Suped

How should DKIM selector names be interpreted and what is the recommended DKIM key size?

Summary

DKIM (DomainKeys Identified Mail) selectors and key sizes are crucial components of email authentication, impacting deliverability and security. Selectors allow a domain to publish multiple DKIM keys, enabling flexibility for different sending systems or key rotation schedules. While selector names can be arbitrary, they often contain information such as the creation date or key length, which aids in management and understanding their vintage. The choice of DKIM key size directly relates to the cryptographic strength of your email signatures, influencing how resistant they are to tampering and spoofing attempts.

Suped DMARC monitor
Free forever, no credit card required
Get started for free
Trusted by teams securing millions of inboxes
Company logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logo

What email marketers say

Email marketers often approach DKIM selectors and key sizes from a practical perspective, balancing security recommendations with ease of implementation and campaign management. While some adhere to strict rotation schedules and adopt longer keys, others might prioritize simplicity in selector naming or defer to their ESP's default settings. The general consensus among marketers leans towards stronger encryption for better deliverability and trust.

Marketer view

Marketer from Email Geeks observes that seeing a DKIM selector like '201802' in the headers of a large investment bank's emails suggests the key might not have been rotated since 2018, which seems unusual for a financial institution.

2 May 2023 - Email Geeks

Marketer view

Marketer from Email Geeks recalls personal experience rotating all their DKIM keys after 2-5 years, which provided a sense of relief, and they simultaneously upgraded them all to 2048-bit.

2 May 2023 - Email Geeks

What the experts say

Industry experts provide definitive guidance on DKIM selector interpretation and key size recommendations, emphasizing security, compliance with RFCs, and forward compatibility. They stress that while selectors offer flexibility, the underlying key strength is paramount for robust email authentication. There's a strong push towards modern cryptographic standards to counter evolving threats.

Expert view

Expert from Email Geeks confirms that they would interpret a DKIM selector like '201802' as indicating the key has not been rotated since February 2018, reinforcing the common practice of using dates in selectors.

2 May 2023 - Email Geeks

Expert view

Expert from Email Geeks notes that, in their experience, people commonly specify either the date or the keystrength within their DKIM selectors. This highlights common naming conventions within the industry.

2 May 2023 - Email Geeks

What the documentation says

Official documentation and standards bodies, such as the IETF, provide the foundational guidelines for DKIM selectors and key sizes. These documents evolve to address new cryptographic challenges and ensure that email authentication remains robust against spoofing and tampering. They define the technical requirements and recommendations that shape how DKIM is implemented and interpreted across the internet.

Technical article

Documentation from IETF Datatracker (RFC 8301) specifies that the cryptographic algorithm and key size requirements for DKIM, originally designed a decade prior, are functionally obsolete. It updates these requirements to minimally suitable standards for currently specified algorithms.

25 Apr 2025 - IETF Datatracker

Technical article

Documentation from IETF Datatracker (RFC 6376) indicates that verifier policies might use the length of the signing key as one metric to determine if a signature is acceptable. Factors influencing key strength should be considered.

25 Apr 2025 - IETF Datatracker

13 resources

Start improving your email deliverability today

Get started