Computer lessons

Purpose of CryptoPro CSP. Installing Cryptopro Cryptopro 4.0 system requirements

CryptoPro CSP 5.0 is a new generation of crypto provider, developing three main product lines of the CryptoPro company: CryptoPro CSP (classic tokens and other passive storage of secret keys), CryptoPro FKN CSP/Rutoken CSP (unretrievable keys on tokens with secure messaging) and CryptoPro DSS (keys in the cloud).

All the advantages of products from these lines are not only preserved, but also multiplied in CryptoPro CSP 5.0: the list of supported platforms and algorithms is wider, performance is higher, and the user interface is more convenient. But the main thing is that working with all key media, including keys in the cloud, is now uniform. To transfer the application system in which CryptoPro CSP of any version worked to support keys in the cloud or to new media with non-removable keys, no software reworking will be required - the access interface remains the same, and work with the key in the cloud will occur exactly the same in the same way as with the classic key carrier.

Purpose of CryptoPro CSP

  • Generating and verifying an electronic signature.
  • Ensuring confidentiality and monitoring the integrity of information through its encryption and imitation protection.
  • Ensuring authenticity, confidentiality and imitational protection of connections using the and protocols.
  • Monitoring the integrity of system and application software to protect it from unauthorized changes and violations of trusted functioning.

Supported Algorithms

In CryptoPro CSP 5.0, along with Russian ones, foreign cryptographic algorithms are implemented. Now users have the opportunity to use familiar key media to store RSA and ECDSA private keys.

Supported key storage technologies

Cloud token

In the cryptoprovider CryptoPro CSP 5.0, for the first time, it became possible to use keys stored on the CryptoPro DSS cloud service through the CryptoAPI interface. Now keys stored in the cloud can be easily used by any user applications, as well as most Microsoft applications.

Media with non-retrievable keys and secure messaging

CryptoPro CSP 5.0 adds support for media with non-retrievable keys that implement the protocol SESPAKE, allowing authentication without transmitting the user’s password in clear text, and establishing an encrypted channel for the exchange of messages between the crypto provider and the carrier. An attacker located in the channel between the medium and the user's application can neither steal the authentication password nor replace the signed data. When using such media, the problem of secure work with non-removable keys is completely solved.

The companies Active, InfoCrypt, SmartPark and Gemalto have developed new secure tokens that support this protocol (SmartPark and Gemalto starting from version 5.0 R2).

Media with non-removable keys

Many users want to be able to work with non-retrievable keys, but not upgrade tokens to the FKN level. Especially for them, the provider has added support for the popular key carriers Rutoken EDS 2.0, JaCarta-2 GOST and InfoCrypt VPN-Key-TLS.

List of manufacturers and models supported by CryptoPro CSP 5.0

List of manufacturers and models of media with non-retrievable keys supported by CryptoPro CSP 5.0
Company Carrier
ISBC Esmart Token GOST
Assets Rutoken 2151
Rutoken PINPad
Rutoken EDS
Rutoken EDS 2.0
Rutoken EDS 2.0 2100
Rutoken EDS 2.0 3000
Rutoken EDS PKI
Rutoken EDS 2.0 Flash
Rutoken EDS 2.0 Bluetooth
Rutoken EDS 2.0 Touch
Smart card Rutoken 2151
Smart card Rutoken EDS 2.0 2100
Aladdin R.D. JaCarta-2 GOST
Infocrypt InfoCrypt Token++ TLS
InfoCrypt VPN-Key-TLS

Classic passive USB tokens and smart cards

Most users prefer fast, cheap and convenient key storage solutions. As a rule, preference is given to tokens and smart cards without cryptographic coprocessors. As in previous versions of the provider, CryptoPro CSP 5.0 retains support for all compatible media produced by the companies Active, Aladdin R.D., Gemalto/SafeNet, Multisoft, NovaCard, Rosan, Alioth, MorphoKST and SmartPark.

In addition, of course, as before, methods for storing keys in the Windows registry, on a hard drive, on flash drives on all platforms are supported.

