The choice of DKIM key size, particularly between 1024-bit and 2048-bit, is a frequent topic in email deliverability and security discussions. While 2048-bit keys offer enhanced cryptographic strength, 1024-bit keys remain widely supported and are not yet deprecated. The primary challenge often lies in an email service provider's (ESP) ability or willingness to support larger key sizes, which involves significant development work beyond just the underlying Mail Transfer Agent (MTA) capabilities.
Key findings
Current status: Many ESPs default to 1024-bit DKIM keys, with some offering 2048-bit as an advanced or API-only option, such as SparkPost.
Security adequacy: As of now, 1024-bit DKIM keys have no known successful collision attacks and are not officially deprecated, meaning they still provide sufficient security for most email authentication purposes.
Industry trend: There's a general push towards larger key sizes (e.g., 2048-bit) in the broader cybersecurity landscape for stronger encryption.
Perceived security: Customers, especially those with stringent internal security policies, may demand 2048-bit keys, aligning with perceptions of best practices for cryptographic strength.
Key considerations
ESP capabilities: Verify your ESP's actual support for 2048-bit DKIM keys, as it may be hidden in API documentation or not available for specific sending methods (e.g., cloud versus on-premise). This is a critical part of evaluating ESP capabilities.
Implementation complexity: Implementing 2048-bit keys can sometimes require multiple DNS TXT record strings, which might introduce a slightly higher, though generally negligible, chance of receiver-side errors.
Resource allocation for ESPs: For ESPs, supporting larger key sizes involves substantial development effort, including updating software platforms, UIs, and documentation, which is not a trivial task at scale.
Communicating security posture: When facing customer demands, it's essential to clearly articulate that 1024-bit keys remain cryptographically sound and widely accepted for email authentication, as part of your overall email authentication best practices. Mailjet's article on DKIM 1024 vs 2048 provides further insights.
Email marketers often find themselves caught between customer security requirements and the practical limitations of their ESPs regarding DKIM key sizes. While many acknowledge the perceived benefit of 2048-bit keys, the operational reality points to the continued viability of 1024-bit keys and the significant effort required for ESPs to implement larger options, especially when dealing with cloud-based sending.
Key opinions
Customer driven requests: Many requests for 2048-bit keys come from customer-side internal security requirements, even if 1024-bit is technically sufficient.
ESP support variance: ESPs like SparkPost and Sendgrid often default to 1024-bit, with 2048-bit being an option that is sometimes buried in API documentation rather than the UI.
Roadmap perspective: When unable to support larger keys immediately, suggesting that it's on the product roadmap for larger key sizes can be a way to manage customer expectations.
Hidden configuration: Some ESPs might support 2048-bit keys via non-obvious configurations, such as specific API parameters, highlighting the need for thorough investigation.
Key considerations
Addressing security concerns: Be prepared to educate customers that 1024-bit keys are still robust and widely accepted, with no known vulnerabilities in practical use. This ties into broader DKIM troubleshooting and understanding the cryptographic strength of your DKIM selectors.
Managing expectations: For product managers and marketers, it is crucial to manage customer expectations regarding key size capabilities, especially when limited by upstream providers.
Advocating for updates: Pushing ESPs to clarify their roadmap for 2048-bit (or larger) key support can help align with future security demands.
Weighing trade-offs: While 2048-bit keys offer theoretical benefits, marketers should consider the practical implications, such as potential minor increase in DNS TXT record errors, as mentioned in Twilio's insights on 2048-bit DKIM keys.
Marketer view
Marketer from Email Geeks inquires if the 2048-bit key requirement is an internal security policy for the sender, indicating that such demands often originate from within the customer's organization.
30 Sep 2020 - Email Geeks
Marketer view
Marketer from Email Geeks explains their customer's strict security requirement for a minimum 2048-bit DKIM key, which their current ESPs do not seem to support for cloud sending. This highlights a common conflict between customer policy and provider capability.
