Cryptopro 4.0 demo version. Purpose of CryptoPro CSP

Cryptoprovider - this is due to the crypto-protection information (), without any kind of vicor it becomes impossible. is formed from the structure of cryptographic algorithms, and the implementation of these processes is only possible due to the presence of CIPF. CryptoPro CSP is the most popular product on the Russian market of cryptographic utilities. This program involves a large number of electronic trading platforms, information systems (ISA FST, USAID, etc.) and control bodies that receive information via the Internet (FNP, FSS, P FR).

At the end of spring 2019, there are two active versions of SKZI in the “CRYPTO-PRO” line – 4.0 and 5.0. The new programs are certified and will provide a new set of capabilities for EDS users. This article focuses on the functions and characteristics of the software, licensing features, and the installation and adjustment procedure.

We will also help you to select the EDS. Consultation 24 years!

Submit your application and cancel your consultation.

SKZI CryptoPro version 4.0: characteristics and functional capabilities

Government portals and trading platforms that accept merchants post on their websites instructions for working with electronic documents. In addition, there is another popular crypto provider on the market - VipNet CSP. In addition, organizations (for example, Rosreestr) will allow companies to choose and order CryptoPro CSP. When issuing CECP certificates, the centers, which confirm, also most often use CryptoPro, because if the user installs another crypto provider on the PC, when the EP is created, they may be subject to damages.

Functions of the software

The CryptoPro software is systematically updated and perfected. Remains certified folded version (3-Base version). All current updates can be found on the official website of the retailer in the “Certificates” section.

The crypto provider is certified by the FSB. This means that you can use the law to create an electronic signature and encrypt data in accordance with the Federal Law-63.

SKZI contains the following functions:

  • gives legal force to digital files certified by ECPC;
  • avoids compromising data using additional methods of crypto-encryption and imitation security;
  • guarantees the integrity and immutability of electronic files;
  • supports official authorization of private enterprises and websites on Internet platforms and web portals of government agencies.

Without a crypto-provider, the client will not be able to take part in electronic document management (EDO) and carry out the following operations:

  • remote;
  • sending relevant documentation to Rosstat, Pension Fund of Russia and other authorities;
  • interaction in information services, AIS State Enterprise, DVS ZHKG etc.;
  • bank transfers and other financial transactions required by the CECP;
  • submitting an online application to participate in auctions under Federal Law No. 223 and No. 44;
  • support of bankruptcy procedures;
  • interaction with participants of the corporate EDO.

3 January 1, 2019 All CAs issue electronic certificates following the new standard (GOST R 34.10-2012). The security software fully complies with this standard and supports new crypto security algorithms.

  • Vimogi to the system for installing software

    For full use of all functional capabilities of the crypto provider, you do not need to install certificates in the PC registry. As a rule, CAs see certificates on a key flash drive, and in some cases they are sent to the official’s e-mail address.

    The certificate can be installed in the Service section of the CryptoPro program. It is recommended to follow this procedure exactly to the manufacturer's instructions. As a result, the certificate may result in savings for the father “Osobiste”.

    At the final stage, save the root certificate (RC) and place it on the CA website. This document is kept by the “Confidence” father. The KS fulfills an important function in the EDO – it confirms that the certificate was issued by an accredited CA.

SKZI(Subject to cryptographic protection of information) "CryptoPro CSP" is an independent OS module that can be used to enable various crypto-operations, such as electronic signature, encryption, and identity protection. The functioning of the most important encryption software products is impossible without a crypto provider, and signing EP documents is also impossible.

The functionality of the CryptoPro CSP module lies in the following:

  • allows you to submit information electronically to various authorities;
  • will ensure participation in electronic auctions;
  • organizes legally significant document processing;
  • Confidential information is protected at the time of transmission.
Module "CryptoPro CSP" divisions of "CRYPTO-PRO" - a company that is one of the leaders in the information security market. Currently, 5 versions of the “CryptoPro CSP” module have been released, the significance of which depends on the available parameters: the operating system in which the program functions; supported by cryptoalgorithms; terms of certificates as issued by the competent authorities. The retailer company has posted a table on its official Internet resource with detailed updates of all current versions of the CryptoPro CSP module. On this Internet site, the retailer company has posted information about these certificates.

