Installing cryptopro. Purpose of CryptoPro CSP Install CryptoPro with sp version 3 6

The first thing to start with is to decide on the version that you need. Client or server. If you are planning to use CryptoPro CSP cryptographic information system on a server, buy it right away. A client license will not work. Yes, the price of a server license is several times higher, and in earlier versions it was possible to install a CAL on the server, but today CALs will simply not be installed on server operating systems, despite the fact that everything worked during the trial (test) period.

GOST R 34.10-2012

Find out if you need support for the new 2012 electronic signature standards. It only supports the standard of electronic signature GOST R 34.10-2012 (“Signature creation” and “Signature verification”). Other versions of the encryption provider (3.0, 3.6 and 3.9) support GOST 94 and 2001.

Please be informed

The procedure for the transition to the national standard GOST R 34.10-2012 in electronic signatures for information that does not contain state secrets has been determined.

From the document of the FSB of Russia No. 149/7/1 / 3-58 dated 01/31/2014 "On the procedure for switching to the use of new EDS standards and the hashing function" we learn that after December 31, 2019, it will be unacceptable to use GOST R 34.10 to create an electronic signature -2001.

FSB certificate

In many information systems (especially state ones), one of the main and mandatory requirements is the availability of an FSB certificate of conformity on the software. At the moment, versions 3.6 and 4.0 are certified.

CryptoPro CSP 4.0 version has FSB certificates for protection classes and for operating systems from Windows Vista to Windows 10.

CryptoPro CSP 3.9 R2 CryptoPro CSP 4.0 R2 supporting work in Windows 10 in today received a positive conclusion of the FSB.

Windows or Unix

If you choose version 3.6, then you need to decide on which operating system the software will be installed - on Windows or Unix-like. This division is available only in the CryptoPro СSP version 3.6 and earlier. If you purchase a version of or, it doesn't matter which operating system you plan to install it on - Windows or Unix-like.

CryptoPRO is one of the cryptographic utilities (crypto provider). Which is required to generate an electronic digital signature () and work with key certificates. In this article, we will analyze in detail the process of installing the CryptoPRO program on a computer.

After you have purchased a CryptoPro CSP license or decided to try a free three-month access to the program's functions, the question arises, how about a computer?

How to install Crypto-PRO

The answer, as always, is in the user manual, which is available on the official website of the program, and is also attached when purchasing a license. But since it so happened that no one reads it anyway, we will describe the installation process step by step.

First step: checking your PC

At this stage, you need to make sure that an old version of this program is not installed on your computer. This can be done by carefully reviewing all the Start menu items on your computer, if you did not find the CryptoPRO item in it, then most likely this software was not installed on your computer.

If you find CryptoPRO in the list of programs, make sure that its version is outdated, for this:

  1. Launch CryptoPRO PKI
  2. Open the License Management tab - CryptoPRO CSP
  3. Look at the version number in the right window

If the program version is 3.6. **** and higher, then reinstallation is optional and you can proceed to the fourth step. If the version is lower than 3.6. ****, uninstall the program using standard Windows tools and restart the computer. Then go to the next step.

Second step: download the distribution

Fill in the required fields, agree with the license agreement and go to the next page (at the time of writing the instructions, it looked like this):

Third step: installing CryptoPRO CSP on your computer

Run the downloaded file and follow the steps of the installer until you see the following window:

Enter the required information and the Serial Number that you received when purchasing your license. If you want to get free trial access, leave this field blank and click Further.



After the installation is complete, restart your computer. Ready!

Fourth step: entering the license key (optional)

If the program is already installed on your computer and you only need to enter the license key, follow the next path.

CIPF(means of cryptographic information protection) "CryptoPro CSP" is an independent OS module designed to perform various crypto operations, such as electronic signature, encryption, and imitation protection. The functioning of the vast majority of encryption software products is impossible without a cryptographic provider, and it is also impossible to sign ES documents.