30 Sep 2020 - Email Geeks
What the experts say
Experts in the email deliverability space generally agree that while 2048-bit DKIM keys offer a higher level of security, 1024-bit keys are still considered safe and widely supported, with no known practical vulnerabilities. They emphasize that the main barrier to broader 2048-bit adoption is often the significant development and integration work required by ESPs, rather than a lack of underlying MTA capability.
Key opinions
Security vs. practicality: Experts affirm that 1024-bit DKIM keys are not deprecated and have no known successful collision attacks in the wild, making them functionally secure for current email authentication.
Development effort: The primary reason an ESP might not support 2048-bit keys is the substantial development work needed to integrate it across their platform, UI, and support systems, not just the underlying MTA.
MTA support: Underlying MTAs like PowerMTA and Momentum are generally capable of supporting 2048-bit keys; the limitation often lies in the ESP's specific cloud implementation or product strategy.
Managing customer demands: Some experts suggest managing customer expectations by communicating that larger key support is on the roadmap, alongside other advancements like Ed25519.
Key considerations
DNS record complexity: While 2048-bit keys might require multiple DNS TXT record strings, the chance of receiver errors due to this is considered non-zero but generally minor by experts.
Key rotation implications: The choice of key size also impacts DKIM key rotation strategies and managing email reputation effectively.
Troubleshooting temperror: Understanding how different key sizes might affect DKIM temporary errors is important for maintaining deliverability.
Future-proofing: While 1024-bit is currently acceptable, a proactive approach for ESPs includes planning for higher key sizes to align with evolving security standards and customer demands. Spamresource often discusses evolving email security practices.
Expert view
Expert from Email Geeks questions the source of the demand for a specific DKIM key size, suggesting that clarifying the origin of the security requirement is a crucial first step.
30 Sep 2020 - Email Geeks
Expert view
Expert from Email Geeks asks for clarification on whether the key size in question is deemed too large or too small, highlighting the ambiguity that can arise in technical security discussions.
30 Sep 2020 - Email Geeks
What the documentation says
Official documentation and security best practices generally encourage the use of stronger cryptographic keys where possible, but acknowledge that 1024-bit DKIM keys still meet minimum security requirements. The emphasis is often on ensuring proper implementation and maintaining the integrity of the email authentication process, with 2048-bit keys being a recommendation for enhanced security, not a strict mandate for immediate deprecation of smaller keys.
Key findings
RFC recommendations: While DKIM RFCs do not explicitly mandate 2048-bit keys, they align with general cryptographic best practices that favor larger key sizes for long-term security.
Industry best practices: Many industry guides recommend 2048-bit keys for new DKIM implementations due to increased cryptographic strength and future-proofing against computational advances.
Deprecation status: 1024-bit keys are not currently deprecated by major email service providers or authentication standards, but their cryptographic lifespan is naturally shorter than 2048-bit keys.
Focus on authentication integrity: Documentation consistently stresses the importance of correctly configured DKIM, SPF, and DMARC records to ensure email authentication passes, regardless of key size, for successful email delivery.
Key considerations
Migration planning: Organizations should have a plan for eventually migrating to 2048-bit keys or larger, even if 1024-bit is currently sufficient, as part of their long-term security strategy.
DMARC integration: Proper DKIM signing, regardless of key size, is crucial for DMARC alignment. Misconfigurations can lead to DMARC failures, affecting deliverability. Key considerations for DMARC implementation also apply here.
Compliance requirements: Some industries or organizations may have specific compliance requirements that mandate stronger encryption, influencing the choice of DKIM key size. Hostinger's tutorial on what is a DKIM record touches on best practices.
Technical article
Documentation from Mailjet highlights that upgrading from 1024-bit to 2048-bit DKIM keys is essential for protecting emails from fraud. They emphasize that the longer key provides stronger cryptographic protection for email authentication.
24 Apr 2025 - Mailjet
Technical article
Documentation from Twilio describes a 2048-bit DKIM key as a powerful security measure designed to protect emails from unauthorized changes and impersonation. They advocate for its use to enhance email integrity.