Free Email Tool
Retrieve and validate the DKIM public key record for any domain and selector.
Enter a domain and DKIM selector to retrieve and validate the public key record. Uses Google DoH with Cloudflare fallback.
Send a test email to Gmail, open it, click More > Show original. Find the line starting with DKIM-Signature: and look for s=yourselector. Or use our DKIM Key Generator to create a new key pair.
DKIM (DomainKeys Identified Mail) is one of the three pillars of email authentication alongside SPF and DMARC. It uses public-key cryptography to create a digital signature on outgoing messages that receiving mail servers can verify. When DKIM passes, the receiving server can confirm the message was authorized by the domain owner and hasn't been tampered with in transit. Gmail, Outlook, and Yahoo all use DKIM as a factor in spam scoring and deliverability.
DKIM operates through an asymmetric key pair. The private key lives on your mail server and signs each outgoing message, adding a DKIM-Signature header. The public key is published as a TXT record in your DNS at selector._domainkey.yourdomain.com. When a receiving server wants to verify a signed message, it extracts the selector from the DKIM-Signature header, looks up the public key in DNS, and uses it to verify the signature.
The selector is a label that lets a domain publish multiple DKIM keys simultaneously — useful for using different keys per sending service, rotating keys without downtime, or managing multiple ESPs. Selectors like google, default, k1, and cse-2048 are common. To find yours, view the raw headers of a sent message and look for s= in the DKIM-Signature line.
RSA 2048-bit is the current standard and is universally supported across all mail servers, spam filters, and ESPs. It provides strong security and is the right choice for most senders. RSA 4096-bit provides higher security but creates longer TXT records that can approach DNS UDP packet size limits — some DNS providers truncate long TXT records, causing DKIM failures. Ed25519 is a modern elliptic curve algorithm producing short keys with strong security, but isn't yet supported by all mail server implementations. For new deployments, RSA 2048 is the safe choice.
selector._domainkey.domain.comIn February 2024, Google and Yahoo mandated DKIM for all bulk senders (those sending more than 5,000 messages per day to Gmail). DKIM must be configured at the same domain as the From address. Senders failing DKIM authentication face deferral and potential permanent blocking. Microsoft followed with similar requirements for Outlook.com and Hotmail.
DKIM keys should be rotated annually, or immediately if you suspect compromise. The rotation process: generate a new key pair (use our DKIM Key Generator), publish the new public key at a new selector (e.g. cse-2025), configure your mail server to sign with the new private key, wait 48 hours for DNS propagation, then revoke the old key by setting its p= tag to empty. Never delete the old record immediately — wait for TTL to expire and caches to clear.
Yes — this is a key feature of the DKIM design. Each selector creates a separate record at a different DNS name. You can have google._domainkey for Google Workspace, cse-2048._domainkey for your dedicated infrastructure, and sendgrid._domainkey for transactional email — all active simultaneously.
No. DKIM signs the message to prove authenticity and integrity — it doesn't encrypt content. The message body is still transmitted in cleartext (unless TLS is used at the transport layer). DKIM proves the message was sent by an authorized server and hasn't been modified, but a passive observer on the network can still read the content.
Use our browser-based DKIM Key Generator to create RSA 2048, 4096 or Ed25519 key pairs. Keys are generated locally — nothing sent to our servers.