How to download the program cryptopro csp 3.6. Purpose of CryptoPro CSP. Key Media Drivers for Microsoft Windows

02.08.2021 Products

This section contains all the main distributions of programs and drivers. Which will be needed by the clients of the certification center "ITICOM" in Simferopol (Crimea) for the use of an electronic signature in their activities.

For example, to work on electronic trading platforms, participate in public procurement tenders in the Crimea, you need to install a number of programs. Such as the: , CryptoPro CSP Browser plug-in, Key carrier driver (Rutoken, eToken, etc.). For declaring in electronic form in Rosalkogolregulirovanie, in addition to the above, you need to set Declarant-ALCO and

Before downloading the distribution, please determine the version and bitness of your operating system.

Remote setup (programs for remote access to a PC)

teamviewer download
Ammyy Admin (http://www.ammyy.com/ru) download (requires registration on the site - specify E-mail)
Aeroadmin (https://www.aeroadmin.com/ru) download

General purpose software

()
Windows XP Windows 7 Windows 8, 8.1 Windows 10
CryptoPro CSP 4 Download
"CryptoPro Office Signature" - distribution kit version 1.0.0810 from 04/09/2013 Download
CryptoARM 5 Download
CryptoARM - User Guide (installation, configuration, use, description of program features) Download

Key Media Drivers for Microsoft Windows

(ATTENTION!!! All distributions are checked by anti-virus software. To download use Internet Explorer )
x32 x64
eToken PKI Client 5.1 SP1 (Documentation ; Rules for the operation of eToken electronic keys and smart cards) Download Download
Rutoken (Manual) Download Download
JaCarta LT USB Token (Download JaCarta Unified Client and JaCarta SecurLogon) Download JC-PROClient-1.5.0.199_x32 Download JC-PROClient-1.5.0.199_x64
MS Key Download Download
ESMART Token Download ESMART PKI Client Download CryptoPro ESMART Token (for CryptoPro CSP below 3.6 R3)

Download the program "Electronic reporting SBS++"

(ATTENTION!!! All distributions are checked by anti-virus software. Use Internet Explorer to download)
Version 2.4 (Standard installation) Version 2.4 (Update)
Electoral reporting and document flow Download

To protect the transmitted data on the Information Portal croinform.ru, a cryptographic information protection tool (CIPF) of the Crypto-Pro company is used. To install this software, follow a few simple steps.

Step 1. Downloading the CryptoPro CSP distribution (version 4.0)

To download the distribution kit, go to the CRYPTO-PRO website http://www.cryptopro.ru/

In the Login form, enter the following username: MBKI , password: MBKI and click Login


The Download Center page opens. In the list of programs, select CryptoPro CSP (First in the list).

Choose distribution kit CryptoPro CSP (version 4.0), which is suitable for your operating system. Save the file to disk.

Step 2. Installing CryptoPro CSP (version 4.0)

Run the distribution kit of the CryptoPro CSP program downloaded at step 1. The "Installation window" will appear on the screen. Select the recommended installation option, "Install (recommended)".


A window will appear showing the CryptoPro CSP installation process.


After the CryptoPro CSP installation process is completed, you will receive a message.


The temporary license is valid for 30 days. After this period, the full package of CIPF functions ceases to work, however, some of the information protection functions necessary for working with the Information Portal remain.

After purchasing a license from our online store, you will receive an email containing:

  • product license key
  • link to product distribution
  • link to user manual
Since no one likes to read the user manual anyway (and you would not be reading this article if you read the manual), we only need product license key and link to distribution.

Step 1

First you need to find out if you have installed Cryptopro CSP earlier and if installed, what version?

This can be done by carefully examining your Start menu: there should be an item CRYPTO-PRO, which has a program CryptoPro CSP.

If you didn’t find it, most likely you don’t have CryptoPRO installed, so feel free to go to.

If found - run CryptoPro CSP. There we see the General tab, where the license validity period and version number are indicated.

If the version number corresponds to the version you purchased (for example, if the window says 4.0.****, and you bought CryptoPro CSP 4.0, then it matches), then you you can not reinstall the program, but simply enter the license key. How to do it - look at .

Step 2

You found out that the program is not installed for you. So, you need to download CryptoPro CSP and install it.

Downloading it is not so easy: a cryptographic provider is a means of cryptographic protection of information, which means that its distribution is subject to registration with the relevant authorities. Therefore, you will need to follow the link that came to you in the letter or go to the CryptoPro website on your own at the link http://www.cryptopro.ru/downloads and select from the list of products CryptoPro CSP.

