CryptoPro 4.0 trial version. Purpose of CryptoPro CSP. Classic passive USB tokens and smart cards

CSP CryptoPro is a program for adding and verifying digital files. It adds and protects cryptographic files (electronic documents) that are digitally signed. CryptoPro has a "Winlogon" for very important documents and third-party files that support a digital certificate.

CSP CryptoPro is used in companies that have electronic documents. The program provides protection and legal effect for digital securities and documents. Digitally signed data is as powerful as official documents.

CSP CryptoPro allows you to create digital protection and sign (certificate) any document. This program is suitable for organizations with valid GOSTs. She controls the data and the structure of information. The management of the safety program algorithms is provided through a special manager.

You can configure the CryptoPro CSP and specify the level of protection and confidentiality of documents. After customization, some documents will be strictly confidential. The program is equipped with tools that issue and verify safety certificates. Using the CryptoPro Winlogon module, you can register new users in the Windows operating system.

CryptoPro Winlogon works with Kerberos V5 protocol support. Login and access to data is carried out after a complete verification of the certificate of the storage medium in the organization.

A crypto provider provides protection for various sources of digital data. Older organizations and companies use hardware to support floppy disks. CryptoPro is created on a commercial basis with a paid license. After installing the program, you use it for 30 days, that is, the trial period. After that, you have to buy a license.

Key features

  • Digital certificate protection, through verification tools;
  • full verification of digital documents and the relevance of the certificate;
  • electronic registration of documents on a legal basis;
  • access to the certificate on the main carrier and its verification;
  • full control and verification of data after the transfer of information;
  • comparison of document size and other algorithms for work;
  • the program supports documents that are created according to these GOSTs;
  • full protection of digital documents and setting the degree of protection;

Exchange of a full range of electronic commercial documents accompanying all stages of ordering and delivery of goods directly from the customer's accounting systems.

Full control of the goods delivery process

Exchange of a full range of electronic documents in the FTS format, accompanying all stages of delivery and return of goods, mutual settlements, directly from the accounting systems of customers.

Storage of electronic accounting documents.

The manufacturer places data on its products and forms its own sales channel for each distributor, fills it with an assortment and sets prices, provides distributors with access to their personal account with personal product catalogs and price conditions.

Distributors form orders and reports on sales, balances in relation to the agreed range.

It allows you to quickly and reliably synchronize information about goods in all sales channels: with retail chains, distributors, online stores, and your own retail.

Processes and stores logistic parameters, pricing conditions, consumer properties, media data and permits.

Instant registration of batches of manufactured products Formation and cancellation of veterinary certificates immediately at the time of shipment and acceptance of goods in relation to shipping documents

Monitoring and correcting documents in real time

Legal support in the process of financing monetary claims with the participation of the buyer of the claim (factoring company or bank), the supplier of the goods (creditor) and the buyer of the goods (the debtor).

Transparent and secure automated three-way interaction of the participants in a factoring transaction, assignment and confirmation of the rights of a monetary claim.

A full set of electronic documents accompanying factoring operations in EDI and FTS format

Balance sheet and other financial indicators

Won and placed government contracts

Report for closing risks to the Federal Tax Service and the head

Affiliates, connections of companies and their owners

EXTRACT FROM USRLE / EGRIP

Lawsuits, register of unscrupulous suppliers

Select and purchase tickets at the best prices, arrange hotel reservations, transfers, travel documents, generate accounting reports

Convenient travel management and control of travel expenses within the organization

Postpay option, all travel expenses are collected in one invoice

Procurement 44-FZ, 223-FZ

Commercial auctions, bankruptcy auctions

Registration of legal entity / individual entrepreneur, cash desk

Submission of reports to government agencies, electronic document management

State portals and public services, federal customs service, EGAIS FSRAR

Doctor's electronic signature

A comprehensive solution for preparing for mandatory labeling of goods: issuing an electronic signature for registration in the Chestny ZNAK system, setting up an accounting system for working with goods, exchanging electronic documents with the appropriate labeling code.

CryptoPro CSP 5.0 is a new generation of crypto provider that develops the three main product lines of CryptoPro: CryptoPro CSP (classic tokens and other passive storage of secret keys), CryptoPro FKN CSP / Rutoken CSP (non-retrievable keys on tokens with secure message exchange) and CryptoPro in the cloud).

All the advantages of the products of these lines are not only preserved, but also multiplied in CryptoPro CSP 5.0: the list of supported platforms and algorithms is wider, the performance is higher, and the user interface is more convenient. But the main thing is that the work with all key carriers, including keys in the cloud, is now uniform. To transfer the application system in which CryptoPro CSP of any version worked to support keys in the cloud or to new media with unrecoverable keys, no software reworking is required - the access interface remains the same, and work with the key in the cloud will be exactly the same in the same way as with the classic key carrier.

Purpose of CryptoPro CSP

  • Formation and verification of electronic signature.
  • Ensuring confidentiality and control of the integrity of information through its encryption and imitation protection.
  • Ensuring the authenticity, confidentiality and imitation of protocol connections, etc.
  • Monitoring the integrity of system and application software to protect it from unauthorized changes and violations of trusted functioning.

