Purpose of CryptoPro CSP. Purpose of CryptoPro CSP Where to download cryptopro 3.6

CIPF(means of cryptographic information protection) "CryptoPro CSP" is an independent OS module designed to perform various cryptographic operations, such as electronic signature, encryption, imitation protection. The functioning of the vast majority of encryption software products is impossible without a crypto provider, and it is also impossible to sign ES documents.

The functionality of the CryptoPro CSP module is that it:

  • allows you to submit reports electronically to various government agencies;
  • provides participation in electronic auctions;
  • organizes legally significant document circulation;
  • protects confidential information at the time of its transfer.
Module "CryptoPro CSP" developed by "CRYPTO-PRO" - a company that is one of the leaders in the market of information security tools. For this period, 5 versions of the CryptoPro CSP module have been released, the difference between which lies in the following parameters: the operating system in which the program operates; supported crypto algorithms; the validity period of certificates issued by the competent authorities. The developer company on its official Internet resource has posted a table with a detailed comparison of all current versions of the CryptoPro CSP module. On this web page, the developer company has posted information about valid certificates.

How to install "CryptoPro 4.0"

The latest actual version of the CryptoPro CSP module is the fourth, which operates on the basis of new signature algorithms in accordance with GOST R 34.10-2012. "CryptoPro CSP 4.0" can work in Windows 10. At the moment, this module is not certified, but the developer company plans to certify the 4th version of its product in the very near future.
The following is a description of how to install "CryptoPro 4.0".
The official Internet resource of the CRYPTO-PRO developer company, upon completion of the preliminary registration, provides the opportunity to download files, distributions, updates, etc. of the CryptoPro CSP program.

Upon completion of registration, a page with a license agreement will appear. You must read its terms and conditions and then, if you agree with them, click on "I agree". Next, you will be redirected to the file download page.

In order to download the distribution kit, you must first select "CryptoPro CSP 4.0 for Windows and UNIX (non-certified)", and then left-click on "CryptoPro CSP 4.0 for Windows" in the link with checksum information that appears.

How to install "CryptoPro 4.0". When the download is complete, you need to run the newly downloaded program file "CSPSetup.exe". In the window that opens about the security warning, in order to allow the program to make changes to the computer, you need to click on the "Yes" button. In the next window that opens, select "Install (recommended)".


The direct installation of the CryptoPro CSP 4.0 module will begin, which takes a few seconds.

Upon completion of the installation of the CryptoPro CSP 4.0 module on the computer, you can start working with it.

Reminder:
  • under the terms of the license agreement, there is a limitation on the period of use of the demo version of "CryptoPro CSP 4.0", which is 90 days from the date of direct installation of the product;
  • The demo version of the "CryptoPro CSP 4.0" module is provided only during the initial installation of the product; in case of re-installation, the program will not work in demo mode.
Information about the type of license and the period of its validity is available in the CryptoPro CSP application. In the Windows 10 operating system, it is most convenient to use the application search, for which you need to click on the "Magnifying glass" icon, which is located next to "Start", and then select "CryptoPro CSP Classic Application".

A new “CryptoPro CSP” window will appear, where the “General” tab contains information about the license (incomplete serial number; owner’s name; company name; license type: client or service; period of validity; when the initial installation was carried out, etc.). d.). Here you can also purchase a license online and enter its serial number.

The operation of the CryptoPro CSP 4.0 module is carried out during the entire period of the license. If the current license has expired, then you need to buy the right to a new one. This can be done at any convenient time. The license key (i.e. its serial number) is sent to the specified email address immediately after payment is received.
To enter a new serial number, you must click on "Enter license". A window will open in which in the item "Serial number" you must specify the purchased license key and then click on "OK".

After completing all the installation steps, the CryptoPro CSP 4.0 program is completely ready for use.

After purchasing a license from our online store, you will receive an email containing:

  • product license key
  • link to product distribution
  • link to user manual
Since no one likes to read the user manual anyway (and you would not be reading this article if you read the manual), we only need product license key And link to distribution.

Step 1

First you need to find out if you have installed Cryptopro CSP earlier and if installed, what version?

This can be done by carefully examining your Start menu: there should be an item CRYPTO-PRO, which has a program CryptoPro CSP.

If you didn’t find it, most likely you don’t have CryptoPRO installed, so feel free to go to.

If found - run CryptoPro CSP. There we see the General tab, where the license validity period and version number are indicated.

If the version number corresponds to the version you purchased (for example, if the window says 4.0.****, and you bought CryptoPro CSP 4.0, then it matches), then you you can not reinstall the program, but simply enter the license key. How to do it - look at .

Step 2

You found out that the program is not installed for you. So, you need to download CryptoPro CSP and install it.