The functionality of the CryptoPro CSP module is that it:

  • allows you to submit reports electronically to various government agencies;
  • ensures participation in electronic trading;
  • organizes legally significant document flow;
  • protects confidential information at the time of its transfer.
Module "CryptoPro CSP" developed by "CRYPTO-PRO" - a company that is one of the leaders in the information security market. For this period, 5 versions of the "CryptoPro CSP" module have been released, the difference between which lies in the following parameters: the operating system in which the program operates; supported cryptoalgorithms; the validity period of certificates issued by the competent authorities. The development company has posted on its official Internet resource a table with a detailed comparison of all current versions of the CryptoPro CSP module. On this website, the developer company has posted information about valid certificates.

How to install "CryptoPro 4.0"

The last up-to-date version of the CryptoPro CSP module is the fourth, which operates on the basis of new signature algorithms in accordance with GOST R 34.10-2012. CryptoPro CSP 4.0 can run in Windows 10. At this time, this module is not certified, but the developer company plans to certify the 4th version of its product in the very near future.
The following is a description of how how to install "CryptoPro 4.0".
The official Internet resource of the developer company "CRYPTO-PRO" upon completion of the preliminary registration provides an opportunity to download files, distributions, updates, etc. of the "CryptoPro CSP" program.

Upon completion of registration, a page with a license agreement will appear. You must familiarize yourself with its terms and conditions and then, if you agree with them, click on "I agree." Next, you will go to the file download page.

In order to download the distribution kit, you must first select "CryptoPro CSP 4.0 for Windows and UNIX (uncertified)", and then, in the link that appears with information about the checksum, left-click on "CryptoPro CSP 4.0 for Windows".

How to install CryptoPro 4.0. When the download is complete, you need to run the just downloaded CSPSetup.exe program file. In the window that opens about the security warning, in order to allow the program to make changes to the computer, you need to click on the "Yes" button. In the next window that opens, select "Install (recommended)".


The direct installation of the CryptoPro CSP 4.0 module will begin, which will take a few seconds.

After the installation of the CryptoPro CSP 4.0 module on your computer, you can start working with it.

Memo:
  • under the terms of the license agreement, there is a limitation of the term of use of the demo version of "CryptoPro CSP 4.0", which is 90 days from the moment of the direct installation of the product;
  • The demo version of the CryptoPro CSP 4.0 module is provided only during the initial installation of the product, in case of repeated installation the program will not work in demo mode.
Information about the type of license and its validity period is available in the CryptoPro CSP application. In the Windows 10 operating system, it is most convenient to use the search for applications, for which you need to click on the "Magnifier" icon, which is located next to "Start", and then select "Classic application" CryptoPro CSP ".

A new "CryptoPro CSP" window will appear, where the "General" tab contains information about the license (serial number, not fully specified; owner name; organization name; license type: client or service; validity period; when the initial installation was carried out, etc.). etc.). Here you can also purchase a license online and enter its serial number.

The operation of the CryptoPro CSP 4.0 module is carried out during the entire period of the license. If the current license has expired, then you need to buy the right to a new one. This can be done at any convenient time. The license key (i.e. its serial number) is sent to the specified email address immediately after payment is received.
To enter a new serial number, you must click on "Enter license". A window will open in which in the "Serial number" item you should indicate the purchased license key and then click on "OK".

After completing all stages of the installation, the CryptoPro CSP 4.0 program is completely ready for work.

CSP CryptoPro is a reliable commercial software tool designed to add and verify cryptographic protection on important documents and other files that require an electronic digital signature (EDS). The program is intended primarily for companies that have switched to electronic document management. Thanks to it, it is possible to ensure the legal effect of individual securities presented exclusively in digital form. In fact, a digital signature is a kind of wet print for physical documents.

This solution complies with all applicable GOST standards governing information control and data integrity during transmission. To manage the security algorithms used in the CryptoPro CSP, a special manager is provided, which is also responsible for setting other parameters of the program. In addition to it, the package of the encryption provider includes tools that are responsible for "issuing" and verifying certificates. Also included is the CryptoPro Winlogon module. Its main task is to perform the initial authentication of new users in the Windows environment. This component is based on the Kerberos V5 protocol, and authorization occurs after checking the certificate of a USB token, smart card, or any other key media used in the enterprise. In general, a crypto provider allows you to use a variety of types of key carriers. For companies using relatively old computer equipment, it is even possible to use floppy disks in 3.5 format.

