merging two security protocols: DomainKeys and\u00a0 Identified Internet Mail or IIM, created by CISCO.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you want to <\/span><a href=\"https:\/\/easydmarc.com\/blog\/dkim-record-how-to-create-add-and-check-dkim-records\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">create a DKIM record<\/span><\/a><span style=\"font-weight: 400;\"> for your website, make sure to run a <\/span><a href=\"https:\/\/easydmarc.com\/tools\/dkim-lookup\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">DKIM lookup<\/span><\/a><span style=\"font-weight: 400;\"> first. If none exist, use our <\/span><a href=\"https:\/\/easydmarc.com\/tools\/dkim-record-generator\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">DKIM generator<\/span><\/a><span style=\"font-weight: 400;\"> and increase your reputation as a sender. <span data-preserver-spaces=\"true\">Remember the importance of DMARC, too, and get on the right track to improve your\u00a0<\/span><a class=\"editor-rtfLink\" href=\"https:\/\/easydmarc.com\/tools\" target=\"_blank\" rel=\"noopener\"><span data-preserver-spaces=\"true\">email security<\/span><\/a><span data-preserver-spaces=\"true\">.<\/span><\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We live in a time when email scams &#8230;<\/p>\n","protected":false},"author":1,"featured_media":31686,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[204,287,203],"tags":[],"class_list":["post-29751","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-dkim","category-email-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>What is DKIM? \u2013 A Bit of History | EasyDMARC<\/title>\n<meta name=\"description\" content=\"What is DKIM authentication? Where does it come from and how does it work?Learn all about DKIM, its workings, and its purpose here.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/easydmarc.com\/blog\/what-is-dkim-a-bit-of-history\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is DKIM? \u2013 A Bit of History\" \/>\n<meta property=\"og:description\" content=\"What is DKIM authentication? Where does it come from and how does it work?Learn all about DKIM, its workings, and its purpose here.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/easydmarc.com\/blog\/what-is-dkim-a-bit-of-history\/\" \/>\n<meta property=\"og:site_name\" content=\"EasyDMARC\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/EasyDMARC\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-13T10:34:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-23T12:16:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/09\/What-is-DKIM_-\u2013-A-bit-of-History-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"910\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EasyDMARC\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:site\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EasyDMARC\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-dkim-a-bit-of-history\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-dkim-a-bit-of-history\\\/\"},\"author\":{\"name\":\"EasyDMARC\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/449261e9810b270cc697c7c9c5b89e97\"},\"headline\":\"What is DKIM? \u2013 A Bit of History\",\"datePublished\":\"2022-09-13T10:34:43+00:00\",\"dateModified\":\"2025-04-23T12:16:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-dkim-a-bit-of-history\\\/\"},\"wordCount\":1113,\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-dkim-a-bit-of-history\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/What-is-DKIM_-\u2013-A-bit-of-History-1.jpg\",\"articleSection\":[\"Blog\",\"DKIM\",\"Email Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-dkim-a-bit-of-history\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-dkim-a-bit-of-history\\\/\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-dkim-a-bit-of-history\\\/\",\"name\":\"What is DKIM? \u2013 A Bit of History | EasyDMARC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-dkim-a-bit-of-history\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-dkim-a-bit-of-history\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/What-is-DKIM_-\u2013-A-bit-of-History-1.jpg\",\"datePublished\":\"2022-09-13T10:34:43+00:00\",\"dateModified\":\"2025-04-23T12:16:53+00:00\",\"description\":\"What is DKIM authentication? Where does it come from and how does it work?Learn all about DKIM, its workings, and its purpose here.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-dkim-a-bit-of-history\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-dkim-a-bit-of-history\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-dkim-a-bit-of-history\\\/#primaryimage\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/What-is-DKIM_-\u2013-A-bit-of-History-1.jpg\",\"contentUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/What-is-DKIM_-\u2013-A-bit-of-History-1.jpg\",\"width\":1440,\"height\":910,\"caption\":\"What is DKIM \u2013 A bit of History 1\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-dkim-a-bit-of-history\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Email Security\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/email-security\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"DKIM\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/email-security\\\/dkim\\\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"What is DKIM? \u2013 A Bit of History\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/\",\"name\":\"EasyDMARC\",\"description\":\"Blog\",\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/#organization\",\"name\":\"EasyDMARC\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/img\\\/logo.png\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/EasyDMARC\\\/\",\"https:\\\/\\\/x.com\\\/easydmarc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/easydmarc\\\/mycompany\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/449261e9810b270cc697c7c9c5b89e97\",\"name\":\"EasyDMARC\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"caption\":\"EasyDMARC\"},\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/author\\\/easydmarc\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What is DKIM? \u2013 A Bit of History | EasyDMARC","description":"What is DKIM authentication? Where does it come from and how does it work?Learn all about DKIM, its workings, and its purpose here.