Downloading it is not so easy: a cryptographic provider is a means of cryptographic protection of information, which means that its distribution is subject to registration with the relevant authorities. Therefore, you will need to follow the link that came to you in the letter or go to the CryptoPro website on your own at the link http://www.cryptopro.ru/downloads and select from the list of products CryptoPro CSP.

You will see something like this:


Click on the link " Pre-registration" and fill out a form from a variety of fields. After filling out the form and registering, you will be required to agree to the license agreement, and then still get the opportunity to download the distribution package of the program.

At the time of publication, the distribution selection page looks like this:


If you have purchased the version CryptoPro CSP 3.6, then you will need to select a version R4 It is by far the most functional.

If you have purchased a license for CryptoPro CSP 3.9 be careful: CryptoPro CSP 3.9 - certified version, but does not support Windows 10, CryptoPro CSP 3.9R2- supports Windows 10, certification planned for Q4 2015

If you bought version 4.0, then select the CryptoPro CSP 4.0 item accordingly (recommended for working with Windows 10, certification is planned for the III quarter of 2015).

You will need to download this file:

Step 3

You have downloaded the installation file CryptoPro CSP, and now you will need to install the program itself. To do this, run the installation file, if we see a security warning, you need to allow the program to make changes on your computer. In the opened press the button Install (recommended)

The installation of the program takes place automatically within a few minutes and does not require user intervention.


Everything, Installation completed.

Step 4

Now you need to enter the license key in a special window. You can get to it this way (the path may vary slightly depending on the version of the operating system):

Start - Programs - CryptoPro - CryptoPro CSP.

Then we press the button Entering a license


In the window that opens, fill in the fields in accordance with the license received.


Step 5

We rejoice! We have just installed a crypto provider. Not so difficult, right?

But you need to understand that CryptoPro CSP itself cannot do anything. The next step you will need to install (or just configure) programs that will interact with CryptoPro CSP and solve your problems, whether it is an electronic signature, encryption or something else.

Usually, or is used to implement an electronic signature - they can be purchased from our online store. We tried to make the purchase as convenient as possible: electronic licenses are sent immediately after payment (even at night), a large selection of payment methods.

If the instruction seemed useful to you - share it, you will find the buttons for this right below the article.

In the following instructions, I will show you how to install CryptoPro Office Signature , CryptoARM how to work with tokens and so on.

If you don't want to miss our articles - subscribe to us on social networks! Links to our social media pages can be found at the very bottom of the screen.

CryptoPro CSP 5.0 is a new generation of cryptographic provider that develops three main product lines of CryptoPro company: CryptoPro CSP (classic tokens and other passive storage of secret keys), CryptoPro FKN CSP / Rutoken CSP (non-retrievable keys on tokens with secure messaging) and CryptoPro DSS (keys in the cloud).

All the advantages of the products of these lines are not only preserved, but also multiplied in CryptoPro CSP 5.0: the list of supported platforms and algorithms is wider, the performance is higher, and the user interface is more convenient. But the main thing is that work with all key carriers, including keys in the cloud, is now uniform. To transfer the application system in which CryptoPro CSP of any version worked to support keys in the cloud or to new media with non-retrievable keys, no software rework is required - the access interface remains the same, and work with the key in the cloud will occur exactly the same in the same way as with the classic key carrier.

Purpose of CryptoPro CSP

  • Formation and verification of electronic signature.
  • Ensuring confidentiality and integrity control of information through its encryption and imitation protection.
  • Ensuring the authenticity, confidentiality and imitation protection of connections using the , and protocols.
  • Monitoring the integrity of system and application software to protect it from unauthorized changes and violations of trusted functioning.

Supported Algorithms

In CryptoPro CSP 5.0, along with Russian ones, foreign cryptographic algorithms are implemented. Users can now use familiar key carriers to store RSA and ECDSA private keys.

Supported key storage technologies

Cloud token

In CryptoPro CSP 5.0, for the first time, it became possible to use keys stored on the CryptoPro DSS cloud service through the CryptoAPI interface. Now the keys stored in the cloud can be easily used by any user application, as well as by most Microsoft applications.

Media with non-removable keys and secure messaging

CryptoPro CSP 5.0 adds support for media with non-recoverable keys that implement the protocol SESPAKE, which allows you to perform authentication without transmitting the user's password in clear form, and to establish an encrypted channel for exchanging messages between the crypto provider and the carrier. An attacker in the channel between the carrier and the user's application can neither steal the password during authentication nor change the data being signed. When using such media, the problem of safe work with non-removable keys is completely solved.

Active, InfoCrypt, SmartPark and Gemalto companies have developed new secure tokens that support this protocol (SmartPark and Gemalto starting from version 5.0 R2).

