• Where to download cryptopro csp. Purpose of CryptoPro CSP. Functional key carrier

    CryptoPRO is one of the cryptographic utilities (cryptoprovider). Which is necessary for generating an electronic digital signature () and working with key certificates. In this article we will analyze in detail the process of installing the CryptoPRO program on a computer.

    After you have purchased a CryptoPro CSP license or decided to try out free three-month access to the program’s functions, the question arises: how to use it on a computer?

    How to install Crypto-PRO

    The answer, as always, is in the user manual, which is available on the program’s official website and is also included when purchasing a license. But since it so happens that no one reads it anyway, we’ll describe the installation process point by point.

    First step: PC check

    At this stage, you need to make sure that an old version of this program is not installed on your computer. You can do this by carefully looking through all the Start menu items on your computer; if you do not find the CryptoPRO item in it, then most likely this software was not installed on your computer.

    If you find CryptoPRO in the list of programs, make sure that its version is outdated, for this:

    1. Launch CryptoPRO PKI
    2. Open the License Management tab – CryptoPRO CSP
    3. Look at the version number in the right window

    If the program version is 3.6.**** and higher, then reinstallation is not necessary and you can proceed to the fourth step. If the specified version is lower than 3.6.****, uninstall the program using standard Windows tools and restart your computer. Then proceed to the next step.

    Second step: download the distribution

    Fill in the required fields, agree to the license agreement and go to the next page (at the time of writing the instructions it looked like this):

    Third step: installing CryptoPRO CSP on your computer

    Run the downloaded file and follow the installer steps until you see the following window:

    Enter the required information and the Serial Number you received when purchasing the license. If you want to get free trial access, leave this field blank and click Next.



    After installation is complete, restart your computer. Ready!

    Fourth step: enter the license key (optional)

    If the program is already installed on your computer and you only need to enter the license key, follow the following path.

    The first place to start is to decide on the version you need. Client or server. If you plan to use the CryptoPro CSP CIPF on the server, buy it right away. A client license will not work. Yes, the price of a server license is several times higher, and in earlier versions it was possible to install a client license on the server, but today client licenses simply cannot be installed on server operating systems, despite the fact that everything worked in the trial (test) period.

    GOST R 34.10-2012

    Find out if you need support for the new 2012 electronic signature standards. Only supports the electronic signature standard GOST R 34.10-2012 (“Creating a signature” and “Verifying a signature”). The remaining versions of the crypto provider (3.0, 3.6 and 3.9) support GOST 94 and 2001.

    We bring to your attention

    The procedure for transition to the national standard GOST R 34.10-2012 in electronic signature tools for information that does not contain state secrets has been determined.

    From the document of the FSB of Russia No. 149/7/1/3-58 dated January 31, 2014 “On the procedure for transition to the use of new digital signature standards and hashing functions,” we learn that after December 31, 2019, it will be unacceptable to use GOST R 34.10 to create an electronic signature -2001.

    FSB Certificate

    In many information systems (especially government ones), one of the main and mandatory requirements is the presence of an FSB certificate of conformity for the software. Currently versions 3.6 and 4.0 are certified.

    The CryptoPro CSP 4.0 version has FSB certificates for protection classes and for operating systems from Windows Vista to Windows 10.

    CryptoPro CSP 3.9 R2 CryptoPro CSP 4.0 R2 supporting work in Windows 10 today received a positive conclusion from the FSB.

    Windows or Unix

    If you choose version 3.6, then you need to decide on which operating system the software will be installed - Windows or Unix-like. This division is only available in the CryptoPro CSP version 3.6 and earlier. If you purchase the or version, then it does not matter which operating system you plan to install it on - Windows or Unix-like.

    Software "CryptoPro CSP" designed to monitor the integrity of system and application software, manage key elements of the system in accordance with the regulations on security measures, authorization and ensure the legal significance of electronic documents when exchanging them between users. In addition to the crypto provider itself, CryptoPro CSP includes the products CryptoPro TLS, CryptoPro EAP-TLS, CryptoPro Winlogon and CryptoPro Revocation Provider.


