Open Access Open Access  Restricted Access Subscription or Fee Access

DomainKeys Identified Mail

Shipra Kataria, Deepika Bansal, Priya  Sethi

Abstract


Email spam is one of the major social problems facing by the whole world every day. Spam mails spoof the sender domain. A solution is required to provide authentication over the internet. Various email authentication methods and schemes allow organizations to prove email originated from the actual domains. One such authentication method is “DomainKeys Identified Mail (DKIM)". DKIM defines a domain level authentication framework using cryptographic signatures and protect receivers and senders from phishing and forged mails. The DKIM signature and its signing practices provide a tool to authenticate sending domain. This paper discusses the overview of DKIM using public key cryptography with keys stored in Domain Name Server. It also deals with the problems of DKIM and their solutions.


Keywords


Spam, Domain Name Server, Public Key Cryptography.

Full Text:

PDF

References


IronPort Email Authentication, https://www.ironportstore.com/.../ironport_email_authentication_wp.pdf

T. Hansen, D. Crocker and P. Hallam-Baker, “DomainKeys Identified Mail (DKIM) Service Overview”, Internet Engineering Task Force (IETF), October 2006.

SPF, DKIM, and DMARC Demystified, http://www.mcafee.com/in/resources/solution-briefs/sb-spf-dkim-dmarc-demystified.pdf

A Yoshiki Higashikado, Tetsuya Izu, Masahiko Takenaka and Takashi Yoshioka, “An Extension of the Sender Domain Authentication DKIM", in Proc. Third International Conference on Convergence and Hybrid Information Technology, IEEE Computer Society Washington, pp.565-568, 2008.

M. Delany, ” Domain-Based Email Authentication Using Public Keys Advertised in the DNS (DomainKeys)”, Internet Engineering Task Force (IETF), RFC 4870, May 2007.

DomainKeys Identified Mail, http://www.ebertlang-download.com/ alt-n/mdaemon/whitepapers/MDaemon-DKIM.pdf.

What is DKIM? Everything You Need to Know About Digital Signatures , file:///C:/Users/abc/Desktop/dkinm%2015.html

D. Crocker, T. Hansen and M. Kucherawy, “DomainKeys Identified Mail (DKIM) Signatures”, Internet Engineering Task Force (IETF), RFC 6376, September 2011.

E. Allman, J. Callas,M. Delany, M. Libbey, J. Fenton, M. Thomas,”DomainKeys Identified Mail (DKIM) Signatures", Internet Engineering Task Force (IETF), RFC 4871, May 2007.

Chris Murphy, “Using DomainKeys Identified Mail (DKIM) to Protect your Email Reputation", 2013

Packiavathy.M, Saruladha.K, “Spam Detection and Filtering on P2P System Using Agents",2009.

DKIM Explained, file:///C:/Users/abc/Desktop/dkim%2011.html.

Allman, E., Delany, M., and J. Fenton, “DKIM Sender Signing Practices”, Internet Draft, http://www.ietf.org/internetdrafts/ draft-allman-dkim-ssp-02.txt (work in progress), August, 2006.

Barry Leiba, Jim Fenton, “DomainKeys Identified Mail (DKIM): Using Digital Signatures for Domain Verification” in Proc. Fourth Conference on Email and Anti-Spam, USA, August 2-3,2007.

E. Allman, J. Fenton, M. Delany, J. Levine, “DomainKeys Identified Mail (DKIM) Author Domain Signing Practices (ADSP)”, Internet Engineering Task Force (IETF), RFC 5617, August 2009.

J. Fenton, “Analysis of Threats Motivating DomainKeys Identified Mail (DKIM)", Internet Engineering Task Force (IETF), RFC 4686, September 2006.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.