Cryptopro csp 4.0 unlimited torrent. Purpose of CryptoPro CSP

CSP CryptoPro is a program for adding and checking digital files. It adds and protects cryptographic files (electronic documents) that contain a digital signature. CryptoPro has "Winlogon" for very important documents and third-party files that support a digital certificate.

CSP CryptoPro is used in companies where there are documents in in electronic format. The program provides protection and legal force for valuable documents and securities in digital form. Digitally signed data has the power of official documents.

CSP CryptoPro allows you to create digital security and sign (certificate) for any document. This program is suitable for organizations with valid GOST standards. It controls the data and structure of information. Security program algorithms are managed through a special manager.

You can configure the CryptoPro CSP and specify the level of protection and confidentiality of documents. After setup, some documents will be strictly confidential. The program is equipped with tools that issue and verify security certificates. Using the CryptoPro Winlogon module, you can register new users in the Windows operating system.

CryptoPro Winlogon works with support for the Kerberos V5 protocol. Login and access to data is carried out after a complete verification of the certificate of the storage medium located in the organization.

The crypto provider provides protection for various sources of digital data. Older organizations and companies use hardware to support floppy disks. CryptoPro was created on a commercial basis with a paid license. Once you install the program, you use it for 30 days, that is trial period. After this you will have to buy a license.

Key Features

  • Digital certificate protection through verification tools;
  • full verification of digital documents and the relevance of the certificate;
  • electronic registration of documents on a legal basis;
  • accessing and verifying the certificate on the main media;
  • full control and verification of data after information transfer;
  • comparison of document size and other algorithms for work;
  • the program supports documents that are created in accordance with these GOSTs;
  • complete protection of digital documents and customization of the degree of protection;

To protect transmitted data, the Information Portal croinform .ru uses a cryptographic information protection tool (CIPF) from the Crypto-Pro company. To install this software, follow a few simple steps.

Step 1. Download the CryptoPro CSP distribution kit (version 4.0)

To download the distribution, go to the CRYPTO-PRO website http://www.cryptopro.ru/

In the “Login” form, enter the following username information: MBKI , password: MBKI and click Login


The Download Center page opens. In the list of programs, select CryptoPro CSP(First on the list).

Select CryptoPro CSP distribution (version 4.0) which suits your operating system. Save the file to disk.

Step 2. Installation of CryptoPro CSP (version 4.0)

Launch the distribution package of the CryptoPro CSP program downloaded in step 1. The “Installation Window” will appear on the screen. Select the recommended installation option, "Install (Recommended)."


A window will appear displaying the installation process of CryptoPro CSP.


After completing the installation process of CryptoPro CSP, you will receive a message.


A temporary license is valid for 30 days. After this period full package CIPF functions stop working, but some of the information protection functions necessary for working with the Information Portal remain.

CryptoPro CSP 5.0 is a new generation of crypto provider, developing three main product lines of the CryptoPro company: CryptoPro CSP (classic tokens and other passive storage of secret keys), CryptoPro FKN CSP/Rutoken CSP (unretrievable keys on tokens with secure messaging) and CryptoPro DSS (keys in the cloud).

All the advantages of products from these lines are not only preserved, but also multiplied in CryptoPro CSP 5.0: the list of supported platforms and algorithms is wider, performance is higher, and the user interface is more convenient. But the main thing is that working with all key media, including keys in the cloud, is now uniform. To transfer the application system in which CryptoPro CSP of any version worked to support keys in the cloud or to new media with non-removable keys, no software reworking will be required - the access interface remains the same, and work with the key in the cloud will occur exactly the same in the same way as with the classic key carrier.

Purpose of CryptoPro CSP

  • Formation and verification electronic signature.
  • Ensuring confidentiality and monitoring the integrity of information through its encryption and imitation protection.
  • Ensuring authenticity, confidentiality and imitational protection of connections using the and protocols.
  • Monitoring the integrity of system and application software to protect it from unauthorized changes and violations of trusted functioning.

Supported Algorithms

In CryptoPro CSP 5.0, along with Russian ones, foreign cryptographic algorithms are implemented. Now users have the opportunity to use familiar key media to store RSA and ECDSA private keys.

Supported key storage technologies

Cloud token

In the cryptoprovider CryptoPro CSP 5.0, for the first time, it became possible to use keys stored on cloud service CryptoPro DSS, via the CryptoAPI interface. Now keys stored in the cloud can be easily used by any user applications, as well as most Microsoft applications.

Media with non-retrievable keys and secure messaging

CryptoPro CSP 5.0 adds support for media with non-retrievable keys that implement the protocol SESPAKE, allowing authentication without transmitting the user’s password in clear text, and establishing an encrypted channel for the exchange of messages between the crypto provider and the carrier. An attacker located in the channel between the medium and the user's application can neither steal the authentication password nor replace the signed data. When using such media, the problem is completely solved safe work with non-removable keys.

The companies Active, InfoCrypt, SmartPark and Gemalto have developed new secure tokens that support this protocol (SmartPark and Gemalto starting from version 5.0 R2).