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/easydmarc.com\/blog\/what-is-dkim-a-bit-of-history\/","og_locale":"en_US","og_type":"article","og_title":"What is DKIM? \u2013 A Bit of History","og_description":"What is DKIM authentication? Where does it come from and how does it work?Learn all about DKIM, its workings, and its purpose here.","og_url":"https:\/\/easydmarc.com\/blog\/what-is-dkim-a-bit-of-history\/","og_site_name":"EasyDMARC","article_publisher":"https:\/\/www.facebook.com\/EasyDMARC\/","article_published_time":"2022-09-13T10:34:43+00:00","article_modified_time":"2025-04-23T12:16:53+00:00","og_image":[{"width":1440,"height":910,"url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/09\/What-is-DKIM_-\u2013-A-bit-of-History-1.jpg","type":"image\/jpeg"}],"author":"EasyDMARC","twitter_card":"summary_large_image","twitter_creator":"@easydmarc","twitter_site":"@easydmarc","twitter_misc":{"Written by":"EasyDMARC","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/easydmarc.com\/blog\/what-is-dkim-a-bit-of-history\/#article","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/what-is-dkim-a-bit-of-history\/"},"author":{"name":"EasyDMARC","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/449261e9810b270cc697c7c9c5b89e97"},"headline":"What is DKIM? \u2013 A Bit of History","datePublished":"2022-09-13T10:34:43+00:00","dateModified":"2025-04-23T12:16:53+00:00","mainEntityOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/what-is-dkim-a-bit-of-history\/"},"wordCount":1113,"publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/what-is-dkim-a-bit-of-history\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/09\/What-is-DKIM_-\u2013-A-bit-of-History-1.jpg","articleSection":["Blog","DKIM","Email Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/easydmarc.com\/blog\/what-is-dkim-a-bit-of-history\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/easydmarc.com\/blog\/what-is-dkim-a-bit-of-history\/","url":"https:\/\/easydmarc.com\/blog\/what-is-dkim-a-bit-of-history\/","name":"What is DKIM? \u2013 A Bit of History | EasyDMARC","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/what-is-dkim-a-bit-of-history\/#primaryimage"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/what-is-dkim-a-bit-of-history\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/09\/What-is-DKIM_-\u2013-A-bit-of-History-1.jpg","datePublished":"2022-09-13T10:34:43+00:00","dateModified":"2025-04-23T12:16:53+00:00","description":"What is DKIM authentication? Where does it come from and how does it work?Learn all about DKIM, its workings, and its purpose here.","breadcrumb":{"@id":"https:\/\/easydmarc.com\/blog\/what-is-dkim-a-bit-of-history\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/easydmarc.com\/blog\/what-is-dkim-a-bit-of-history\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/easydmarc.com\/blog\/what-is-dkim-a-bit-of-history\/#primaryimage","url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/09\/What-is-DKIM_-\u2013-A-bit-of-History-1.jpg","contentUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/09\/What-is-DKIM_-\u2013-A-bit-of-History-1.jpg","width":1440,"height":910,"caption":"What is DKIM \u2013 A bit of History 1"},{"@type":"BreadcrumbList","@id":"https:\/\/easydmarc.com\/blog\/what-is-dkim-a-bit-of-history\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/easydmarc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"Email Security","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/email-security\/"},{"@type":"ListItem","position":4,"name":"DKIM","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/email-security\/dkim\/"},{"@type":"ListItem","position":5,"name":"What is DKIM? \u2013 A Bit of History"}]},{"@type":"WebSite","@id":"https:\/\/easydmarc.com\/blog\/#website","url":"https:\/\/easydmarc.com\/blog\/","name":"EasyDMARC","description":"Blog","publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/easydmarc.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/easydmarc.com\/#organization","name":"EasyDMARC","url":"https:\/\/easydmarc.com\/","logo":{"@type":"ImageObject","url":"https:\/\/easydmarc.com\/img\/logo.png"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/EasyDMARC\/","https:\/\/x.com\/easydmarc","https:\/\/www.linkedin.com\/company\/easydmarc\/mycompany\/"]},{"@type":"Person","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/449261e9810b270cc697c7c9c5b89e97","name":"EasyDMARC","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","caption":"EasyDMARC"},"url":"https:\/\/easydmarc.com\/blog\/author\/easydmarc\/"}]}},"jetpack_featured_media_url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/09\/What-is-DKIM_-\u2013-A-bit-of-History-1.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/29751","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/comments?post=29751"}],"version-history":[{"count":1,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/29751\/revisions"}],"predecessor-version":[{"id":46219,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/29751\/revisions\/46219"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media\/31686"}],"wp:attachment":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media?parent=29751"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/categories?post=29751"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/tags?post=29751"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}