A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Sethi, Priya
- DomainKeys Identified Mail
Authors
1 Information Security, P.E.C. Engineering College, Chandigarh, IN
2 Information Security, P.E.C. Engineering College, Chandigarh, IN
3 Information Security from P.E.C. Engineering College, Chandigarh, IN
Source
Networking and Communication Engineering, Vol 7, No 6 (2015), Pagination: 260-264Abstract
Email spam is one of the major social problems facing by the whole world every day. Spam mails spoof the sender domain. A solution is required to provide authentication over the internet. Various email authentication methods and schemes allow organizations to prove email originated from the actual domains. One such authentication method is “DomainKeys Identified Mail (DKIM)". DKIM defines a domain level authentication framework using cryptographic signatures and protect receivers and senders from phishing and forged mails. The DKIM signature and its signing practices provide a tool to authenticate sending domain. This paper discusses the overview of DKIM using public key cryptography with keys stored in Domain Name Server. It also deals with the problems of DKIM and their solutions.