You will see something like this:


Click on the link " Pre-registration"and fill out a form from a variety of fields. After filling out the form and registering, you will be required to agree to the license agreement, and then still get the opportunity to download the distribution package of the program.

At the time of publication, the distribution selection page looks like this:


If you have purchased the version CryptoPro CSP 3.6, then you will need to select the version R4 It is by far the most functional.

If you have purchased a license for CryptoPro CSP 3.9 be careful: CryptoPro CSP 3.9 - certified version, but does not support Windows 10, CryptoPro CSP 3.9R2- supports Windows 10, certification planned for Q4 2015

If you bought version 4.0, then select the CryptoPro CSP 4.0 item accordingly (recommended for working with Windows 10, certification is planned for the III quarter of 2015).

You will need to download this file:

Step 3

You have downloaded the installation file CryptoPro CSP, and now you will need to install the program itself. To do this, run the installation file, if we see a security warning, you need to allow the program to make changes on your computer. In the opened press the button Install (recommended)

The installation of the program takes place automatically within a few minutes and does not require user intervention.


Everything, Installation completed.

Step 4

Now you need to enter the license key in a special window. You can get to it this way (the path may vary slightly depending on the version of the operating system):

Start - Programs - CryptoPro - CryptoPro CSP.

Then we press the button Entering a license


In the window that opens, fill in the fields in accordance with the license received.


Step 5

We rejoice! We have just installed a crypto provider. Not so difficult, right?

But you need to understand that CryptoPro CSP itself cannot do anything. The next step you will need to install (or just configure) programs that will interact with CryptoPro CSP and solve your problems, whether it is an electronic signature, encryption or something else.

Usually, or is used to implement an electronic signature - they can be purchased from our online store. We tried to make the purchase as convenient as possible: electronic licenses are sent immediately after payment (even at night), a large selection of payment methods.

If the instruction seemed useful to you - share it, you will find the buttons for this right below the article.

V the following instructions i will tell you how to install CryptoPro Office Signature , CryptoARM how to work with tokens and so on.

If you don't want to miss our articles - subscribe to us at in social networks! Links to our social media pages can be found at the very bottom of the screen.

CSP CryptoPro is a reliable commercial software tool designed to add and verify cryptographic protection on sensitive documents and other files that require an electronic digital signature (EDS). The program is designed primarily for companies that have switched to electronic document management. Thanks to it, it is possible to ensure the legal force of individual securities presented exclusively in digital form. In fact, a digital signature is a kind of analogue of a wet seal for physical documents.

This solution complies with all current GOSTs that regulate information control and data integrity during transmission. To manage the security algorithms used in CSP CryptoPro, a special manager is provided, which is also responsible for setting other parameters of the program. In addition to it, the cryptoprovider kit includes tools that are responsible for "issuing" and verifying certificates. It also includes the CryptoPro Winlogon module. Its main task is to perform the initial authentication of new users in the Windows environment. The operation of this component is based on the Kerberos V5 protocol, and authorization occurs after verifying the certificate of a USB token, smart card, or any other key medium used in the enterprise. In general, a cryproprovider allows you to use the most different types key carriers. For companies using relatively old computer equipment, even the possibility of using floppy disks in 3.5 format is provided.

Based on the fact that we have an exclusively commercial software solution, it is easy to guess that it is paid. Although the developer of CryptoPro kindly provides a demo version of his tool, which can only be used for the first thirty days. After this period, you will need to purchase a license.

Key features

  • contains tools for adding and verifying an electronic digital signature (EDS);
  • knows how to add and verify issued digital certificates;
  • gives legal weight to electronic copies of documents;
  • can perform authentication after checking the certificate on the key carrier;
  • provides control of the integrity of the transmitted information;
  • the algorithm used to generate hash sums and other algorithms used by the program fully comply with these GOSTs.

CryptoPro CSP 5.0 is a new generation of cryptographic provider that develops three main product lines of CryptoPro company: CryptoPro CSP (classic tokens and other passive storage of secret keys), CryptoPro FKN CSP / Rutoken CSP (non-retrievable keys on tokens with secure messaging) and CryptoPro DSS (keys in the cloud).

All the advantages of the products of these lines are not only preserved, but also multiplied in CryptoPro CSP 5.0: the list of supported platforms and algorithms is wider, the performance is higher, and the user interface is more convenient. But the main thing is that work with all key carriers, including keys in the cloud, is now uniform. To transfer the application system in which CryptoPro CSP of any version worked to support keys in the cloud or to new media with non-retrievable keys, no software rework is required - the access interface remains the same, and work with the key in the cloud will occur exactly the same in the same way as with the classic key carrier.

