Computers Windows Internet

Cryptopro csp version 3.6 1. The first open source software tracker. General purpose software

Crypto Provider CryptoPro CSP created for:
  • ensuring the legal significance of documents for electronic document management, by means of generating and checking the electronic signature, according to the Russian cryptographic standards GOST R 34.11-94 / GOST R 34.11-2012 and GOST R 34.10-2001 / GOST R 34.10-2012;
  • encryption and imitation protection in accordance with GOST 28147-89 will guarantee the confidentiality and integrity of information;
  • ensuring the authenticity, imitation protection and confidentiality of TLS connections;
  • protection against modification of software and violation of algorithms of its work;
  • management of key elements of the system, in accordance with the regulations of protective equipment.

Key carriers for CryptoPro CSP

CryptoPro CSP can be used in conjunction with a variety of key media, but most often the Windows registry, flash drives and tokens are used as key media.

The most secure and convenient key carriers that are used in conjunction with CryptoPro CSP are tokens. They allow you to conveniently and securely store your electronic signature certificates. Tokens are arranged in such a way that even if stolen, no one can use your certificate.

  • floppy disks 3.5 ";
  • MPCOS-EMV processor cards and Russian smart cards (Oscar, RIK) using smart card readers supporting the PC / SC protocol (GemPC Twin, Towitoko, Oberthur OCR126, etc.);
  • Touch-Memory tablets DS1993 - DS1996 using Accord 4+ devices, electronic lock"Sable" or tablet reader Touch-Memory DALLAS;
  • electronic keys with USB interface;
  • removable media with USB interface;
  • Windows registry

Digital Signature Certificate for CryptoPro CSP

CryptoPro CSP works correctly with all certificates issued in accordance with the requirements of GOST, which means with most of the certificates issued by Certification Centers in Russia.

In order to start using CryptoPro CSP, you will definitely need a certificate digital signature... If you have not yet purchased a digital signature certificate, we recommend that you buy an EDS on this page.

Supported Windows operating systems

CSP 3.6 CSP 3.9 CSP 4.0
Windows 2012 R2 x64 x64
Windows 8.1 x86 / x64 x86 / x64
Windows 2012 x64 x64 x64
Windows 8 x86 / x64 x86 / x64 x86 / x64
Windows 2008 R2 x64 / itanium x64 x64
Windows 7 x86 / x64 x86 / x64 x86 / x64
Windows 2008 x86 / x64 / itanium x86 / x64 x86 / x64
Windows Vista x86 / x64 x86 / x64 x86 / x64
Windows 2003 R2 x86 / x64 / itanium x86 / x64 x86 / x64
Windows XP x86 / x64
Windows 2003 x86 / x64 / itanium x86 / x64 x86 / x64
Windows 2000 x86

Supported algorithms

CSP 3.6 CSP 3.9 CSP 4.0
GOST R 34.10-2012 Signature creation 512/1024 bit
GOST R 34.10-2012 Signature verification 512/1024 bit
GOST R 34.10-2001 Signature creation 512 bit 512 bit 512 bit
GOST R 34.10-2001 Signature verification 512 bit 512 bit 512 bit
GOST R 34.10-94 Signature creation 1024 bit *
GOST R 34.10-94 Signature verification 1024 bit *
GOST R 34.11-2012 256/512 bit
GOST R 34.11-94 256 bit 256 bit 256 bit
GOST 28147-89 256 bit 256 bit 256 bit

* - up to CryptoPro CSP 3.6 R2 (build 3.6.6497 from 2010-08-13) inclusive.

CryptoPro CSP license terms

By buying CryptoPro CSP, you get serial number, which you need to enter during the installation or configuration of the program. The key validity period depends on the selected license. CryptoPro CSP can be distributed in two versions: with an annual license or perpetual.

By purchasing perpetual license, you will receive a CryptoPro CSP key, which will not expire. If you buy a one-year license, you will receive a serial number CryptoPro CSP, which will be valid for one year after purchase.

CryptoPro CSP is certified by the Federal Security Service of the Russian Federation

We are recruiting a release group for our tracker .
Payment is negotiable.
Applications are accepted by mail [email protected], you can use the feedback
Please tell us briefly about yourself, how much time you can devote to our site and the expected earnings.