List of manufacturers and models supported by CryptoPro CSP 5.0

List of manufacturers and models of classic passive USB tokens and smart cards supported by CryptoPro CSP 5.0
Company Carrier
Alioth SCOne Series (v5/v6)
Gemalto Optelio Contactless Dxx Rx
Optelio Dxx FXR3 Java
Optelio G257
Optelio MPH150
ISBC Esmart Token
Esmart Token GOST
MorphoKST MorphoKST
NovaCard Cosmo
Rosan G&D element V14 / V15
G&D 3.45 / 4.42 / 4.44 / 4.45 / 4.65 / 4.80
Kona 2200s / 251 / 151s / 261 / 2320
Kona2 S2120s/C2304/D1080
SafeNet eToken Java Pro JC
eToken 4100
eToken 5100
eToken 5110
eToken 5105
eToken 5205
Assets Rutoken 2151
Rutoken S
Rutoken KP
Rutoken Lite
Rutoken EDS
Rutoken EDS 2.0
Rutoken EDS 2.0 3000
Rutoken EDS Bluetooth
Rutoken EDS Flash
Smart card Rutoken 2151
Smart card Rutoken Lite
Smart card Rutoken EDS SC
Smart card Rutoken EDS 2.0
Aladdin R.D. JaCarta GOST
JaCarta PKI
JaCarta PRO
JaCarta LT
JaCarta-2 GOST
Infocrypt InfoCrypt Token++ lite
Multisoft MS_Key isp.8 Hangar
MS_Key ESMART use.5
SmartPark Master's degree
R301 Foros
Oscar
Oscar 2
Magister's Rutoken

CryptoPro Tools

As part of CryptoPro CSP 5.0, a cross-platform (Windows/Linux/macOS) graphical application appeared - “CryptoPro Tools”.

The main idea is to provide users with the opportunity to conveniently solve common problems. All basic functions are available in a simple interface - at the same time, we have also implemented a mode for advanced users, which opens up additional possibilities.

Using CryptoPro Tools, the tasks of managing containers, smart cards and crypto provider settings are solved, and we have also added the ability to create and verify a PKCS#7 electronic signature.

Supported Software

CryptoPro CSP allows you to quickly and securely use Russian cryptographic algorithms in the following standard applications:

  • office suite Microsoft Office;
  • mail server Microsoft Exchange and client Microsoft Outlook;
  • products Adobe Systems Inc.;
  • browsers Yandex.Browser, Sputnik, Internet Explorer,Edge;
  • application signature generation and verification tool Microsoft Authenticode;
  • web servers Microsoft IIS, nginx, Apache;
  • Remote Desktop Tools Microsoft Remote Desktop Services;
  • Microsoft Active Directory.

Integration with the CryptoPro platform

From the very first release, support and compatibility with all our products are provided:

  • CryptoPro CA;
  • CA Services;
  • CryptoPro EDS;
  • CryptoPro IPsec;
  • CryptoPro EFS;
  • CryptoPro.NET;
  • CryptoPro Java CSP.
  • CryptoPro NGate

Operating systems and hardware platforms

Traditionally, we work in an unrivaled wide range of systems:

  • Microsoft Windows;
  • Mac OS;
  • Linux;
  • FreeBSD;
  • Solaris;
  • Android;
  • Sailfish OS.

hardware platforms:

  • Intel/AMD;
  • PowerPC;
  • MIPS (Baikal);
  • VLIW (Elbrus);
  • Sparc.

and virtual environments:

  • Microsoft Hyper-V
  • VMWare
  • Oracle Virtual Box
  • RHEV.

Supported by different versions of CryptoPro CSP.

To use CryptoPro CSP with a license for a workstation and a server.

Interfaces for embedding

For integration into applications on all platforms, CryptoPro CSP is available through standard interfaces for cryptographic tools:

  • Microsoft CryptoAPI;
  • PKCS#11;
  • OpenSSL engine;
  • Java CSP (Java Cryptography Architecture)
  • Qt SSL.

Performance for every taste

Years of development experience allows us to cover all solutions from miniature ARM boards such as Raspberry PI to multiprocessor servers based on Intel Xeon, AMD EPYC and PowerPC, with excellent performance scaling.

