The DomainKeys Identified Mail (DKIM) protocol uses cryptography to add authentication to email messages. In this video, Mike Chapple explains how DKIM works to provide authentication in conjunction with mail and DNS servers.
- [Instructor] DKIM is an important…email security technology…that uses cryptography to enhance the security…of email messages.…DKIM is short for DomainKeys Identified Mail,…but honestly everybody just calls it DKIM.…DKIM uses digital signature technology…to allow domains to sign outbound email messages.…This verifies each messages authenticity.…In order to use DKIM, organizations must work…with their email provider…to create a public/private key pair…that will be associated with their domain for sending email.…
The public key is published…so that everybody in the world can find it,…while the private key is kept secret.…DKIM users publish their public key…by creating a DNS record containing the key.…As long as the domain owner retains control…of the DNS server, nobody other than the domain owner…can create a DKIM record.…Let's go ahead and take a look at a DKIM record.…I'm going to use dig to do a DNS lookup…for the DKIM record for my chapple.org domain.…
And in this response you'll find the public key…used for DKIM by my domain.…
To join one of Mike's free study groups for access to bonus tips and practice questions, visit certmike.com.
- Choosing an encryption algorithm
- Symmetric cryptography
- Data Encryption Standard
- Asymmetric cryptography
- Key management, including key exchange
- Public key infrastructure
- Transport encryption
- Cryptanalytics attacks
Skill Level Intermediate
Q: This course was updated on 07/27/2018. What changed?
A: The following topic was updated: goals of cryptography. In addition, a new video was added that covers DKIM.
Learning Cryptography and Network Securitywith Lisa Bock1h 45m Intermediate
Cybersecurity with Cloud Computingwith Malcolm Shore2h 25m Intermediate
IT Security Careers and Certifications: First Stepswith Marc Menninger2h 6m Appropriate for all
2. Symmetric Cryptography
3. Asymmetric Cryptography
4. Key Management
5. Public Key Infrastructure
6. Transport Encryption
7. Cryptanalytic Attacks
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.