How to install “CryptoPro 4.0”

The version of the CryptoPro CSP module remains current - the fourth, which operates on the basis of new signature algorithms in accordance with GOST R 34.10-2012. "CryptoPro CSP 4.0" can be used in Windows 10. At this time, the module is not certified, but the development company plans to certify the 4th version of its product in the near future.
Below is a description of what How to install “CryptoPro 4.0”.
The official Internet resource of the retailer company "CRYPTO-PRO" after completion of the preliminary registration allows you to download files, distributions, updates, etc. program "CryptoPro CSP".

After registration, the page with the license will appear. It is necessary to get acquainted with its rules and minds and then, once they are ready, press on “I am fit.” Next, you will go to the file storage page.

In order to download the distribution, you must first select “CryptoPro CSP 4.0 for Windows and UNIX (non-certified)”, and then click on “CryptoPro CSP 4.0 for Windows” with the information about the control sum. "

How to install "CryptoPro 4.0". Once the installation is completed, you must run the program file “CSPSetup.exe” to perform the installation. In the security system warning, to allow programs to make changes to your computer, you need to click on the “So” button. In the window that opens, select “Install (recommended).”


The installation of the “CryptoPro CSP 4.0” module will be a hassle, and it will take a few seconds.

After installing the CryptoPro CSP 4.0 module on your computer, you can start working with it.

Reminder:
  • At the discretion of the licensed area, the term used for the demo version of "CryptoPro CSP 4.0" is used, which means 90 days from the moment of immediate installation of the product;
  • The demo version of the module “CryptoPro CSP 4.0” is only available during the initial installation of the product; once the program is re-installed, it cannot be used in demo mode.
Information about the license type and period is available in the CryptoPro CSP add-on. In the Windows 10 operating system, the easiest way to quickly search for programs is to click on the “Magnifying Glass” icon located next to “Start”, and then select “Classic add-on “CryptoPro CSP”.

Open the new “CryptoPro CSP” window, where the “Zagalny” tab contains information about the license (serial number, instructions for further obligations; name of the owner; name of the organization; type of license: client ska chi service; period of action; primary installation then. Here you can also purchase a license online and enter the serial number.

The operation of the module "CryptoPro CSP 4.0" lasts for the duration of the current license period. If the term of the streaming license has expired, it is necessary to add the right to a new one. You can earn money at any time. The license key (or serial number) will be sent to the specified email address immediately after payment is due.
To enter a new serial number, click “Enter license”. A window will open in which, in the “Serial number” section, enter the license key and click on “Ok”.

After completing all installation stages, the CryptoPro CSP 4.0 program is completely ready for use.

CSP CryptoPro is a program for adding and verifying digital files. It adds and protects cryptographic files (electronic documents), which have a digital signature. CryptoPro has Winlogon for even important documents and third-party files that support a digital certificate.

CSP CryptoPro is available to companies, where the documents are in electronic form. The program will ensure the protection and legal validity of valuable documents and papers in digital form. Data with a digital signature are valid as official documents.

CSP CryptoPro allows you to create digital security and provide a signature (certificate) for any document. This program is suitable for organizations in accordance with current GOST standards. This controls the structure of information. Security program algorithms are managed through a special manager.

You can configure the CSP CryptoPro and specify the protection and confidentiality of documents. After customization, these documents will remain strictly confidential. The program is equipped with tools that can verify and verify safety certificates. Using the CryptoPro Winlogon module, you can register new accounts in the Windows operating system.

CryptoPro Winlogon supports the Kerberos V5 protocol. Login and access to data is possible after verifying the carrier certificate with information held by the organization.

The crypto-provider will ensure the protection of various types of digital data. Older organizations and companies have equipment for supporting floppy disks. CryptoPro was created on a commercial basis with a paid license. Having installed the program, you use it for 30 days, this is the trial period. After this you will have to obtain a license.

Key features

  • Securing a digital certificate through verification tools;
  • continuous verification of digital documents and the relevance of the certificate;
  • electronic registration of documents on a legal basis;
  • access to the certificate on the main page and verification;
  • further control and verification of data after the transfer of information;
  • equalization of document size and other algorithms for robots;
  • the program supports documents created in accordance with these GOST standards;
  • new protection of digital documents and adjusted level of protection;

CryptoPro CSP 5.0 is a new generation of crypto provider that develops three main product lines of the CryptoPro company: CryptoPro CSP (classic tokens and other passive secret key storages), CryptoPro FKN CSP/Rutoken CSP (not developed and keys on tokens at Khmari).