Supported algorithms

In CryptoPro CSP 5.0, along with Russian ones, foreign cryptographic algorithms are implemented. Users can now use their familiar key media to store their RSA and ECDSA private keys.

Supported key storage technologies

Cloud token

For the first time in the CryptoPro CSP 5.0 encryption provider, it is possible to use keys stored on the CryptoPro DSS cloud service through the CryptoAPI interface. Now keys stored in the cloud can be easily used by any custom application or most Microsoft applications.

Non-retrievable key media with secure messaging

CryptoPro CSP 5.0 adds support for non-retrievable key media implementing the protocol SESPAKE allowing to carry out authentication without transmitting the user's password in the open form, and to establish an encrypted channel for exchanging messages between the encryption provider and the carrier. An attacker who is in the channel between the carrier and the user's application can neither steal the password during authentication, nor change the signed data. When using such media, the problem of safe handling of non-retrievable keys is completely solved.

The companies Active, InfoCrypt, SmartPark and Gemalto have developed new secure tokens that support this protocol (SmartPark and Gemalto starting from version 5.0 R2).

Non-retrievable key media

Many users want to be able to work with non-retrievable keys, but at the same time not update tokens to the FCN level. Especially for them, the provider has added support for the popular key carriers Rutoken EDS 2.0, JaCarta-2 GOST and InfoCrypt VPN-Key-TLS.

List of manufacturers and models supported by CryptoPro CSP 5.0

List of manufacturers and models of non-retrievable media supported by CryptoPro CSP 5.0
Company Carrier
ISBC Esmart Token GOST
Assets Rutoken 2151
Rutoken PINPad
Rutoken EDS
Rutoken EDS 2.0
Rutoken EDS 2.0 2100
Rutoken EDS 2.0 3000
Rutoken EDS PKI
Rutoken EDS 2.0 Flash
Rutoken EDS 2.0 Bluetooth
Rutoken EDS 2.0 Touch
Smart card Rutoken 2151
Smart card Rutoken EDS 2.0 2100
Aladdin R.D. JaCarta-2 GOST
Infocript InfoCrypt Token ++ TLS
InfoCrypt VPN-Key-TLS

Classic passive USB tokens and smart cards

Most users prefer fast, cheap and convenient key storage solutions. As a rule, preference is given to tokens and smart cards without cryptographic coprocessors. As in previous versions of the provider, CryptoPro CSP 5.0 retains support for all compatible carriers produced by Active, Aladdin R.D., Gemalto / SafeNet, Multisoft, NovaCard, Rosan, Alioth, MorphoKST and SmartPark.

In addition, of course, as before, methods of storing keys in the Windows registry, on the hard disk, on flash drives on all platforms are supported.

List of manufacturers and models supported by CryptoPro CSP 5.0

List of manufacturers and models of classic passive USB tokens and smart cards supported by CryptoPro CSP 5.0
Company Carrier
Alioth SCOne Series (v5 / v6)
Gemalto Optelio Contactless Dxx Rx
Optelio Dxx FXR3 Java
Optelio G257
Optelio MPH150
ISBC Esmart Token
Esmart Token GOST
MorphoKST MorphoKST
NovaCard Cosmo
Rosan G&D element V14 / V15
G&D 3.45 / 4.42 / 4.44 / 4.45 / 4.65 / 4.80
Kona 2200s / 251 / 151s / 261/2320
Kona2 S2120s / C2304 / D1080
SafeNet eToken Java Pro JC
eToken 4100
eToken 5100
eToken 5110
eToken 5105
eToken 5205
Assets Rutoken 2151
Rutoken S
Rutoken KP
Rutoken Lite
Rutoken EDS
Rutoken EDS 2.0
Rutoken EDS 2.0 3000
Rutoken EDS Bluetooth
Rutoken EDS Flash
Smart card Rutoken 2151
Smart card Rutoken Lite
Smart card Rutoken EDS SC
Smart card Rutoken EDS 2.0
Aladdin R.D. JaCarta GOST
JaCarta PKI
JaCarta PRO
JaCarta LT
JaCarta-2 GOST
Infocript InfoCrypt Token ++ lite
Multisoft MS_Key isp.8 Hangar
MS_Key ESMART ver. 5
SmartPark Master's
R301 Foros
Oscar
Oscar 2
Rutoken Magister

CryptoPro tools

CryptoPro CSP 5.0 includes a cross-platform (Windows / Linux / macOS) graphical application - "CryptoPro Tools".

The main idea is to provide an opportunity for users to conveniently solve typical tasks. All the main functions are available in a simple interface - at the same time, we have implemented a mode for advanced users, which opens up additional possibilities.

With the help of CryptoPro Tools, the tasks of managing containers, smart cards and settings of crypto providers are solved, and we also added the ability to create and verify an electronic signature PKCS # 7.

Supported software

CryptoPro CSP allows you to quickly and safely use Russian cryptographic algorithms in the following standard applications:

  • office suite Microsoft Office;
  • mail server Microsoft Exchange and the client Microsoft Outlook;
  • products Adobe Systems Inc.;
  • browsers Yandex Browser, Sputnik, Internet Explorer,Edge;
  • application signature generation and verification tool Microsoft Authenticode;
  • web servers Microsoft IIS, nginx, Apache;
  • remote desktop tools Microsoft Remote Desktop Services;
  • Microsoft Active Directory.

