Software "CryptoPro CSP" is designed to control the integrity of system and application software, manage key elements of the system in accordance with the regulation of protection tools, authorize and ensure the legal significance of electronic documents when exchanging them between users. CryptoPro CSP, in addition to the crypto provider itself, includes CryptoPro TLS, CryptoPro EAP-TLS, CryptoPro Winlogon and CryptoPro Revocation Provider products.
The solution is intended for:
Implemented Algorithms
When generating private and public keys, it is possible to generate them with different parameters in accordance with GOST R 34.10-2001 / GOST R 34.10-2012.
When generating a hash function value and encryption, it is possible to use various replacement nodes in accordance with GOST R 34.11-94 and GOST 28147-89.
Supported key media types
CSP 3.6 | CSP 3.9 | CSP 4.0 | CSP 5.0 | |
---|---|---|---|---|
Windows Server 2016 | x64* | x64** | x64 | |
Windows 10 | x86 / x64* | x86 / x64** | x86/x64 | |
Windows Server 2012 R2 | x64 | x64 | x64 | |
Windows 8.1 | x86/x64 | x86/x64 | x86/x64 | |
Windows Server 2012 | x64 | x64 | x64 | x64 |
Windows 8 | x86/x64 | x86/x64 | x86/x64 | |
Windows Server 2008 R2 | x64/itanium | x64 | x64 | x64 |
Windows 7 | x86/x64 | x86/x64 | x86/x64 | x86/x64 |
Windows Server 2008 | x86 / x64 / itanium | x86/x64 | x86/x64 | x86/x64 |
Windows Vista | x86/x64 | x86/x64 | ||
Windows Server 2003 R2 | x86 / x64 / itanium | x86/x64 | x86/x64 | x86/x64 |
Windows Server 2003 | x86 / x64 / itanium | x86/x64 | x86/x64 | x86/x64 |
Windows XP | x86/x64 | |||
Windows 2000 | x86 |
CryptoPro CSP is intended for:
authorization and ensuring the legal significance of electronic documents when they are exchanged between users, through the use of procedures for generating and verifying an electronic signature (ES) in accordance with domestic standards GOST R 34.10-2001 / GOST R 34.10-2012 (using GOST R 34.11-94 / GOST R 34.11-2012);
ensuring confidentiality and control of the integrity of information through its encryption and imitation protection, in accordance with GOST 28147-89;
ensuring the authenticity, confidentiality and imitation protection of connections via the TLS protocol;
monitoring the integrity of system and application software to protect it from unauthorized changes and malfunctions;
management of key elements of the system in accordance with the regulation of protective equipment.
The hash function generation algorithm is implemented in accordance with the requirements of GOST R 34.11-94 / GOST R 34.11-2012 "Information technology. Cryptographic information protection. Hashing function".
Algorithms for generating and verifying an electronic signature are implemented in accordance with the requirements of GOST R 34.10-2001 / GOST R 34.10-2012 "Information technology. Cryptographic information protection. Processes for generating and verifying an electronic digital signature".
The data encryption/decryption algorithm and the calculation of the imitation insert are implemented in accordance with the requirements of GOST 28147-89 "Information processing systems. Cryptographic protection".
When generating private and public keys, it is possible to generate them with different parameters in accordance with GOST R 34.10-2001 / GOST R 34.10-2012.
When generating a hash function value and encryption, it is possible to use various replacement nodes in accordance with GOST R 34.11-94 and GOST 28147-89.
Classification of operating systems for the use of CryptoPro CSP with a license for workplace and server.
floppy disks 3.5";
smart cards using smart card readers supporting PC/SC protocol;
Touch-Memory tablets DS1993 - DS1996 using Accord 4+ devices, Sobol electronic lock, KRYPTON-LOCK APMDS or Touch-Memory DALLAS tablet reader (Windows version only);
electronic keys with USB interface (USB tokens);
removable media with USB interface;
Windows registry;
Solaris/Linux/FreeBSD OS files.
