When teams ask "what DKIM key should be used," the real question is usually two questions mixed together:
For most production environments in 2026, the practical answer is straightforward: use rsa-sha256 with 2048-bit keys unless a specific platform constraint forces 1024.
That answer comes from the standards baseline and from receiver/operator guidance, not guesswork.
The cryptography update in RFC 8301 is still the anchor point:
rsa-sha1 is historic and should not be used.So, yes, 1024 is still a valid minimum in protocol terms. But minimum and recommended are not the same thing, and operationally that distinction matters.
Here is the practical tradeoff:
Google's admin guidance explicitly tells admins to choose 2048-bit keys when supported, with 1024 as fallback (see Set up DKIM in Google Workspace and Google email sender guidelines).
Yahoo sender guidance also calls out a 1024-bit minimum and expects properly authenticated mail (see Yahoo sender requirements).
On Microsoft 365, DKIM operations (including rotation) are documented around the same practical key-size choices in their current admin guidance (see Microsoft DKIM configuration).
If a platform still only supports 1024 for a specific stream, that stream can remain compliant. But for new setups, 2048 is the better default.
This is where things can feel confusing for admins, so a quick reassurance: confusion here is normal.
RFC 8463 adds ed25519-sha256 to DKIM and defines how it works (k=ed25519 in the DKIM key record). On paper, that is excellent cryptography with compact keys.
In production, support is still uneven across senders, gateways, and tooling. Because of that, RSA-SHA256 remains the safest universal signing choice for most domains.
A pragmatic pattern for advanced environments is:
If multiple signatures appear on the same message, that is not automatically a problem; it is often intentional during compatibility transitions.
If a decision has to be made this week, use this framework:
rsa-sha256.That last point is important. Key size is only part of the story; stale keys create their own risk. If rotation policy is still being finalized, start with How Often Should You Rotate DKIM Keys? and the DKIM selectors rotation playbook.
Use provider-generated values for your exact platform, but the shape typically looks like this:
selector1._domainkey.example.com. IN TXT "v=DKIM1; k=rsa; p=<base64-public-key>"
selector2._domainkey.example.com. IN TXT "v=DKIM1; k=rsa; p=<base64-public-key>"For Ed25519-capable setups, the key type changes:
selector-ed25519._domainkey.example.com. IN TXT "v=DKIM1; k=ed25519; p=<base64-public-key>"The important operational habit is not memorizing syntax. It is verifying DKIM-Signature and Authentication-Results in real received messages after each change.
If troubleshooting is needed, keep What is DKIM? and header-based DMARC troubleshooting close by during rollout.
Use 2048-bit RSA (rsa-sha256) as the default in 2026, keep 1024 as a compatibility fallback where required, and treat Ed25519 as a deliberate rollout instead of a blind switch.
That gives a clean balance between security, compatibility, and change safety.