All the benefits of the products of these lines are not only saved, but also multiplied in CryptoPro CSP 5.0: a wider list of supported platforms and algorithms, a wide range of software, a user-friendly customer interface. Ale smut - a robot with all the keys, including the keys of the hmari, now however. To transfer the application system, which runs CryptoPro CSP, be it any version, to support keys in the dark or on a new one with undelivered keys, it will not be necessary to rework the software - the access interface is deprived of the same, and the robot and with the key, Khmari will look exactly like this just like with the classic key nose.

Purpose of CryptoPro CSP

  • Formation and verification of the electronic signature.
  • Ensuring confidentiality and monitoring the integrity of information through additional encryption and security.
  • Ensuring authenticity, confidentiality and imitosis of the protocols, etc.
  • Monitors the integrity of system and application software to protect against unauthorized changes and disruption of trusted functionality.

Supported algorithms

CryptoPro CSP 5.0 has Russian implementations of foreign cryptographic algorithms. Now users can use primary key carriers to save RSA and ECDSA private keys.

Supported key saving technology

Khmarny token

Cryptoprovider CryptoPro CSP 5.0 now has the ability to retrieve keys that are stored on the CryptoPro DSS service through the CryptoAPI interface. Now the keys that are stored by the company can be easily stolen by both add-ons and most of Microsoft's add-ons.

Noses with unrecovered keys and stolen communications

CryptoPro CSP 5.0 has added support for carriers with non-delivered keys to implement the protocol SESPAKE, which allows you to carry out authentication without transmitting the user's password to the private user, and establish an encryption channel for exchange between the crypto provider and the host. The thief who is in the channel between the nose and the customer program cannot steal the password during authentication, nor change the data that is being subscribed. With the presence of such devices, the problem of safe operation with keys that cannot be caught arises.

The companies Active, InfoCrypt, SmartPark and Gemalto have developed new stolen tokens that support this protocol (SmartPark and Gemalto starting with version 5.0 R2).

Noses with keys that do not get caught.

Many investors want to be able to deal with the keys without being seized, otherwise they will not upgrade the tokens to the level of the FKN. Especially for them, the provider has been given support for the popular key carriers Rutoken EDS 2.0, JaCarta-2 GOST and InfoCrypt VPN-Key-TLS.

List of models and models supported by CryptoPro CSP 5.0

List of variants and models of carriers with unreleased keys supported by CryptoPro CSP 5.0
Company Nosy
ISBC Esmart Token GOST
Assets Rutoken 2151
Rutoken PINPad
Rutoken EDS
Rutoken EDS 2.0
Rutoken EDS 2.0 2100
Rutoken EDS 2.0 3000
Rutoken EDS PKI
Rutoken EDS 2.0 Flash
Rutoken EDS 2.0 Bluetooth
Rutoken EDS 2.0 Touch
Smart card Rutoken 2151
Smart card Rutoken EDS 2.0 2100
Aladdin R.D. JaCarta-2 GOST
Infocrypt InfoCrypt Token++ TLS
InfoCrypt VPN-Key-TLS

Classic passive USB tokens and smart cards

Most vendors give preference to quick, cheap and easy solutions for storing keys. As a rule, advantage is given to tokens and smart cards without cryptographic processors. As in previous versions of the provider, CryptoPro CSP 5.0 maintains support for all the great production companies of the companies Asset, Aladdin R.D., Gemalto/SafeNet, Multisoft, NovaCard, Rosan, Alioth, MorphoKST and SmartPark.

In addition, as before, we encourage ways to save keys in the Windows registry, on a hard drive, on flash drives on all platforms.