Media with non-removable keys

Many users want to be able to work with non-retrievable keys, but not upgrade tokens to the FKN level. Especially for them, the provider has added support for popular key carriers Rutoken EDS 2.0, JaCarta-2 GOST and InfoCrypt VPN-Key-TLS.

List of manufacturers and models supported by CryptoPro CSP 5.0

List of manufacturers and models of media with non-recoverable keys supported by CryptoPro CSP 5.0
Company Carrier
ISBC Esmart Token GOST
Assets Rutoken 2151
Rutoken PINPad
Rutoken EDS
Rutoken EDS 2.0
Rutoken EDS 2.0 2100
Rutoken EDS 2.0 3000
Rutoken EDS PKI
Rutoken EDS 2.0 Flash
Rutoken EDS 2.0 Bluetooth
Rutoken EDS 2.0 Touch
Smart card Rutoken 2151
Smart card Rutoken EDS 2.0 2100
Aladdin R.D. JaCarta-2 GOST
infocrypt InfoCrypt Token++ TLS
InfoCrypt VPN-Key-TLS

Classic passive USB tokens and smart cards

Most users prefer fast, cheap and convenient key storage solutions. As a rule, preference is given to tokens and smart cards without cryptographic coprocessors. As in previous versions of the provider, CryptoPro CSP 5.0 retains support for all compatible media manufactured by Active, Aladdin R.D., Gemalto / SafeNet, Multisoft, NovaCard, Rosan, Alioth, MorphoKST and SmartPark.

In addition, of course, as before, ways to store keys in the Windows registry, on a hard drive, on flash drives on all platforms are supported.

List of manufacturers and models supported by CryptoPro CSP 5.0

List of manufacturers and models of classic passive USB tokens and smart cards supported by CryptoPro CSP 5.0
Company Carrier
Alioth SCOne Series (v5/v6)
gemalto Optelio Contactless Dxx Rx
Optelio Dxx FXR3 Java
Optelio G257
Optelio MPH150
ISBC Esmart Token
Esmart Token GOST
MorphoKST MorphoKST
NovaCard Cosmo
Rosan G&D element V14 / V15
G&D 3.45 / 4.42 / 4.44 / 4.45 / 4.65 / 4.80
Kona 2200s / 251 / 151s / 261 / 2320
Kona2 S2120s / C2304 / D1080
safenet eToken Java Pro JC
eToken 4100
eToken 5100
eToken 5110
eToken 5105
eToken 5205
Assets Rutoken 2151
Rutoken S
Rutoken KP
Rutoken Lite
Rutoken EDS
Rutoken EDS 2.0
Rutoken EDS 2.0 3000
Rutoken EDS Bluetooth
Rutoken EDS Flash
Smart card Rutoken 2151
Smart card Rutoken Lite
Smart card Rutoken EDS SC
Smart card Rutoken EDS 2.0
Aladdin R.D. JaCarta GOST
JaCarta PKI
JaCarta PRO
JaCartaLT
JaCarta-2 GOST
infocrypt InfoCrypt Token++ Lite
Multisoft MS_Key version 8 Angara
MS_Key ESMART version 5
SmartPark master's
R301 Foros
Oscar
Oscar 2
Rutoken Master

CryptoPro Tools

As part of CryptoPro CSP 5.0, a cross-platform (Windows / Linux / macOS) graphical application appeared - "CryptoPro Tools" ("CryptoPro Tools").

The main idea is to enable users to conveniently solve typical tasks. All the main functions are available in a simple interface - at the same time, we have also implemented a mode for advanced users, which opens up additional opportunities.

With the help of CryptoPro Tools, the tasks of managing containers, smart cards and settings of crypto providers are solved, and we have also added the ability to create and verify a PKCS # 7 electronic signature.

Supported software

CryptoPro CSP allows you to quickly and securely use Russian cryptographic algorithms in the following standard applications:

  • office suite Microsoft Office;
  • mail server Microsoft Exchange and client Microsoft Outlook;
  • products Adobe Systems Inc.;
  • browsers Yandex.Browser, Sputnik, Internet Explorer,edge;
  • tool for generating and verifying application signatures Microsoft Authenticode;
  • web servers Microsoft IIS, nginx, Apache;
  • remote desktop tools Microsoft Remote Desktop Services;
  • Microsoft Active Directory.

Integration with the CryptoPro platform

From the very first release, support and compatibility with all our products is provided:

  • CryptoPro CA;
  • CA services;
  • CryptoPro EDS;
  • CryptoPro IPsec;
  • CryptoPro EFS;
  • CryptoPro.NET;
  • CryptoPro Java CSP.
  • CryptoPro NGate

Operating systems and hardware platforms

Traditionally, we work in an unsurpassed wide range of systems:

  • Microsoft Windows;
  • MacOS;
  • Linux;
  • FreeBSD;
  • solaris;
  • android;
  • SailfishOS.

hardware platforms:

  • Intel/AMD;
  • PowerPC;
  • MIPS (Baikal);
  • VLIW (Elbrus);
  • Sparc.

and virtual environments:

  • Microsoft Hyper-V
  • VMWare
  • Oracle Virtual Box
  • RHEV.