    The solution is intended for:

    • authorization and ensuring the legal significance of electronic documents when exchanging them between users, through the use of procedures for generating and verifying an electronic signature (ES) in accordance with domestic standards GOST R 34.10-2001 / GOST R 34.10-2012 (using GOST R 34.11-94 / GOST R 34.11-2012);
    • ensuring confidentiality and monitoring the integrity of information through its encryption and imitation protection, in accordance with GOST 28147-89;
    • ensuring authenticity, confidentiality and imitational protection of connections via the TLS protocol;
    • monitoring the integrity of system and application software to protect it from unauthorized changes and violations of correct functioning;
    • management of key elements of the system in accordance with the regulations on protective equipment.

    Implemented Algorithms

    • The algorithm for generating a hash function value is implemented in accordance with the requirements of GOST R 34.11-94 / GOST R 34.11-2012 “Information technology. Cryptographic information protection. Hash function."
    • Algorithms for generating and verifying an electronic signature are implemented in accordance with the requirements of GOST R 34.10-2001 / GOST R 34.10-2012 “Information technology. Cryptographic information protection. Processes of formation and verification of electronic digital signatures.”
    • The data encryption/decryption algorithm and the calculation of imitative inserts are implemented in accordance with the requirements of GOST 28147-89 “Information processing systems. Cryptographic protection."

    When generating private and public keys, it is possible to generate with various parameters in accordance with GOST R 34.10-2001 / GOST R 34.10-2012.
    When generating a hash function value and encryption, it is possible to use various replacement nodes in accordance with GOST R 34.11-94 and GOST 28147-89.

    Supported key media types

    • floppy disks 3.5;
    • smart cards using smart card readers that support the PC/SC protocol;
    • Touch-Memory tablets DS1993 - DS1996 using Accord 4+ devices, an electronic lock “Sobol”, “Krypton” or a Touch-Memory DALLAS tablet reader (Windows version only);
    • electronic keys with a USB interface (USB tokens);
    • removable media with USB interface;
    • Windows OS registry;
    • Solaris/Linux/FreeBSD OS files.
    CSP 3.6 CSP 3.9 CSP 4.0 CSP 5.0
    Windows Server 2016 x64* x64** x64
    Windows 10 x86 / x64* x86 / x64** x86/x64
    Windows Server 2012 R2 x64 x64 x64
    Windows 8.1 x86/x64 x86/x64 x86/x64
    Windows Server 2012 x64 x64 x64 x64
    Windows 8 x86/x64 x86/x64 x86/x64
    Windows Server 2008 R2 x64/iteanium x64 x64 x64
    Windows 7 x86/x64 x86/x64 x86/x64 x86/x64
    Windows Server 2008 x86 / x64 / itanium x86/x64 x86/x64 x86/x64
    Windows Vista x86/x64 x86/x64
    Windows Server 2003 R2 x86 / x64 / itanium x86/x64 x86/x64 x86/x64
    Windows Server 2003 x86 / x64 / itanium x86/x64 x86/x64 x86/x64
    Windows XP x86/x64
    Windows 2000 x86

    How to install CryptoPro on a computer, installing CryptoPro 4.0

    CryptoPro CSP is a crypto provider and provides the legal significance of electronic documentation and connection protection. This is a key product among CryptoPro products. About how CryptoPro CSP install most questions arise. We suggest that you familiarize yourself with the information below to install the program correctly. To install this software on a computer, the user must have administrator rights. The software on the disk must be inserted into the drive or selected the distribution folder on the computer. After launching the Installation Wizard, you must select the language to use. During installation, it is also possible to select the protection level (class).

    Further installation is carried out in accordance with the choice of actions specified by the Installation Wizard. Thus, you may need to specify a serial key, configure additional sensors, and adjust CIPF to use the key storage service. Installation can be complete or selective, depending on the user’s tasks. Custom installation will help you install additional required components. It is advisable to restart the computer after installation for the program to work correctly.