Purpose of CryptoPro CSP

  • Formation and verification of electronic signature.
  • Ensuring confidentiality and integrity control of information through its encryption and imitation protection.
  • Ensuring the authenticity, confidentiality and imitation protection of connections using the , and protocols.
  • Monitoring the integrity of system and application software to protect it from unauthorized changes and violations of trusted functioning.

Supported Algorithms

In CryptoPro CSP 5.0, along with Russian ones, foreign cryptographic algorithms are implemented. Users can now use familiar key carriers to store RSA and ECDSA private keys.

Supported key storage technologies

Cloud Token

In CryptoPro CSP 5.0, for the first time, it became possible to use keys stored on the CryptoPro DSS cloud service through the CryptoAPI interface. Now the keys stored in the cloud can be easily used by any user application, as well as by most Microsoft applications.

Media with non-removable keys and secure messaging

CryptoPro CSP 5.0 adds support for media with non-recoverable keys that implement the protocol SESPAKE, which allows you to perform authentication without passing the user's password in clear form, and establish an encrypted channel for exchanging messages between the crypto provider and the carrier. An attacker in the channel between the carrier and the user's application can neither steal the password during authentication nor change the data being signed. When using such media, the problem of safe work with non-removable keys is completely solved.

Active, InfoCrypt, SmartPark and Gemalto companies have developed new secure tokens that support this protocol (SmartPark and Gemalto starting from version 5.0 R2).

Media with non-removable keys

Many users want to be able to work with non-retrievable keys, but not upgrade tokens to the FKN level. Especially for them, the provider has added support for popular key carriers Rutoken EDS 2.0, JaCarta-2 GOST and InfoCrypt VPN-Key-TLS.

List of manufacturers and models supported by CryptoPro CSP 5.0

List of manufacturers and models of media with non-recoverable keys supported by CryptoPro CSP 5.0
Company Carrier
ISBC Esmart Token GOST
Assets Rutoken 2151
Rutoken 2151 SC
Rutoken Bluetooth
Rutoken PinPad
Rutoken 2151
Rutoken EDS
Rutoken EDS SC
Rutoken EDS 2.0
Rutoken EDS 2.0 SC
Rutoken EDS Flash
Aladdin R.D. JaCarta-2 GOST
infocrypt InfoCrypt Token++ TLS
InfoCrypt VPN-Key-TLS

Classic passive USB tokens and smart cards

Most users prefer fast, cheap and convenient key storage solutions. As a rule, preference is given to tokens and smart cards without cryptographic coprocessors. As in previous versions of the provider, CryptoPro CSP 5.0 retains support for all compatible media produced by Active, Aladdin R.D., Gemalto / SafeNet, Multisoft, NovaCard, Rosan, Alioth, MorphoKST and SmartPark.

In addition, of course, as before, ways to store keys in the Windows registry, on a hard drive, on flash drives on all platforms are supported.

List of manufacturers and models supported by CryptoPro CSP 5.0

List of manufacturers and models of classic passive USB tokens and smart cards supported by CryptoPro CSP 5.0
Company Carrier
Alioth SCOne Series (v5/v6)
gemalto Optelio Contactless Dxx Rx
Optelio Dxx FXR3 Java
Optelio G257
Optelio MPH150
ISBC Esmart Token
Esmart Token GOST
MorphoKST MorphoKST
NovaCard Cosmo
Rosan G&D element V14 / V15
G&D 3.45 / 4.42 / 4.44 / 4.45 / 4.65 / 4.80
Kona 2200s / 251 / 151s / 261 / 2320
Kona2 S2120s / C2304 / D1080
safenet eToken Java Pro JC
eToken 4100
eToken 5100
eToken 5110
eToken 5105
eToken 5205
Assets Rutoken 2151
Rutoken 2151 SC
Rutoken Bluetooth
Rutoken S
Rutoken KP
Rutoken Light
Rutoken Light SC
Rutoken EDS 2.0 3000
Rutoken EDS
Rutoken EDS SC
Rutoken EDS 2.0
Rutoken EDS 2.0 SC
Rutoken EDS Flash
Aladdin R.D. JaCarta GOST
JaCarta PKI
JaCarta PRO
JaCartaLT
JaCarta-2 GOST
infocrypt InfoCrypt Token++ Lite
Multisoft MS_Key version 8 Angara
MS_Key ESMART version 5
SmartPark master's
R301 Foros
Oscar
Oscar 2
Rutoken Master

CryptoPro Tools

As part of CryptoPro CSP 5.0, a cross-platform (Windows / Linux / macOS) graphical application appeared - "CryptoPro Tools" ("CryptoPro Tools").