Certificates of conformity for CIPF "CryptoPro CSP"
CryptoPro CSP is intended for:CryptoPro CSP can be used in conjunction with many key media, but the Windows registry, flash drives, and tokens are most commonly used as key media.
The safest and most convenient key bearers that are used in conjunction with CryptoPro CSP, are tokens. They allow you to conveniently and securely store your digital signature certificates. Tokens are designed in such a way that even in case of theft, no one will be able to use your certificate.
CryptoPro CSP works correctly with all certificates issued in accordance with the requirements of GOST, and therefore with most certificates issued by Certification Centers in Russia.
In order to start using CryptoPro CSP, you will definitely need a digital signature certificate. If you have not yet purchased a digital signature certificate, we recommend that you buy a digital signature on this page.
CSP 3.6 | CSP 3.9 | CSP 4.0 | |
---|---|---|---|
Windows 2012 R2 | x64 | x64 | |
Windows 8.1 | x86/x64 | x86/x64 | |
Windows 2012 | x64 | x64 | x64 |
Windows 8 | x86/x64 | x86/x64 | x86/x64 |
Windows 2008 R2 | x64/itanium | x64 | x64 |
Windows 7 | x86/x64 | x86/x64 | x86/x64 |
Windows 2008 | x86 / x64 / itanium | x86/x64 | x86/x64 |
Windows Vista | x86/x64 | x86/x64 | x86/x64 |
Windows 2003 R2 | x86 / x64 / itanium | x86/x64 | x86/x64 |
Windows XP | x86/x64 | ||
Windows 2003 | x86 / x64 / itanium | x86/x64 | x86/x64 |
Windows 2000 | x86 |
CSP 3.6 | CSP 3.9 | CSP 4.0 | |
---|---|---|---|
GOST R 34.10-2012 Creating a signature | 512 / 1024 bit | ||
GOST R 34.10-2012 Signature verification | 512 / 1024 bit | ||
GOST R 34.10-2001 Creating a signature | 512 bit | 512 bit | 512 bit |
GOST R 34.10-2001 Signature verification | 512 bit | 512 bit | 512 bit |
GOST R 34.10-94 Creating a signature | 1024 bits* | ||
GOST R 34.10-94 Signature verification | 1024 bits* | ||
GOST R 34.11-2012 | 256 / 512 bit | ||
GOST R 34.11-94 | 256 bit | 256 bit | 256 bit |
GOST 28147-89 | 256 bit | 256 bit | 256 bit |
* - up to CryptoPro CSP 3.6 R2 (build 3.6.6497 dated 2010-08-13) inclusive.
When buying CryptoPro CSP, you get a serial number that you need to enter during the installation or program setup process. The key validity period depends on the selected license. CryptoPro CSP can be distributed in two versions: with an annual license or perpetual.
Having bought perpetual license, you will receive a CryptoPro CSP key, the validity of which will not be limited. If you buy an annual license, you will receive a serial number CryptoPro CSP, which will be valid for a year after purchase.
CryptoPro CSP has a certificate of compliance of the Federal Security Service of the Russian Federation
"Trinity"– full cycle system integrator. Construction of IT infrastructure, disaster-proof solutions, virtualization systems, production of servers and storage systems.
You need to buy a ready-made server with suitable parameters, but you don't know which one to choose? You are stunned by the variety of server platforms on modern market? Trinity specialists offer you a huge selection of modern servers and server platforms for affordable prices. We do not just carry out the sale of equipment - it is in our interests to choose the best option for the client, taking into account all his requirements and wishes.
The Trinity company sells high-performance data storage systems and network equipment at affordable prices. Here you can buy a server platform or a server, both new and refurbished from well-known world manufacturers of server technology, having previously studied the required capacities and characteristics. Also, our company employs qualified specialists who will be happy to help you choose the right model and select the optimal server configuration, taking into account all the requirements and wishes. Just contact us at the given number and we will answer all your questions.