Supported by different versions of CryptoPro CSP.

To use CryptoPro CSP with a license for a workstation and a server.

Embedding Interfaces

For embedding in applications on all platforms, CryptoPro CSP is available through standard interfaces for cryptographic tools:

  • Microsoft Crypto API
  • PKCS#11;
  • OpenSSL engine;
  • Java CSP (Java Cryptography Architecture)
  • Qt SSL.

Performance for every taste

Years of development experience allows us to cover everything from miniature ARM boards such as Raspberry PI to multi-processor servers based on Intel Xeon, AMD EPYC and PowerPC, with excellent performance scaling.

Regulatory documents

Full list of regulatory documents

  • The crypto provider uses algorithms, protocols and parameters defined in the following documents of the Russian standardization system:
  • R 50.1.113–2016 “Information technology. Cryptographic protection of information. Cryptographic Algorithms Accompanying the Application of Digital Signature Algorithms and Hashing Functions" (also see RFC 7836 "Guidelines on the Cryptographic Algorithms to Accompany the Usage of Standards GOST R 34.10-2012 and GOST R 34.11-2012")
  • R 50.1.114–2016 “Information technology. Cryptographic protection of information. Elliptic Curve Parameters for Cryptographic Algorithms and Protocols" (also see RFC 7836 "Guidelines on the Cryptographic Algorithms to Accompany the Usage of Standards GOST R 34.10-2012 and GOST R 34.11-2012")
  • R 50.1.111–2016 “Information technology. Cryptographic protection of information. Password protection of key information»
  • R 50.1.115–2016 “Information technology. Cryptographic protection of information. Shared Key Derivation Protocol with Password-Based Authentication" (also see RFC 8133 The Security Evaluated Standardized Password-Authenticated Key Exchange (SESPAKE) Protocol")
  • Guidelines TC 26 "Cryptographic information protection" "Using sets of encryption algorithms based on GOST 28147-89 for the transport layer security protocol (TLS)"
  • Guidelines TC 26 "Cryptographic information protection" "Use of algorithms GOST 28147-89, GOST R 34.11 and GOST R 34.10 in cryptographic messages of the CMS format"
  • Technical specification TC 26 "Cryptographic information protection" "Use of GOST 28147-89, GOST R 34.11-2012 and GOST R 34.10-2012 in the IKE and ISAKMP key exchange protocols"
  • Technical specification TC 26 "Cryptographic information protection" "Use of GOST 28147-89 when encrypting attachments in IPsec ESP protocols"
  • Technical specification TK 26 "Cryptographic information protection" "Use of algorithms GOST R 34.10, GOST R 34.11 in the certificate profile and certificate revocation list (CRL) of X.509 public key infrastructure"
  • Technical specification TC 26 "Cryptographic information protection" "PKCS # 11 extension for the use of Russian standards GOST R 34.10-2012 and GOST R 34.11-2012"

CSP CryptoPro is a program for adding and verifying digital files. It adds and protects cryptographic files (electronic documents) that have a digital signature. CryptoPro has "Winlogon" for very important documents and third party files that support a digital certificate.

CSP CryptoPro is used in companies where there are documents in electronic form. The program provides protection and legal force for valuable documents and papers in digital form. Digitally signed data is as valid as official documents.

CSP CryptoPro allows you to create digital protection and put a signature (certificate) on any document. This program is suitable for organizations with valid GOSTs. It controls the data and the structure of information. Management of security program algorithms is provided through a special manager.

You can set up CSP CryptoPro and specify the level of protection and confidentiality of documents. Once configured, some documents will be strictly confidential. The program is equipped with tools that issue and verify security certificates. Using the CryptoPro Winlogon module, you can register new users in the Windows operating system.

CryptoPro Winlogon works with Kerberos V5 protocol support. Login and access to data is carried out after a full verification of the certificate of the information carrier located in the organization.

Cryproprovider provides protection for various sources of digital data. Older organizations and companies use floppy support equipment. CryptoPro was created on a commercial basis with a paid license. After installing the program, you use it for 30 days, that is, a trial period. After that, you will have to buy a license.

Key features

  • Protection of a digital certificate, through verification tools;
  • full verification of digital documents and the relevance of the certificate;
  • electronic registration of documents on a legal basis;
  • access to the certificate on the main carrier and its verification;
  • full control and verification of data after the transfer of information;
  • comparison of document size and other algorithms for work;
  • the program supports documents that are created in accordance with these GOSTs;
  • full protection of digital documents and setting the degree of protection;