Media with non-removable keys

Many users want to be able to work with non-retrievable keys, but not upgrade tokens to the FKN level. Especially for them, the provider has added support for popular key media Rutoken EDS 2.0, JaCarta-2 GOST and InfoCrypt VPN-Key-TLS.

List of manufacturers and models supported by CryptoPro CSP 5.0

List of manufacturers and models of media with non-retrievable keys supported by CryptoPro CSP 5.0
Company Carrier
ISBC Esmart Token GOST
Assets Rutoken 2151
Rutoken PINPad
Rutoken EDS
Rutoken EDS 2.0
Rutoken EDS 2.0 2100
Rutoken EDS 2.0 3000
Rutoken EDS PKI
Rutoken EDS 2.0 Flash
Rutoken EDS 2.0 Bluetooth
Rutoken EDS 2.0 Touch
Smart card Rutoken 2151
Smart card Rutoken EDS 2.0 2100
Aladdin R.D. JaCarta-2 GOST
Infocrypt InfoCrypt Token++ TLS
InfoCrypt VPN-Key-TLS

Classic passive USB tokens and smart cards

Most users prefer fast, cheap and convenient key storage solutions. As a rule, preference is given to tokens and smart cards without cryptographic coprocessors. As in previous versions provider, CryptoPro CSP 5.0 retains support for all compatible media produced by the companies Active, Aladdin R.D., Gemalto/SafeNet, Multisoft, NovaCard, Rosan, Alioth, MorphoKST and SmartPark.

In addition, of course, as before, methods for storing keys in the Windows registry, on a hard drive, on flash drives on all platforms are supported.

List of manufacturers and models supported by CryptoPro CSP 5.0

List of manufacturers and models of classic passive USB tokens and smart cards supported by CryptoPro CSP 5.0
Company Carrier
Alioth SCOne Series (v5/v6)
Gemalto Optelio Contactless Dxx Rx
Optelio Dxx FXR3 Java
Optelio G257
Optelio MPH150
ISBC Esmart Token
Esmart Token GOST
MorphoKST MorphoKST
NovaCard Cosmo
Rosan G&D element V14 / V15
G&D 3.45 / 4.42 / 4.44 / 4.45 / 4.65 / 4.80
Kona 2200s / 251 / 151s / 261 / 2320
Kona2 S2120s/C2304/D1080
SafeNet eToken Java Pro JC
eToken 4100
eToken 5100
eToken 5110
eToken 5105
eToken 5205
Assets Rutoken 2151
Rutoken S
Rutoken KP
Rutoken Lite
Rutoken EDS
Rutoken EDS 2.0
Rutoken EDS 2.0 3000
Rutoken EDS Bluetooth
Rutoken EDS Flash
Smart card Rutoken 2151
Smart card Rutoken Lite
Smart card Rutoken EDS SC
Smart card Rutoken EDS 2.0
Aladdin R.D. JaCarta GOST
JaCarta PKI
JaCarta PRO
JaCarta LT
JaCarta-2 GOST
Infocrypt InfoCrypt Token++ lite
Multisoft MS_Key isp.8 Hangar
MS_Key ESMART use.5
SmartPark Master's degree
R301 Foros
Oscar
Oscar 2
Magister's Rutoken

CryptoPro Tools

As part of CryptoPro CSP 5.0, a cross-platform (Windows/Linux/macOS) graphical application appeared - “CryptoPro Tools”.

The main idea is to provide users with the opportunity to conveniently solve common problems. All main functions are available in simple interface- at the same time, we also implemented a mode for experienced users, which opens up additional possibilities.

Using CryptoPro Tools, the tasks of managing containers, smart cards and crypto provider settings are solved, and we have also added the ability to create and verify a PKCS#7 electronic signature.

Supported Software

CryptoPro CSP allows you to quickly and securely use Russian cryptographic algorithms in the following standard applications:

  • office suite Microsoft Office;
  • mail server Microsoft Exchange and client Microsoft Outlook;
  • products Adobe Systems Inc.;
  • browsers Yandex.Browser, Sputnik, Internet Explorer ,Edge;
  • application signature generation and verification tool Microsoft Authenticode;
  • web servers Microsoft IIS, nginx, Apache;
  • Remote Desktop Tools Microsoft Remote Desktop Services;
  • Microsoft Active Directory.

Integration with the CryptoPro platform

From the very first release, support and compatibility with all our products are provided:

  • CryptoPro CA;
  • CA Services;
  • CryptoPro EDS;
  • CryptoPro IPsec;
  • CryptoPro EFS;
  • CryptoPro.NET;
  • CryptoPro Java CSP.
  • CryptoPro NGate

Operating systems and hardware platforms

Traditionally, we work in an unrivaled wide range of systems:

  • Microsoft Windows;
  • Mac OS;
  • Linux;
  • FreeBSD;
  • Solaris;
  • Android;
  • Sailfish OS.

hardware platforms:

  • Intel/AMD;
  • PowerPC;
  • MIPS (Baikal);
  • VLIW (Elbrus);
  • Sparc.

and virtual environments:

  • Microsoft Hyper-V
  • VMWare
  • Oracle Virtual Box
  • RHEV.

Supported different versions CryptoPro CSP.