Regulatory documents

Complete list of regulatory documents

  • The crypto provider uses algorithms, protocols and parameters defined in the following documents of the Russian standardization system:
  • R 50.1.113–2016 “Information technology. Cryptographic information protection. Cryptographic algorithms accompanying the use of electronic digital signature algorithms and hashing functions" (also see RFC 7836 "Guidelines on the Cryptographic Algorithms to Accompany the Usage of Standards GOST R 34.10-2012 and GOST R 34.11-2012")
  • R 50.1.114–2016 “Information technology. Cryptographic information protection. Elliptic curve parameters for cryptographic algorithms and protocols" (also see RFC 7836 "Guidelines on the Cryptographic Algorithms to Accompany the Usage of Standards GOST R 34.10-2012 and GOST R 34.11-2012")
  • R 50.1.111–2016 “Information technology. Cryptographic information protection. Password protection of key information"
  • R 50.1.115–2016 “Information technology. Cryptographic information protection. "Shared Key Generation Protocol with Password Authentication" (also see RFC 8133 The Security Evaluated Standardized Password-Authenticated Key Exchange (SESPAKE) Protocol ")
  • Methodological recommendations TC 26 “Cryptographic information protection” “Use of sets of encryption algorithms based on GOST 28147-89 for the transport layer security protocol (TLS)”
  • Methodological recommendations TC 26 “Cryptographic information protection” “Use of GOST 28147-89, GOST R 34.11 and GOST R 34.10 algorithms in cryptographic messages in CMS format”
  • Technical specification TC 26 “Cryptographic information protection” “Use of GOST 28147-89, GOST R 34.11-2012 and GOST R 34.10-2012 in the IKE and ISAKMP key exchange protocols”
  • Technical specification TC 26 “Cryptographic information protection” “Use of GOST 28147-89 when encrypting attachments in IPsec ESP protocols”
  • Technical specification TC 26 “Cryptographic information protection” “Use of GOST R 34.10, GOST R 34.11 algorithms in the certificate profile and certificate revocation list (CRL) of the X.509 public key infrastructure”
  • Technical specification TC 26 “Cryptographic information protection” “Extension of PKCS#11 for the use of Russian standards GOST R 34.10-2012 and GOST R 34.11-2012”

CSP CryptoPro is a program for adding and checking digital files. It adds and protects cryptographic files (electronic documents) that contain a digital signature. CryptoPro has "Winlogon" for very important documents and third-party files that support a digital certificate.

CSP CryptoPro is used in companies that have documents in electronic form. The program provides protection and legal force for valuable documents and securities in digital form. Digitally signed data has the power of official documents.

CSP CryptoPro allows you to create digital security and sign (certificate) for any document. This program is suitable for organizations with valid GOST standards. It controls the data and structure of information. Security program algorithms are managed through a special manager.

You can configure the CryptoPro CSP and specify the level of protection and confidentiality of documents. After setup, some documents will be strictly confidential. The program is equipped with tools that issue and verify security certificates. Using the CryptoPro Winlogon module, you can register new users in the Windows operating system.

CryptoPro Winlogon works with support for the Kerberos V5 protocol. Login and access to data is carried out after a complete verification of the certificate of the storage medium located in the organization.

The crypto provider provides protection for various sources of digital data. Older organizations and companies use hardware to support floppy disks. CryptoPro was created on a commercial basis with a paid license. Once you install the program, you use it for 30 days, that is, a trial period. After this you will have to buy a license.

Key Features

  • Digital certificate protection through verification tools;
  • full verification of digital documents and the relevance of the certificate;
  • electronic registration of documents on a legal basis;
  • accessing and verifying the certificate on the main media;
  • full control and verification of data after information transfer;
  • comparison of document size and other algorithms for work;
  • the program supports documents that are created in accordance with these GOSTs;
  • complete protection of digital documents and customization of the degree of protection;

A cryptoprovider is a means of cryptoprotection of information (), without which use becomes impossible. is formed on the basis of cryptographic algorithms, and the implementation of these processes is possible only with the presence of CIPF. CryptoPro CSP is the most popular product on the Russian market of cryptographic utilities. Most electronic trading platforms, state information systems (UAIS FST, EGAIS, etc.) and regulatory authorities that accept reports via the Internet (Federal Tax Service, Social Insurance Fund, Pension Fund of Russia) work with this program.

At the end of September 2019, two versions of CIPF are valid in the CRYPTO-PRO line - 4.0 and 5.0. Both programs are certified and provide a full range of capabilities for digital signature owners. In this article we will focus on, consider the functions and characteristics of the software, licensing features, installation and configuration procedures.

We will help you obtain an electronic signature. Consultation 24 hours!

Leave a request and get a consultation.