µTorrent- fast, convenient and compact torrent client. The µTorrent client is one of the most functional solutions for working with the BitTorrent network today. The program combines optimal functionality in a small size. Supports work independently of the tracker ....

Collection of Drivers with Automatic installation in Operating Systems Windows 7 x86-x64.


W10Privacy- program for changing settings Windows systems 10 and minimizing the collection of user data. Offers a serious set of data protection and privacy settings, the main thing is not to make the wrong choice. The program clearly displays the parameters available for change, divided into 12 sections in which you independently select the settings ....

LibreOffice- powerful office suite fully compatible with 32/64-bit systems. Translated into more than 30 languages ​​of the world. Supports most popular operating systems including GNU / Linux, Microsoft Windows and Mac OS X. LibreOffice programs are a free suite of programs ....

AnyMP4 Video Converter Ultimate- universal professional program to convert video, can convert almost all video formats like MP4, AVI, MOV, FLV, MKV, M4V and even HD videos HD TS, HD MTS, HD AVI, HD MOV, HD MP4, etc., convert 2D and 3D video at unrivaled speed ....

save2pc Ultimate is an easy-to-use program that allows you to save videos from the famous YouTube file storage. At YouTube help Downloader, you can download any video file from the YouTube web service using the link on its page. All that is required from the user is to copy ...

XMedia Recode is an excellent utility whose purpose is to help you convert video of almost any format to video compatible with mobile phones, players, portable media, game consoles. A friendly interface will allow you to navigate the functionality and capabilities of the program. XMedia Recode is capable of resizing the video frame ....

Medicine: Everything is cured The size: 9.83 Mb YTD Video Downloader- allows you to download the file you need in just one click. You just need to add the address with your video that you want to download, click the download button and the program will do the rest on its own. Of the distinctive features of the program, the following can be noted. The ability to convert downloaded files directly in the program ....

Freemake Video Converter is a free universal application that brings to the attention of users tools for quickly converting video materials into common formats, their subsequent editing and recording to optical media. With Freemake Video Converter ....

The size: 1.29 Mb

StartIsBack ++- returns to Windows 10 the fully functional Start Menu button, the same as in Windows 7. Restores the original startup windows menu 7 with all its possibilities: search, drag and drop, paste, recently used applications. Can change appearance Start menu ....

CryptoPro CSP 5.0 is a new generation of crypto provider that develops the three main product lines of CryptoPro: CryptoPro CSP (classic tokens and other passive storage of secret keys), CryptoPro FKN CSP / Rutoken CSP (non-retrievable keys on tokens with secure message exchange) and CryptoPro in the cloud).

All the advantages of the products of these lines are not only preserved, but also multiplied in CryptoPro CSP 5.0: the list of supported platforms and algorithms is wider, the performance is higher, and it is more convenient user interface... But the main thing is that the work with all key carriers, including keys in the cloud, is now uniform. To transfer the application system in which CryptoPro CSP of any version worked to support keys in the cloud or to new media with unrecoverable keys, no software reworking is required - the access interface remains the same, and work with the key in the cloud will be exactly the same in the same way as with the classic key carrier.

Purpose of CryptoPro CSP

  • Formation and verification of electronic signature.
  • Ensuring confidentiality and control of the integrity of information through its encryption and imitation protection.
  • Ensuring the authenticity, confidentiality and imitation of protocol connections, etc.
  • Integrity control of system and application software to protect it from unauthorized changes and violations of trusted functioning.

Supported algorithms

In CryptoPro CSP 5.0, along with Russian ones, foreign cryptographic algorithms are implemented. Users can now use their familiar key media to store their RSA and ECDSA private keys.

Supported key storage technologies

Cloud token

For the first time in the CryptoPro CSP 5.0 encryption provider, it became possible to use keys stored on cloud service CryptoPro DSS, through the CryptoAPI interface. Now keys stored in the cloud can be easily used by any custom application or most Microsoft applications.