List of models and models supported by CryptoPro CSP 5.0

List of brands and models of classic passive USB tokens and smart cards supported by CryptoPro CSP 5.0
Company Nosy
Alioth SCOne Series (v5/v6)
Gemalto Optelio Contactless Dxx Rx
Optelio Dxx FXR3 Java
Optelio G257
Optelio MPH150
ISBC Esmart Token
Esmart Token GOST
MorphoKST MorphoKST
NovaCard Cosmo
Rosan G&D element V14 / V15
G&D 3.45 / 4.42 / 4.44 / 4.45 / 4.65 / 4.80
Kona 2200s / 251 / 151s / 261 / 2320
Kona2 S2120s/C2304/D1080
SafeNet eToken Java Pro JC
eToken 4100
eToken 5100
eToken 5110
eToken 5105
eToken 5205
Assets Rutoken 2151
Rutoken S
Rutoken KP
Rutoken Lite
Rutoken EDS
Rutoken EDS 2.0
Rutoken EDS 2.0 3000
Rutoken EDS Bluetooth
Rutoken EDS Flash
Smart card Rutoken 2151
Smart card Rutoken Lite
Smart card Rutoken EDS SC
Smart card Rutoken EDS 2.0
Aladdin R.D. JaCarta GOST
JaCarta PKI
JaCarta PRO
JaCarta LT
JaCarta-2 GOST
Infocrypt InfoCrypt Token++ lite
Multisoft MS_Key isp.8 Hangar
MS_Key ESMART version 5
SmartPark Master's degree
R301 Foros
Oscar
Oscar 2
Rutoken Magistra

CryptoPro Tools

The CryptoPro CSP 5.0 warehouse now has a cross-platform (Windows/Linux/macOS) graphical add-on - “CryptoPro Tools”.

The main idea is to enable freelancers to manually create typical tasks. All the main functions are available in a simple interface - in which we have implemented a mode for checking in with clients, which opens up additional capabilities.

Additionally, CryptoPro Tools support the management of containers, smart cards and configurations of crypto providers, as well as the ability to create and verify a PKCS#7 electronic signature.

Supported by the security program

CryptoPro CSP allows you to quickly and safely use Russian cryptographic algorithms in the following standard add-ons:

  • office package Microsoft Office;
  • mail server Microsoft Exchange that client Microsoft Outlook;
  • products Adobe Systems Inc.;
  • browsers Yandex.Browser, Suputnik, Internet Explorer,Edge;
  • Securing the formation and verification of the signature of supplements Microsoft Authenticode;
  • web servers Microsoft IIS, nginx, Apache;
  • Features of remote work tables Microsoft Remote Desktop Services;
  • Microsoft Active Directory.

Integration with the CryptoPro platform

With the first release, support and excellence will be ensured with our products:

  • CryptoPro CA;
  • CA Services;
  • CryptoPro EDS;
  • CryptoPro IPsec;
  • CryptoPro EFS;
  • CryptoPro.NET;
  • CryptoPro Java CSP.
  • CryptoPro NGate

Operating systems and hardware platforms

Traditionally we work with an incredibly wide range of systems:

  • Microsoft Windows;
  • Mac OS;
  • Linux;
  • FreeBSD;
  • Solaris;
  • Android;
  • Sailfish OS.

hardware platforms:

  • Intel/AMD;
  • PowerPC;
  • MIPS (Baikal);
  • VLIW (Elbrus);
  • Sparc.

and virtual media:

  • Microsoft Hyper-V
  • VMWare
  • Oracle Virtual Box
  • RHEV.

Supported by different versions of CryptoPro CSP.

For the use of CryptoPro CSP with a license on the desktop and server.

Interface for implementation

To install add-ons on all CryptoPro CSP platforms accessible through standard interfaces for cryptographic applications:

  • Microsoft CryptoAPI;
  • PKCS#11;
  • OpenSSL engine;
  • Java CSP (Java Cryptography Architecture)
  • Qt SSL.

Productivity with all the gusto

The extensive development experience allows you to explore all solutions from miniature ARM boards, such as Raspberry PI, to high-processor servers based on Intel Xeon, AMD EPYC and PowerPC, significantly scaling productivity.