CIPF CryptoPro version 4.0: characteristics and functionality

State portals and trading platforms that accept information from users post on their websites requirements and instructions for working with electronic documents. In addition to , there is another popular crypto provider on the market - VipNet CSP. But some organizations (for example, Rosreestr) limit users’ choices and specify in the requirements the mandatory use of CryptoPro CSP. When issuing CEDS certificates, certification authorities also most often use CryptoPro, so if the user installs another crypto provider on the PC, errors may occur when creating the digital signature.

Software functions

CryptoPro software is systematically updated and improved. Latest certified build version (3-Base version). All current updates can be tracked on the developer’s official website in the “Certificates” section.

The crypto provider has been certified by the FSB. This means that it can be used to create an electronic signature and encrypt data in accordance with the Federal Law-63.

CIPF performs the following functions:

  • gives legal force to digital files certified by the CEDS;
  • prevents data compromise using modern cryptographic encryption and imitation protection tools;
  • guarantees the authenticity and immutability of electronic files;
  • supports the official authorization of private entrepreneurs and legal entities on Internet platforms and web portals of government bodies.

Without a crypto provider, the user will not be able to participate in electronic document management (EDF) and perform the following operations:

  • remote ;
  • sending reporting documentation to Rosstat, Pension Fund and other government agencies;
  • interaction with information services, AIS State Order, GIS Housing and Communal Services, etc.;
  • bank transfers and other financial transactions where CEDS are needed;
  • submitting an online application for participation in auctions under Federal Laws No. 223 and No. 44;
  • support of bankruptcy proceedings;
  • interaction with participants of corporate e-document flow.

From January 1, 2019, all CAs issue electronic certificates according to the new standard (GOST R 34.10-2012). The software fully complies with this standard and supports new cryptographic protection algorithms.

  • System requirements for installing software

    To fully use all the functionality of the crypto provider, all that remains is to install certificates in the PC registry. As a rule, CAs issue certificates on key flash media; in rare cases, they are sent to the owner’s email.

    The certificate is installed in the “Service” section of the CryptoPro program. It is recommended to perform this procedure in accordance with the instructions from the developer. As a result, the certificate should be saved in the “Personal” folder.

    At the final stage, save the root certificate (RC), which is available for download on the CA website. This document is saved in the Trusted folder. The CS performs an important function in e-document flow - it confirms that the certificate was obtained from an accredited CA.

Before installation, you need to understand: what is an digital signature and why is its installation necessary? EDS - electronic personal digital signature. This set of numbers and letters is used to encrypt documentation and certificates of different levels. The main content of documents is often passport or other personal data (for example, rights). Before installation, this signature must, of course, be obtained. This is done in a notary office that deals with electronic signature and digital signature.

If you want to install an electronic digital signature and confirm a printing license, then you need to install a program to recognize it in advance. Nothing will work without her. Often this is CryptoPRO CSP 3.6. You can either install it from a disk, having previously purchased it in a store, or install it from the Internet.

On a note! The second option is much simpler. The licensed version of the program costs about two to three thousand rubles.

Step 1. Carefully examine the data on your computer and use the Start menu to check whether the program has already been installed previously (especially if you are currently planning to use a device that is not yours).

  • if you don’t have it, then go to step number two;
  • if it is still on the device, then check the product version, see if it suits you (if not, then you should reinstall the program, if so, then leave everything unchanged), also do not forget to make sure that the CryptoPRO expiration date does not expired! It is very important.

Step 2. If you understand that this program is on your computer, then proceed to installation. Sometimes this is not entirely easy to do. You need to go to the licensed website (this is very important, since the pirated version will not work fully) and try to install the program.

  1. When you visit the site, you will see the following image.

  2. Here you need to select the “Pre-registration” column.

  3. When you click on this link, you will be asked to fill out a form. The main thing is to write reliable and complete data. After registration, we agree to the agreement and proceed to download.

Step 3. However, we are not downloading the program itself, but only the installation file. Therefore, after the file has downloaded, open it.

Step 4. Now we install the program itself.

Important! In some cases, it happens that the antivirus program does not allow CryptoPRO to pass, considering it to be viral or especially dangerous. Don’t be scared, just add the program to “Trusted” and install it further.

Step 4. We are waiting for the final download!

Step 5. For the program to work correctly on your personal computer, enter your license (key) number.