Non-retrievable key media with secure messaging

CryptoPro CSP 5.0 adds support for non-retrievable key media implementing the protocol SESPAKE allowing to carry out authentication without transmitting the user's password in the open form, and to establish an encrypted channel for exchanging messages between the encryption provider and the carrier. An attacker who is in the channel between the carrier and the user's application can neither steal the password during authentication, nor change the signed data. When using such media, the problem of safe handling of non-retrievable keys is completely solved.

The companies Active, InfoCrypt, SmartPark and Gemalto have developed new secure tokens that support this protocol (SmartPark and Gemalto starting from version 5.0 R2).

Non-retrievable key media

Many users want to be able to work with non-retrievable keys, but at the same time not update tokens to the FCN level. Especially for them, the provider has added support for the popular key carriers Rutoken EDS 2.0, JaCarta-2 GOST and InfoCrypt VPN-Key-TLS.

List of manufacturers and models supported by CryptoPro CSP 5.0

List of manufacturers and models of non-retrievable media supported by CryptoPro CSP 5.0
Company Carrier
ISBC Esmart Token GOST
Assets Rutoken 2151
Rutoken 2151 SC
Rutoken Bluetooth
Rutoken PinPad
Rutoken 2151
Rutoken EDS
Rutoken EDS SC
Rutoken EDS 2.0
Rutoken EDS 2.0 SC
Rutoken EDS Flash
Aladdin R.D. JaCarta-2 GOST
Infocript InfoCrypt Token ++ TLS
InfoCrypt VPN-Key-TLS

Classic passive USB tokens and smart cards

Most users prefer fast, cheap and convenient key storage solutions. As a rule, preference is given to tokens and smart cards without cryptographic coprocessors. As in previous versions provider, CryptoPro CSP 5.0 retains support for all compatible carriers produced by Active, Aladdin R.D., Gemalto / SafeNet, Multisoft, NovaCard, Rosan, Alioth, MorphoKST and SmartPark.

In addition, of course, as before, ways of storing keys in windows registry, on your hard drive, on flash drives on all platforms.

List of manufacturers and models supported by CryptoPro CSP 5.0

List of manufacturers and models of classic passive USB tokens and smart cards supported by CryptoPro CSP 5.0
Company Carrier
Alioth SCOne Series (v5 / v6)
Gemalto Optelio Contactless Dxx Rx
Optelio Dxx FXR3 Java
Optelio G257
Optelio MPH150
ISBC Esmart Token
Esmart Token GOST
MorphoKST MorphoKST
NovaCard Cosmo
Rosan G&D element V14 / V15
G&D 3.45 / 4.42 / 4.44 / 4.45 / 4.65 / 4.80
Kona 2200s / 251 / 151s / 261/2320
Kona2 S2120s / C2304 / D1080
SafeNet eToken Java Pro JC
eToken 4100
eToken 5100
eToken 5110
eToken 5105
eToken 5205
Assets Rutoken 2151
Rutoken 2151 SC
Rutoken Bluetooth
Rutoken S
Rutoken KP
Rutoken Light
Rutoken Light SC
Rutoken EDS 2.0 3000
Rutoken EDS
Rutoken EDS SC
Rutoken EDS 2.0
Rutoken EDS 2.0 SC
Rutoken EDS Flash
Aladdin R.D. JaCarta GOST
JaCarta PKI
JaCarta PRO
JaCarta LT
JaCarta-2 GOST
Infocript InfoCrypt Token ++ lite
Multisoft MS_Key isp.8 Hangar
MS_Key ESMART ver. 5
SmartPark Master's
R301 Foros
Oscar
Oscar 2
Rutoken Magister

CryptoPro tools

CryptoPro CSP 5.0 includes a cross-platform (Windows / Linux / macOS) graphical application - "CryptoPro Tools".

The main idea is to provide an opportunity for users to conveniently solve typical tasks. All basic functions are available in simple interface- at the same time, we have implemented a mode for experienced users, opening up additional possibilities.

With the help of CryptoPro Tools, the tasks of managing containers, smart cards and settings of crypto providers are solved, and we also added the ability to create and verify an electronic signature PKCS # 7.