The main idea is to enable users to conveniently solve typical tasks. All the main functions are available in a simple interface - at the same time, we have also implemented a mode for advanced users, which opens up additional opportunities.

With the help of CryptoPro Tools, the tasks of managing containers, smart cards and cryptographic providers settings are solved, and we have also added the ability to create and verify a PKCS # 7 electronic signature.

Supported Software

CryptoPro CSP allows you to quickly and securely use Russian cryptographic algorithms in the following standard applications:

  • office suite Microsoft office;
  • mail server Microsoft Exchange and client Microsoft Outlook;
  • products Adobe Systems Inc.;
  • browsers Yandex.Browser, Sputnik, Internet Explorer,edge;
  • tool for generating and verifying application signatures Microsoft Authenticode;
  • web servers Microsoft IIS, nginx, Apache;
  • remote desktop tools Microsoft Remote Desktop Services;
  • Microsoft Active Directory.

Integration with the CryptoPro platform

From the very first release, support and compatibility with all our products is provided:

  • CryptoPro CA;
  • CA services;
  • CryptoPro EDS;
  • CryptoPro IPsec;
  • CryptoPro EFS;
  • CryptoPro.NET;
  • CryptoPro Java CSP.
  • CryptoPro NGate

Operating systems and hardware platforms

Traditionally, we work in unsurpassed a wide range systems:

  • Microsoft Windows;
  • MacOS;
  • Linux;
  • FreeBSD;
  • solaris;
  • android;
  • SailfishOS.

hardware platforms:

  • Intel/AMD;
  • PowerPC;
  • MIPS (Baikal);
  • VLIW (Elbrus);
  • Sparc.

and virtual environments:

  • Microsoft Hyper-V
  • VMWare
  • Oracle Virtual Box
  • RHEV.

Supported by different versions of CryptoPro CSP.

To use CryptoPro CSP with a license for workplace and server.

Embedding Interfaces

For embedding in applications on all platforms, CryptoPro CSP is available through standard interfaces for cryptographic tools:

  • Microsoft Crypto API
  • PKCS#11;
  • OpenSSL engine;
  • Java CSP (Java Cryptography Architecture)
  • Qt SSL.

Performance for every taste

Years of development experience allows us to cover everything from miniature ARM boards such as Raspberry PI to multi-processor servers based on Intel Xeon, AMD EPYC and PowerPC, with excellent performance scaling.

Regulatory documents

Full list of regulatory documents

  • The crypto provider uses the algorithms, protocols and parameters defined in the following documents Russian system standardization:
  • R 50.1.113–2016 “Information technology. Cryptographic protection of information. Cryptographic Algorithms Accompanying the Application of Electronic Digital Signature Algorithms and Hashing Functions" (also see RFC 7836 "Guidelines on the Cryptographic Algorithms to Accompany the Usage of Standards GOST R 34.10-2012 and GOST R 34.11-2012")
  • R 50.1.114–2016 “Information technology. Cryptographic protection of information. Elliptic Curve Parameters for Cryptographic Algorithms and Protocols" (also see RFC 7836 "Guidelines on the Cryptographic Algorithms to Accompany the Usage of Standards GOST R 34.10-2012 and GOST R 34.11-2012")
  • R 50.1.111–2016 “Information technology. Cryptographic protection of information. Password protection of key information»
  • R 50.1.115–2016 “Information technology. Cryptographic protection of information. Shared Key Derivation Protocol with Password-Based Authentication" (also see RFC 8133 The Security Evaluated Standardized Password-Authenticated Key Exchange (SESPAKE) Protocol")
  • Guidelines TC 26 "Cryptographic information protection" "Using sets of encryption algorithms based on GOST 28147-89 for the transport layer security protocol (TLS)"
  • Guidelines TC 26 "Cryptographic information protection" "Use of algorithms GOST 28147-89, GOST R 34.11 and GOST R 34.10 in cryptographic messages of the CMS format"
  • Technical specification TC 26 "Cryptographic information protection" "Use of GOST 28147-89, GOST R 34.11-2012 and GOST R 34.10-2012 in the IKE and ISAKMP key exchange protocols"
  • Technical specification TC 26 "Cryptographic information protection" "Use of GOST 28147-89 when encrypting attachments in IPsec ESP protocols"
  • Technical specification TK 26 "Cryptographic information protection" "Use of algorithms GOST R 34.10, GOST R 34.11 in the certificate profile and certificate revocation list (CRL) of X.509 public key infrastructure"
  • Technical specification TC 26 "Cryptographic information protection" "PKCS # 11 extension for the use of Russian standards GOST R 34.10-2012 and GOST R 34.11-2012"