    Cryptoprovider CryptoPro CSP is designed for:
    • ensuring the legal significance of documents for electronic document management, through the formation and verification of electronic signatures, according to Russian cryptographic standards GOST R 34.11-94/GOST R 34.11-2012 and GOST R 34.10-2001/GOST R 34.10-2012;
    • encryption and imitation protection in accordance with GOST 28147-89 will guarantee the confidentiality and integrity of information;
    • ensuring authenticity, imitation protection and confidentiality of TLS connections;
    • protection against software modification and violation of its operation algorithms;
    • management of key elements of the system, in accordance with the regulations on protective equipment.

    Key media for CryptoPro CSP

    CryptoPro CSP can be used in conjunction with a variety of key media, but most often the Windows registry, flash drives and tokens are used as key media.

    The most secure and convenient key media that is used in conjunction with CryptoPro CSP,are tokens. They allow you to conveniently and securely store your electronic signature certificates. Tokens are designed in such a way that even if stolen, no one will be able to use your certificate.

    • floppy disks 3.5";
    • MPCOS-EMV processor cards and Russian smart cards (Oscar, RIK) using smart card readers that support the PC/SC protocol (GemPC Twin, Towitoko, Oberthur OCR126, etc.);
    • Touch-Memory DS1993 - DS1996 tablets using Accord 4+ devices, Sobol electronic lock or Touch-Memory DALLAS tablet reader;
    • electronic keys with USB interface;
    • removable media with USB interface;
    • Windows OS registry;

    Digital signature certificate for CryptoPro CSP

    CryptoPro CSP works correctly with all certificates issued in accordance with GOST requirements, and therefore with the majority of certificates issued by Certification Authorities in Russia.

    In order to start using CryptoPro CSP, you will definitely need a digital signature certificate. If you have not yet purchased a digital signature certificate, we recommend that you purchase an electronic signature on this page.

    Supported Windows Operating Systems

    CSP 3.6 CSP 3.9 CSP 4.0
    Windows 2012 R2 x64 x64
    Windows 8.1 x86/x64 x86/x64
    Windows 2012 x64 x64 x64
    Windows 8 x86/x64 x86/x64 x86/x64
    Windows 2008 R2 x64/iteanium x64 x64
    Windows 7 x86/x64 x86/x64 x86/x64
    Windows 2008 x86 / x64 / itanium x86/x64 x86/x64
    Windows Vista x86/x64 x86/x64 x86/x64
    Windows 2003 R2 x86 / x64 / itanium x86/x64 x86/x64
    Windows XP x86/x64
    Windows 2003 x86 / x64 / itanium x86/x64 x86/x64
    Windows 2000 x86

    Supported Algorithms

    CSP 3.6 CSP 3.9 CSP 4.0
    GOST R 34.10-2012 Creating a signature 512 / 1024 bit
    GOST R 34.10-2012 Signature verification 512 / 1024 bit
    GOST R 34.10-2001 Creating a signature 512 bit 512 bit 512 bit
    GOST R 34.10-2001 Signature verification 512 bit 512 bit 512 bit
    GOST R 34.10-94 Creating a signature 1024 bit*
    GOST R 34.10-94 Signature verification 1024 bit*
    GOST R 34.11-2012 256 / 512 bit
    GOST R 34.11-94 256 bit 256 bit 256 bit
    GOST 28147-89 256 bit 256 bit 256 bit

    * - up to version CryptoPro CSP 3.6 R2 (build 3.6.6497 dated 2010-08-13) inclusive.

    CryptoPro CSP license terms

    When purchasing CryptoPro CSP, you receive a serial number, which you need to enter during the installation or configuration process of the program. The validity period of the key depends on the selected license. CryptoPro CSP can be distributed in two versions: with an annual or perpetual license.

    Having purchased perpetual license, you will receive a CryptoPro CSP key, the validity of which will not be limited. If you buy an annual license, you will receive a serial number CryptoPro CSP, which will be valid for a year after purchase.

    CryptoPro CSP has a certificate of conformity of the FSB of the Russian Federation