Based on the fact that we are dealing with an exclusively commercial software solution, it is easy to guess that it is paid. Although the developer of CryptoPro kindly provides a demo version of his tool, which can only be used for the first thirty days. After this period, you will need to purchase a license.

Key features

  • contains tools for adding and verifying an electronic digital signature (EDS);
  • knows how to add and check issued digital certificates;
  • gives legal weight to electronic copies of documents;
  • can authenticate after checking the certificate on the key carrier;
  • ensures control of the integrity of the transmitted information;
  • the algorithm used to generate hash sums and other algorithms used by the program fully comply with these GOSTs.

Software "CryptoPro CSP" designed to control the integrity of the system and application software, manage the key elements of the system in accordance with the rules of protection, authorization and ensure the legal significance of electronic documents when they are exchanged between users. In addition to the crypto provider itself, CryptoPro CSP includes the products CryptoPro TLS, CryptoPro EAP-TLS, CryptoPro Winlogon and CryptoPro Revocation Provider.


The solution is intended for:

  • authorization and ensuring the legal significance of electronic documents when exchanging them between users, through the use of procedures for the formation and verification of an electronic signature (ES) in accordance with domestic standards GOST R 34.10-2001 / GOST R 34.10-2012 (using GOST R 34.11-94 / GOST R 34.11-2012);
  • ensuring confidentiality and control of the integrity of information through its encryption and imitation protection, in accordance with GOST 28147-89;
  • ensuring the authenticity, confidentiality and imitation protection of TLS connections;
  • monitoring the integrity of the system and application software to protect it from unauthorized changes and violations of the correct functioning;
  • management of key elements of the system in accordance with the regulations of protective equipment.

Implemented algorithms

  • The algorithm for generating the value of the hash function is implemented in accordance with the requirements of GOST R 34.11-94 / GOST R 34.11-2012 “Information technology. Cryptographic information protection. Hash function ".
  • Algorithms for generating and verifying electronic signatures are implemented in accordance with the requirements of GOST R 34.10-2001 / GOST R 34.10-2012 “Information technology. Cryptographic information protection. Processes of Formation and Verification of Electronic Digital Signatures ”.
  • The data encryption / decryption algorithm and the calculation of the imitating insert are implemented in accordance with the requirements of GOST 28147-89 “Information processing systems. Cryptographic protection ".

When generating private and public keys, it is possible to generate with different parameters in accordance with GOST R 34.10-2001 / GOST R 34.10-2012.
When generating the value of the hash function and encryption, it is possible to use various replacement nodes in accordance with GOST R 34.11-94 and GOST 28147-89.

Supported types of key media

  • floppy disks 3.5;
  • smart cards using smart card readers, supporting the PC / SC protocol;
  • Touch-Memory tablets DS1993 - DS1996 using Accord 4+ devices, an electronic lock "Sable", "Krypton" or a Touch-Memory DALLAS tablet reader (only in Windows version);
  • electronic keys with USB interface (USB-tokens);
  • removable media with USB interface;
  • Windows registry
  • Solaris / Linux / FreeBSD OS files.
CSP 3.6 CSP 3.9 CSP 4.0 CSP 5.0
Windows Server 2016 x64 * x64 ** x64
Windows 10 x86 / x64 * x86 / x64 ** x86 / x64
Windows Server 2012 R2 x64 x64 x64
Windows 8.1 x86 / x64 x86 / x64 x86 / x64
Windows Server 2012 x64 x64 x64 x64
Windows 8 x86 / x64 x86 / x64 x86 / x64
Windows Server 2008 R2 x64 / itanium x64 x64 x64
Windows 7 x86 / x64 x86 / x64 x86 / x64 x86 / x64
Windows Server 2008 x86 / x64 / itanium x86 / x64 x86 / x64 x86 / x64
Windows Vista x86 / x64 x86 / x64
Windows Server 2003 R2 x86 / x64 / itanium x86 / x64 x86 / x64 x86 / x64
Windows Server 2003 x86 / x64 / itanium x86 / x64 x86 / x64 x86 / x64
Windows XP x86 / x64
Windows 2000 x86