Video - Installing CryptoPro 4.0 and why you need it

Step-by-step installation of digital signature

Step 1. Open the “Control Panel” tab (using a magnifying glass or the “Start” menu).

Step 2. We launch the pre-installed program.

Step 3. When we launch CryptoPRO, we are transferred to the main screen of the program. As you can see, it has a lot of folds. We need a tab called “Service”.

Step 4. Next you need to “View certificates in the private key container.” You should not enter the name of the key container manually (although you can do so if you want, it is your right), but for convenience, click on the “Browse” tab.

Step 5. After your click, an additional tab will pop up where you will need to select your container, as well as the available reader. When you have read everything and checked the data, click “Okay”.

Step 6. If you did everything correctly, you will be taken back to the previous tab. We don’t need to add any more changes, so move on to the next window by clicking “Next”.

Step 7 You have moved to the next tab. Absolutely all personal information is located here, which was encrypted with an electronic digital signature. You can also find and view the validity period. Also check the serial number of your program and signature (you should never forget it). Select “Properties”.

Step 8 Now you have to install a new certificate.

Step 9 You will automatically be taken to the next tab. Here you need to carefully study all the information. And if you agree with it, then only move on to the next page.

Step 10 Here we need to look at all the certificates that are in the store. The “Browse” button will help with this.

Step 11 Since we encrypted our personal data, select the appropriate folder called “Personal” and click “Okay”.

Step 12 Congratulations! You have successfully installed the certificate. To complete it, click on “Finish” and wait just a couple of seconds.

You can install ready-made certificates both from a hard drive and from removable media. Now let's talk about installing an electronic signature from a flash drive.

In fact, apart from some actions, copying an electronic signature from a flash drive is no different from the usual installation of certificates. Before installation, you just need to insert the signed flash drive into your computer. Further actions will completely coincide with the usual installation.

Installing a root certificate

Why is it necessary to install a root certificate and where is it done? The root certificate is installed in a shared storage to secure the server and facilitate its smooth operation without any errors or shortcomings. To install and obtain a certificate, you will need a TCSP. This is a test certification center for the product. You will need to be logged into the application as an administrator to access the center's website. The site may be blocked by your antivirus, but this is completely normal. You just need to add it to the trusted ones so that no problems arise in the future.

From our new article, you can find out which one, and also consider a detailed overview of the best programs.

Step 1. Request a certificate.

Step 2. When you receive the permit, download it from the center.

Step 3. Open the certificate and install according to the instructions on the screen (you don’t have to do anything, just click on the “Next” button a few times).

Installing keys in the “Registry”

If you want to find out and also consider a detailed description of the program, you can read a new article about it on our portal.

Step 1. You need to configure the Registry. And only then can you start installing the key.


Step 2. Copy the container that contains the keys/key.

Step 3. Paste it into the Registry.

Step 4. Install the container in the program into the registry in the same way as was done with the certificate.


CryptoPRO freezes when installing a certificate, what should I do?

To prevent possible program freezes that will adversely affect the installation of your signature, you need to:

  • install licensed software;
  • install a licensed program, since the pirated version often freezes;
  • check your computer for viruses or available updates (if any, they must be eliminated).

Freezes can also be caused by:

  • incorrect paths to files, their inaccuracy;
  • if the certificate is suspended by the company or has finally expired.

If none of the proposed reasons are suitable, then contact technical support, where they will definitely help you and fix the problem.

Video - Installing an EDS (digital signature) in CryptoPro CSP

How to install CryptoPro on a computer, installing CryptoPro 4.0

CryptoPro CSP is a crypto provider and provides the legal significance of electronic documentation and connection protection. This is a key product among CryptoPro products. How CryptoPro CSP install most questions arise. We suggest that you familiarize yourself with the information below to install the program correctly. To install this software on a computer, the user must have administrator rights. The software on the disk must be inserted into the drive or selected the distribution folder on the computer. After launching the Installation Wizard, you must select the language to use. During installation, it is also possible to select the protection level (class).

Further installation is carried out in accordance with the choice of actions specified by the Installation Wizard. Thus, you may need to specify a serial key, configure additional sensors, and adjust CIPF to use the key storage service. Installation can be complete or selective, depending on the user’s tasks. Custom installation will help you install additional required components. It is advisable to restart the computer after installation for the program to work correctly.