Regulatory documents

Renewal of regulatory documents

  • The crypto provider uses algorithms, protocols and parameters specified in the current documents of the Russian standardization system:
  • R 50.1.113–2016 “Information development. Cryptographic protection of information. Cryptographic algorithms that support the implementation of electronic digital signature algorithms and hashing functions" (also part of RFC 7836
  • R 50.1.114–2016 “Information development. Cryptographic protection of information. Parameters of elliptic curves for cryptographic algorithms and protocols" (also section RFC 7836 "Guidelines on the Cryptographic Algorithms to Accompany
  • R 50.1.111–2016 “Information development. Cryptographic protection of information. Password protection of key information"
  • R 50.1.115–2016 “Information development. Cryptographic protection of information. Protocol for key generation with password-based authentication" (also div. RFC 8133 The Security Evaluated Standardized Password-Authenticated Key Exchange (SESPAKE) Protocol ")
  • Methodological recommendations of TC 26 "Cryptographic protection of information" "Variable sets of encryption algorithms based on GOST 28147-89 for the transport layer security protocol (TLS)"
  • Methodical recommendations of TC 26 “Cryptographic protection of information” “Validation of algorithms GOST 28147-89, GOST R 34.11 and GOST R 34.10 for cryptographic information in the CMS format”
  • Technical specification TK 26 “Cryptographic protection of information” “Vykoristannya GOST 28147-89, GOST R 34.11-2012 and GOST R 34.10-2012 for the IKE and ISAKMP key exchange protocols”
  • Technical specification TK 26 "Cryptographic protection of information" "Vykoristanny GOST 28147-89 for encrypted deposits in IPsec ESP protocols"
  • Technical specification TC 26 “Cryptographic protection of information” “Validation of algorithms GOST R 34.10, GOST R 34.11 in the certificate profile and certificate response list (CRL) infrastructure” "secret keys X.509"
  • Technical specification TC 26 “Cryptographic protection of information” “Extension of PKCS#11 for the use of Russian standards GOST R 34.10-2012 and GOST R 34.11-2012”

Good day, dear friends! Today I want to take a look at a very important software product for our robot, CryptoPro CSP. CryptoPro CSP is a program, not costless, as it helps us install our certificates, or EDS, EP, for sure, that’s the same thing.

Let's get to know this program better. There is a list of versions of this program. Versions 3.6, 3.9, 4.0. In addition, there is no need to modify the skin version.

Versions of CryptoPro CSP

Why are there 3 versions? Why not get rid of one more thing? The answer is even simpler. The skin version is built under the same operating system. For example, CryptoPro CSP 3.6 can be installed on Windows 2000, XP And so on, but there is a boundary. The remaining operating system, you can install version 3.6 – not Windows 8 or Windows 2012. What can we say about you? Windows 10? Then you need to install version 4.0. There are no special features between 3.9 and 4.0, just from the operating platforms.

So what's wrong with you? Windows 7, then you need to buy version 3.6, and for Windows 10, then 4.0.

License for CryptoPro CSP

License for CryptoPro CSP Obov'yazkovo needs to be bathed. The license price is not so high that you would steal the program. Tim more CryptoPro The company is not greedy and has a line-free license, following the “buy and forget” principle. However, there are times when the program is needed in the middle of the night and there is no time to buy it and there may not be any time. So I’ll tell you a little secret.

CryptoPro CSP cost-free!

You didn't succeed! CryptoPro CSP It’s still possible to be without catastrophe. Guys,who wrote the program, I repeat, don’t be greedy and understand everything. That's why they gave you a gift from the appearance of stealing their program without any harm. e threeoh months However, after the trial period ends, you will still have to obtain a license forDanish software product.

How to install CryptoPro CSP

T Now let's take a look at the process of installing programs. For whom the distribution kit is desired, we unpack it and open it. I am installing version 3.6.

I'll unpack the distribution

Now open the installation file, just double-click the left mouse button.

Bachimo installation process.

The program can be delayed, so it is possible that after installing the program, you will have to restart your computer. Therefore, please, first of all, save all your open documents and close all programs so as not to waste your data. We press “OK”

After that, as a program I’ll definitely be happy to show up at your place. Just press “Ready”

After what program asks you to re-engage now or later? You can earn it at once, then press “ OK ", if you want to re-enable it later, press "Ni".

Everything that has been installed is complete!

Zavantazhiti CryptoPro CSP cost-free

You can download the program from the official website, but prior registration is required there. Ale virobnik talk about those that the installation can be carried out only after you buy the program either from them or from partners. Everything seems right. Ale yakscho You still just want to know b If you have a program, then you can get it from me.

Zavantazhiti CryptoPro CSP 4.0

Zavantazhiti CryptoPro CSP 3.9 R2

Zavantazhiti CryptoPro CSP 3.6 R4

CryptoPro CSP 5.0

Also read my article thoroughly. There I tell you about why this plugin is needed and how important it is for our work. CryptoPro CSP.

N that's all! If you have any questions about your nutrition, ask them in the comments! Good luck to everyone!

Let's be the first to get all the new stuff from our site!