Integration with the CryptoPro platform

From the very first release, support and compatibility with all our products is provided:

  • CryptoPro UC;
  • TC services;
  • CryptoPro EDS;
  • CryptoPro IPsec;
  • CryptoPro EFS;
  • CryptoPro.NET;
  • CryptoPro Java CSP.
  • CryptoPro NGate

Operating systems and hardware platforms

Traditionally, we work in an unrivaled wide range of systems:

  • Microsoft Windows;
  • Mac OS;
  • Linux;
  • FreeBSD;
  • Solaris;
  • Android;
  • Sailfish OS.

hardware platforms:

  • Intel / AMD;
  • PowerPC;
  • MIPS (Baikal);
  • VLIW (Elbrus);
  • Sparc.

and virtual environments:

  • Microsoft Hyper-V
  • VMWare
  • Oracle Virtual Box
  • RHEV.

Supported by different versions of CryptoPro CSP.

To use CryptoPro CSP with a license for a workplace and a server.

Embedding interfaces

For embedding into applications on all platforms, CryptoPro CSP is available through standard interfaces for cryptographic tools:

  • Microsoft CryptoAPI;
  • PKCS # 11;
  • OpenSSL engine;
  • Java CSP (Java Cryptography Architecture)
  • Qt SSL.

Performance for every taste

Years of development experience allows us to cover all solutions from miniature ARM boards like the Raspberry PI to multiprocessor servers based on Intel Xeon, AMD EPYC and PowerPC, with great performance scalability.

Regulatory documents

Full list of regulatory documents

  • The cryptographic provider uses algorithms, protocols and parameters defined in the following documents of the Russian standardization system:
  • R 50.1.113–2016 “Information technology. Cryptographic information protection. Cryptographic algorithms accompanying the use of digital signature algorithms and hashing functions "(also see RFC 7836" Guidelines on the Cryptographic Algorithms to Accompany the Usage of Standards GOST R 34.10-2012 and GOST R 34.11-2012 ")
  • R 50.1.114–2016 “Information technology. Cryptographic information protection. Elliptic Curve Parameters for Cryptographic Algorithms and Protocols "(also see RFC 7836" Guidelines on the Cryptographic Algorithms to Accompany the Usage of Standards GOST R 34.10-2012 and GOST R 34.11-2012 ")
  • R 50.1.111–2016 “Information technology. Cryptographic information protection. Password protection of key information "
  • R 50.1.115–2016 “Information technology. Cryptographic information protection. Shared Key Generation Protocol with Password Authentication "(also see RFC 8133 The Security Evaluated Standardized Password-Authenticated Key Exchange (SESPAKE) Protocol")
  • Methodological recommendations TC 26 "Cryptographic information protection" "Use of sets of encryption algorithms based on GOST 28147-89 for the transport layer security protocol (TLS)"
  • Methodological recommendations TC 26 "Cryptographic information security" "Use of algorithms GOST 28147-89, GOST R 34.11 and GOST R 34.10 in cryptographic messages in CMS format"
  • Technical specification TC 26 "Cryptographic information security" "Use of GOST 28147-89, GOST R 34.11-2012 and GOST R 34.10-2012 in the IKE and ISAKMP key exchange protocols"
  • Technical specification TC 26 "Cryptographic protection of information" "Using GOST 28147-89 when encrypting attachments in IPsec ESP protocols"
  • Technical specification TC 26 "Cryptographic protection of information" "Use of algorithms GOST R 34.10, GOST R 34.11 in the certificate profile and certificate revocation list (CRL) of the public key infrastructure X.509"
  • Technical specification TC 26 "Cryptographic protection of information" "Extension of PKCS # 11 for the use of Russian standards GOST R 34.10-2012 and GOST R 34.11-2012"

To protect the transmitted data, the croinform .ru Information Portal uses a cryptographic information protection tool (CIPF) of the Crypto-Pro company. To install this software, follow a few simple steps.

Step 1. Downloading the CryptoPro CSP distribution kit (version 4.0)

To download the distribution kit, go to the CRYPTO-PRO website http://www.cryptopro.ru/

In the "Login" form, enter the following username data: MBCI , password: MBCI and click Login


The Download Center page opens. In the list of programs, select CryptoPro CSP (First in the list).

Select the CryptoPro CSP distribution kit (version 4.0) appropriate for your operating system. Save the file to disk.

Step 2. Installing CryptoPro CSP (version 4.0)

Launch the CryptoPro CSP distribution package downloaded at step 1. The "Installation window" will appear on the screen. Select the recommended installation option, Install (Recommended).


A window will appear showing the CryptoPro CSP installation process.


After the installation process of CryptoPro CSP is completed, you will receive a message.


A temporary license is valid for 30 days. Upon the expiration of this period, the full package of functions of the CIPF stops working, but some of the information protection functions necessary for working with the Information Portal remain.