Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 955

S/MIME

What is S/MIME?

S/MIMEAn IETF standard for end-to-end signing and encryption of MIME email messages using X.509 certificates issued by a public or enterprise CA.


Secure/Multipurpose Internet Mail Extensions (S/MIME), currently at version 4.0 and specified in RFC 8551 (with the certificate profile in RFC 8550), provides cryptographic signatures and CMS-based encryption (RFC 5652) for email. Each user obtains an X.509 certificate bound to their email address from a CA, then their mail client signs outgoing messages and encrypts to recipients' public keys. Modern profiles use RSA-2048 or higher, ECDSA P-256+, SHA-256, and AES-128/256-GCM, with hybrid PQC drafts emerging. S/MIME is built into Outlook, Apple Mail, and Thunderbird and is widely used in enterprises and government. Operational challenges include certificate distribution, key escrow for decryption of stored mail, and interaction with secure email gateways.

Examples

  1. 01

    An enterprise issues S/MIME certificates via its internal CA so employees can sign and encrypt internal email.

  2. 02

    An external partner exchanges public-key certificates with the user to send encrypted contracts via Outlook.

Frequently asked questions

What is S/MIME?

An IETF standard for end-to-end signing and encryption of MIME email messages using X.509 certificates issued by a public or enterprise CA. It belongs to the Network Security category of cybersecurity.

What does S/MIME mean?

An IETF standard for end-to-end signing and encryption of MIME email messages using X.509 certificates issued by a public or enterprise CA.

How does S/MIME work?

Secure/Multipurpose Internet Mail Extensions (S/MIME), currently at version 4.0 and specified in RFC 8551 (with the certificate profile in RFC 8550), provides cryptographic signatures and CMS-based encryption (RFC 5652) for email. Each user obtains an X.509 certificate bound to their email address from a CA, then their mail client signs outgoing messages and encrypts to recipients' public keys. Modern profiles use RSA-2048 or higher, ECDSA P-256+, SHA-256, and AES-128/256-GCM, with hybrid PQC drafts emerging. S/MIME is built into Outlook, Apple Mail, and Thunderbird and is widely used in enterprises and government. Operational challenges include certificate distribution, key escrow for decryption of stored mail, and interaction with secure email gateways.

How do you defend against S/MIME?

Defences for S/MIME typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for S/MIME?

Common alternative names include: Secure/Multipurpose Internet Mail Extensions.

Related terms

See also