To use CryptoPro CSP with a license for workplace and server.

Interfaces for embedding

For integration into applications on all platforms, CryptoPro CSP is available through standard interfaces for cryptographic tools:

  • Microsoft CryptoAPI;
  • PKCS#11;
  • OpenSSL engine;
  • Java CSP (Java Cryptography Architecture)
  • Qt SSL.

Performance for every taste

Years of development experience allows us to cover all solutions from miniature ARM boards such as Raspberry PI to multiprocessor servers based on Intel Xeon, AMD EPYC and PowerPC, with excellent performance scaling.

Regulatory documents

Complete list of regulatory documents

  • The crypto provider uses algorithms, protocols and parameters defined in the following documents of the Russian standardization system:
  • R 50.1.113–2016 " Information technology. Cryptographic information protection. Cryptographic algorithms accompanying the use of electronic digital signature algorithms and hashing functions" (also see RFC 7836 "Guidelines on the Cryptographic Algorithms to Accompany the Usage of Standards GOST R 34.10-2012 and GOST R 34.11-2012")
  • R 50.1.114–2016 “Information technology. Cryptographic information protection. Elliptic curve parameters for cryptographic algorithms and protocols" (also see RFC 7836 "Guidelines on the Cryptographic Algorithms to Accompany the Usage of Standards GOST R 34.10-2012 and GOST R 34.11-2012")
  • R 50.1.111–2016 “Information technology. Cryptographic information protection. Password protection of key information"
  • R 50.1.115–2016 “Information technology. Cryptographic information protection. "Shared Key Generation Protocol with Password Authentication" (also see RFC 8133 The Security Evaluated Standardized Password-Authenticated Key Exchange (SESPAKE) Protocol ")
  • Methodological recommendations TC 26 “Cryptographic information protection” “Use of sets of encryption algorithms based on GOST 28147-89 for the transport layer security protocol (TLS)”
  • Methodological recommendations TC 26 “Cryptographic information protection” “Use of GOST 28147-89, GOST R 34.11 and GOST R 34.10 algorithms in cryptographic messages in CMS format”
  • Technical specification TC 26 “Cryptographic information protection” “Use of GOST 28147-89, GOST R 34.11-2012 and GOST R 34.10-2012 in the IKE and ISAKMP key exchange protocols”
  • Technical specification TC 26 “Cryptographic information protection” “Use of GOST 28147-89 when encrypting attachments in IPsec ESP protocols”
  • Technical specification TC 26 “Cryptographic information protection” “Use of GOST R 34.10, GOST R 34.11 algorithms in the certificate profile and certificate revocation list (CRL) infrastructure public keys X.509"
  • Technical specification TC 26 “Cryptographic information protection” “Extension of PKCS#11 for the use of Russian standards GOST R 34.10-2012 and GOST R 34.11-2012”

Exchange of a full range of electronic commercial documents accompanying all stages of ordering and delivery of goods, directly from customer accounting systems.

Full control of the goods delivery process

Exchange of a full range of electronic documents in the Federal Tax Service format, accompanying all stages of delivery and return of goods, mutual settlements, directly from customer accounting systems.

Storage of electronic accounting documents.

The manufacturer posts data about its products and creates its own sales channel for each distributor, fills it with an assortment and sets prices, provides distributors with access to their personal account with personal product catalogs and price conditions.

Distributors generate orders and reports on sales and balances in relation to the agreed assortment.

Allows you to quickly and reliably synchronize information about products in all sales channels: with retail chains, distributors, online stores, and your own retail.

Processes and stores logistics parameters, pricing conditions, consumer properties, media data and permitting documents.

Instant registration of batches of manufactured products Generation and cancellation of veterinary certificates directly at the time of shipment and acceptance of goods in connection with shipping documents

Monitoring and adjustments of documents in real time

Supporting the process of financing monetary claims with the participation of the buyer of the claim (factoring company or bank), the supplier of the goods (creditor) and the buyer of the goods (debtor).

Transparent and secure automated three-way interaction between participants in a factoring transaction, assignment and confirmation of rights of monetary claim.

A complete set of electronic documents accompanying factoring operations in EDI and Federal Tax Service formats

Balance sheet and other financial indicators

Government contracts won and placed

Report to cover risks to the Federal Tax Service and the head

Affiliates, connections between companies and their owners

EXTRACT FROM THE USRLE/USRIP

Lawsuits, register of unscrupulous suppliers

Select and purchase tickets at the best prices, make hotel reservations, transfers, travel documents, generate accounting reports

Convenient travel management and control of travel expenses within the organization

Possibility of postpayment, all travel expenses are collected in one invoice

Procurement 44-FZ, 223-FZ

Commercial auctions, bankruptcy auctions

Registration of legal entities/individual entrepreneurs, cash desks

Submitting reports to government agencies, electronic document management

State portals and public services, federal customs service, EGAIS FSRAR

Doctor's electronic signature

A comprehensive solution for preparing for mandatory labeling of goods: issuing an electronic signature for registration in the Chestny ZNAK system, setting up an accounting system for working with goods, exchange electronic documents with the corresponding marking code.

Publications on the topic