Supported software

CryptoPro CSP allows you to quickly and safely use Russian cryptographic algorithms in the following standard applications:

  • office suite Microsoft Office;
  • mail server Microsoft Exchange and the client Microsoft Outlook;
  • products Adobe Systems Inc.;
  • browsers Yandex Browser, Sputnik, Internet Explorer ,Edge;
  • application signature generation and verification tool Microsoft Authenticode;
  • web servers Microsoft IIS, nginx, Apache;
  • remote desktop tools Microsoft Remote Desktop Services;
  • Microsoft Active Directory.

Integration with the CryptoPro platform

From the very first release, support and compatibility with all our products is provided:

  • CryptoPro UC;
  • TC services;
  • CryptoPro EDS;
  • CryptoPro IPsec;
  • CryptoPro EFS;
  • CryptoPro.NET;
  • CryptoPro Java CSP.
  • CryptoPro NGate

Operating systems and hardware platforms

Traditionally, we work in an unrivaled wide range of systems:

  • Microsoft Windows;
  • Mac OS;
  • Linux;
  • FreeBSD;
  • Solaris;
  • Android;
  • Sailfish OS.

hardware platforms:

  • Intel / AMD;
  • PowerPC;
  • MIPS (Baikal);
  • VLIW (Elbrus);
  • Sparc.

and virtual environments:

  • Microsoft Hyper-V
  • VMWare
  • Oracle Virtual Box
  • RHEV.

Supported different versions CryptoPro CSP.

To use CryptoPro CSP with a license for workplace and the server.

Embedding interfaces

For embedding into applications on all platforms, CryptoPro CSP is available through standard interfaces for cryptographic tools:

  • Microsoft CryptoAPI;
  • PKCS # 11;
  • OpenSSL engine;
  • Java CSP (Java Cryptography Architecture)
  • Qt SSL.

Performance for every taste

Years of development experience allows us to cover all solutions from miniature ARM boards like the Raspberry PI to multiprocessor servers on Intel based Xeon, AMD EPYC and PowerPC, scaling performance great.

Regulatory documents

Full list of regulatory documents

  • The cryptographic provider uses algorithms, protocols and parameters defined in the following documents Russian system standardization:
  • R 50.1.113–2016 " Information technology... Cryptographic information protection. Cryptographic Algorithms Associated with the Application of Electronic Digital Signature Algorithms and the Hash Function "(also see RFC 7836" Guidelines on the Cryptographic Algorithms to Accompany the Usage of Standards GOST R 34.10-2012 and GOST R 34.11-2012 ")
  • R 50.1.114–2016 “Information technology. Cryptographic information protection. Elliptic Curve Parameters for Cryptographic Algorithms and Protocols "(also see RFC 7836" Guidelines on the Cryptographic Algorithms to Accompany the Usage of Standards GOST R 34.10-2012 and GOST R 34.11-2012 ")
  • R 50.1.111–2016 “Information technology. Cryptographic information protection. Password protection of key information "
  • R 50.1.115–2016 “Information technology. Cryptographic information protection. Shared Key Generation Protocol with Password Authentication "(also see RFC 8133 The Security Evaluated Standardized Password-Authenticated Key Exchange (SESPAKE) Protocol")
  • Methodological recommendations TC 26 "Cryptographic information security" "Use of sets of encryption algorithms based on GOST 28147-89 for the transport layer security protocol (TLS)"
  • Methodological recommendations TC 26 "Cryptographic information security" "Use of algorithms GOST 28147-89, GOST R 34.11 and GOST R 34.10 in cryptographic messages in CMS format"
  • Technical specification TC 26 "Cryptographic information security" "Use of GOST 28147-89, GOST R 34.11-2012 and GOST R 34.10-2012 in the IKE and ISAKMP key exchange protocols"
  • Technical specification TC 26 "Cryptographic protection of information" "Use of GOST 28147-89 when encrypting attachments in IPsec ESP protocols"
  • Technical specification TC 26 "Cryptographic information security" "Use of algorithms GOST R 34.10, GOST R 34.11 in the certificate profile and certificate revocation list (CRL) of the public key infrastructure X.509"
  • Technical specification TC 26 "Cryptographic protection of information" "Extension of PKCS # 11 for the use of Russian standards GOST R 34.10-2012 and GOST R 34.11-2012"