<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Cryptography on Sender Audit Blog</title><link>https://senderaudit.com/blog/en/tags/cryptography/</link><description>Recent content in Cryptography on Sender Audit Blog</description><generator>Hugo</generator><language>en</language><lastBuildDate>Mon, 23 Mar 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://senderaudit.com/blog/en/tags/cryptography/index.xml" rel="self" type="application/rss+xml"/><item><title>Anatomy of a DKIM Signature: Every Field Explained</title><link>https://senderaudit.com/blog/en/dkim-signature-anatomy/</link><pubDate>Mon, 23 Mar 2026 00:00:00 +0000</pubDate><guid>https://senderaudit.com/blog/en/dkim-signature-anatomy/</guid><description>&lt;p&gt;You know that &lt;a href="https://senderaudit.com/blog/en/configure-dkim/"&gt;DKIM&lt;/a&gt; signs your emails. But what exactly is inside that &lt;code&gt;DKIM-Signature&lt;/code&gt; header? Let&amp;rsquo;s break down every field and follow the verification process from start to finish.&lt;/p&gt;
&lt;h2 id="a-real-dkim-header-dissected"&gt;A Real DKIM Header, Dissected&lt;/h2&gt;
&lt;pre tabindex="0"&gt;&lt;code&gt;DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=example.com; s=selector2024;
 h=from:to:subject:date:mime-version:content-type;
 bh=2jUSOH9NhtVGCQWNr9BrIAPreKQjO6Sn7XIkfJVOzv8=;
 t=1714123456;
 b=dHJ5aW5nIHRvIHJlYWQgdGhpcyBzaWduYXR1cmU/IE5pY2Ug
 dHJ5IDspIFRoaXMgaXMganVzdCBhIGR1bW15IGV4YW1wbGU=
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id="every-field-explained"&gt;Every Field Explained&lt;/h2&gt;
&lt;h3 id="v1-version"&gt;&lt;code&gt;v=1&lt;/code&gt;: Version&lt;/h3&gt;
&lt;p&gt;The DKIM protocol version. Only one version exists (&lt;code&gt;1&lt;/code&gt;), defined by &lt;a href="https://datatracker.ietf.org/doc/html/rfc6376"&gt;RFC 6376&lt;/a&gt;. This field is mandatory.&lt;/p&gt;
&lt;h3 id="arsa-sha256-algorithm"&gt;&lt;code&gt;a=rsa-sha256&lt;/code&gt;: Algorithm&lt;/h3&gt;
&lt;p&gt;Two elements combined:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Cryptosystem&lt;/strong&gt;: &lt;code&gt;rsa&lt;/code&gt; (most common) or &lt;code&gt;ed25519&lt;/code&gt; (emerging, &lt;a href="https://datatracker.ietf.org/doc/html/rfc8463"&gt;RFC 8463&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Hash function&lt;/strong&gt;: &lt;code&gt;sha256&lt;/code&gt; (standard) or &lt;code&gt;sha1&lt;/code&gt; (obsolete and vulnerable, do not use)&lt;/li&gt;
&lt;/ul&gt;
&lt;table&gt;
 &lt;thead&gt;
 &lt;tr&gt;
 &lt;th&gt;Combination&lt;/th&gt;
 &lt;th&gt;Status&lt;/th&gt;
 &lt;/tr&gt;
 &lt;/thead&gt;
 &lt;tbody&gt;
 &lt;tr&gt;
 &lt;td&gt;&lt;code&gt;rsa-sha256&lt;/code&gt;&lt;/td&gt;
 &lt;td&gt;Standard, recommended&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;&lt;code&gt;rsa-sha1&lt;/code&gt;&lt;/td&gt;
 &lt;td&gt;Obsolete, some providers reject it&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;&lt;code&gt;ed25519-sha256&lt;/code&gt;&lt;/td&gt;
 &lt;td&gt;Future standard, partial support&lt;/td&gt;
 &lt;/tr&gt;
 &lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 id="crelaxedrelaxed-canonicalization"&gt;&lt;code&gt;c=relaxed/relaxed&lt;/code&gt;: Canonicalization&lt;/h3&gt;
&lt;p&gt;Defines how content is normalized &lt;strong&gt;before&lt;/strong&gt; computing the signature. The format is &lt;code&gt;headers/body&lt;/code&gt;:&lt;/p&gt;</description></item><item><title>DKIM RSA Key Size: 1024 vs 2048 Bits and the Future with Ed25519</title><link>https://senderaudit.com/blog/en/dkim-rsa-key-size/</link><pubDate>Sat, 14 Mar 2026 00:00:00 +0000</pubDate><guid>https://senderaudit.com/blog/en/dkim-rsa-key-size/</guid><description>&lt;p&gt;Your DKIM setup works, signatures pass. But have you checked the &lt;strong&gt;size of your RSA key&lt;/strong&gt;? A key that&amp;rsquo;s too short is a ticking time bomb: it could be cracked, allowing an attacker to sign emails on your behalf.&lt;/p&gt;
&lt;h2 id="the-history-of-dkim-keys-from-512-to-2048-bits"&gt;The History of DKIM Keys: From 512 to 2048 Bits&lt;/h2&gt;
&lt;h3 id="2012-the-end-of-512-bit-keys"&gt;2012: The End of 512-Bit Keys&lt;/h3&gt;
&lt;p&gt;In 2012, researchers demonstrated that a 512-bit RSA key could be cracked in &lt;strong&gt;under 72 hours&lt;/strong&gt; using cheap cloud computing power. The result: anyone could impersonate a domain using a 512-bit key and send perfectly DKIM-signed emails.&lt;/p&gt;</description></item></channel></rss>