digital signature

(redirected from DKIM)
Also found in: Medical, Acronyms, Encyclopedia.

digital signature

n.
A digital file attached to an email or other electronic document that uses encryption and decryption algorithms to verify the document's origin and contents.
American Heritage® Dictionary of the English Language, Fifth Edition. Copyright © 2016 by Houghton Mifflin Harcourt Publishing Company. Published by Houghton Mifflin Harcourt Publishing Company. All rights reserved.

digital signature

n
(Computer Science) computing electronic proof of a person's identity involving the use of encryption; used to authenticate documents
Collins English Dictionary – Complete and Unabridged, 12th Edition 2014 © HarperCollins Publishers 1991, 1994, 1998, 2000, 2003, 2006, 2007, 2009, 2011, 2014
References in periodicals archive ?
It states that while only the 21,075 emails marked with its green "DKIM verified" banner are certified by WikiLeaks as genuine, it believes "based on statistical sampling" that the "overwhelming majority" of the remainder are also authentic.
Wikileaks' searchable archive for the "Macron Campaign Emails" allows for advanced DKIM verified searches as well as the ability to type in any word found in the messages' content.
76.9% of the emails we received are signed according to the (DKIM) standard.
According to the report, more than 3.5 million domains that are active on a weekly basis use the SPF standard, when sending e-mail via SMTP servers, and nearly half-a-million e-mail sending and receiving domains that are active weekly adopted the DKIM standards.
Technologies such as DKIM and SPF already allow domain owners to vouch for mail sent in their name, but don't specify what to do with messages that fail the test.
In the new approach, companies would coordinate efforts at a massive scale to implement technologies for email authentication, SPF (Sender Policy Framework) and DKIM (DomainKeys Identified Mail).
New security features in CanIt 7.0.8: CanIt now has built-in support for DKIM (DomainKeys Identified Mail).
[1] Barry Leiba, Jim Fenton, "DKIM : Using Digital Signatures for Domain Verification ", CEAS 2007--Fourth conference on Email and Anti-spam, pp 530-538 August 2007.
SpamAssassin provides a comprehensive set of features and support for methods and standards such as text based patterns, bayesian scoring, DNS based black and white lists, DKIM and SPF sender authentication, and e-mail signature clearing houses.
The protocol DomainKeys or its newer cousin, DKIM, is used to verify that a message actually came from the purported sender's domain--the part following the @ sign.
By using the SMTP server and a DomainKeys Identified Mail (DKIM) authentication technique, the spammers can ensure that the email generated is more likely to get past conventional anti-spam filters.