ecosmak.ru

SKZ cryptopro csp version 4.0 on the server. Supported key media types

Cryptoprovider CryptoPro CSP is designed for:
  • authorization and ensuring the legal significance of electronic documents when exchanging them between users, through the use of procedures for generating and verifying an electronic digital signature (EDS) in accordance with domestic standards GOST R 34.10-94, GOST R 34.11-94, GOST R 34.10-2001, GOST R 34.10-2012;
  • ensuring confidentiality and monitoring the integrity of information through its encryption and imitation protection, in accordance with GOST 28147-89; ensuring authenticity, confidentiality and impersonation protection of TLS connections;
  • integrity control of system and application software to protect it from unauthorized changes or violation of correct functioning; management of key elements of the system in accordance with the regulations on protective equipment.

Key media for CryptoPro CSP

CryptoPro CSP can be used in conjunction with many key media, but most often the Windows registry, flash drives and tokens are used as key media.

The most secure and convenient key media that is used in conjunction with CryptoPro CSP,are tokens. They allow you to conveniently and securely store your electronic signature certificates. Tokens are designed in such a way that even if stolen, no one will be able to use your certificate.

  • MPCOS-EMV processor cards and Russian smart cards (Oscar, RIK) using smart card readers that support the PC/SC protocol (GemPC Twin, Towitoko, Oberthur OCR126, etc.);
  • Touch-Memory DS1993 - DS1996 tablets using Accord 4+ devices, Sobol electronic lock or Touch-Memory DALLAS tablet reader;
  • electronic keys with USB interface;
  • removable media with USB interface;
  • Windows OS registry;

Digital signature certificate for CryptoPro CSP

CryptoPro CSP works correctly with all certificates issued in accordance with GOST requirements, and therefore with the majority of certificates issued by Certification Authorities in Russia.

In order to start using CryptoPro CSP, you will definitely need a digital signature certificate. If you have not yet purchased a digital signature certificate, we recommend that you do so.

CryptoPro CSP license terms

When purchasing CryptoPro CSP, you receive a serial number, which you need to enter during the installation or configuration process of the program. The validity period of the key depends on the selected license. CryptoPro CSP can be distributed in two versions: with an annual or perpetual license.

By purchasing a perpetual license, you will receive a CryptoPro CSP key, the validity of which will not be limited. If you buy, you will receive a CryptoPro CSP serial number, which will be valid for a year after purchase.

Supported Windows Operating Systems

CSP 3.6 CSP 3.9 CSP 4.0
Windows 10 x86/x64 x86/x64
Windows 2012 R2 x64 x64
Windows 8.1 x86/x64 x86/x64
Windows 2012 x64 x64 x64
Windows 8 x86/x64 x86/x64 x86/x64
Windows 2008 R2 x64/iteanium x64 x64
Windows 7 x86/x64 x86/x64 x86/x64
Windows 2008 x86 / x64 / itanium x86/x64 x86/x64
Windows Vista x86/x64 x86/x64 x86/x64
Windows 2003 R2 x86 / x64 / itanium x86/x64 x86/x64
Windows XP x86/x64
Windows 2003 x86 / x64 / itanium x86/x64 x86/x64
Windows 2000 x86

Supported UNIX-like operating systems

CSP 3.6 CSP 3.9 CSP 4.0
iOS 11 ARM7 ARM7
iOS 10 ARM7 ARM7
iOS 9 ARM7 ARM7
iOS 8 ARM7 ARM7
iOS 6/7 ARM7 ARM7 ARM7
iOS 4.2/4.3/5 ARM7
Mac OS X 10.12 x64 x64
Mac OS X 10.11 x64 x64
Mac OS X 10.10 x64 x64
Mac OS X 10.9 x64 x64
Mac OS X 10.8 x64 x64 x64
Mac OS X 10.7 x64 x64 x64
Mac OS X 10.6 x86/x64 x86/x64

Android 3.2+ / 4 ARM7
LSB 3.0 / LSB 3.1 x86/x64
RHEL 7 x64 x64
RHEL 4 / 5 / 6 x86/x64 x86/x64 x86/x64
RHEL 3.3 spec. assembly x86 x86 x86
RedHat 7/9
CentOS 7 x86/x64 x86/x64
CentOS 5/6 x86/x64 x86/x64 x86/x64
TD OS AIS FSSP of Russia (GosLinux) x86/x64 x86/x64 x86/x64
CentOS 4 x86/x64
Ubuntu 15.10 / 16.04 / 16.10 x86/x64 x86/x64
Ubuntu 14.04 x86/x64 x86/x64
Ubuntu 12.04 / 12.10 / 13.04 x86/x64 x86/x64
Ubuntu 10.10 / 11.04 / 11.10 x86/x64 x86/x64
Ubuntu 10.04 x86/x64 x86/x64 x86/x64
Ubuntu 8.04 x86/x64
Ubuntu 6.04 x86/x64
ALTLinux 7 x86/x64 x86/x64
ALTLinux 6 x86/x64 x86/x64 x86/x64
ALTLinux 4/5 x86/x64
Debian 9 x86/x64 x86/x64
Debian 8 x86/x64 x86/x64
Debian 7 x86/x64 x86/x64
Debian 6 x86/x64 x86/x64 x86/x64
Debian 4/5 x86/x64
Linpus Lite 1.3 x86/x64 x86/x64 x86/x64
Oracle Enterprise Linux 5/6 x86/x64 x86/x64 x86/x64
Open SUSE 12.2/12.3 x86/x64 x86/x64 x86/x64
SUSE Linux Enterprise 11 x86/x64 x86/x64 x86/x64
Linux Mint 18 x86/x64 x86/x64
Linux Mint 13 / 14 / 15 / 16 / 17 x86/x64 x86/x64

Supported Algorithms

CSP 3.6 CSP 3.9 CSP 4.0
GOST R 34.10-2012 Creating a signature 512 / 1024 bit
GOST R 34.10-2012 Signature verification 512 / 1024 bit
GOST R 34.10-2001 Creating a signature 512 bit 512 bit 512 bit
GOST R 34.10-2001 Signature verification 512 bit 512 bit 512 bit
GOST R 34.10-94 Creating a signature 1024 bit*
GOST R 34.10-94 Signature verification 1024 bit*
GOST R 34.11-2012 256 / 512 bit
GOST R 34.11-94 256 bit 256 bit 256 bit
GOST 28147-89 256 bit 256 bit 256 bit

Good afternoon, dear readers and guests of the blog, today we continue to administer the cryptographic protection program Cryptopro CSP 4.0, last time we solved the problem “installer service could not be accessed” and the blue screen with error 800B0001. Today we are faced with the task of how find out the license key in the installed Cryptopro csp 4.0, for example, on Windows 10. Previously, everything was simple, I went to the special “License Management” snap-in and that’s it, I saw it right away, in the fourth version, the developers complicated everything, but we are already experienced computer users, and we can easily bypass this.

The most effective method to determine the cryptopro csp 4.0 license key code in Windows is through the Windows registry. Absolutely all information about all installed programs is written into it; the registry can be compared to a catalyzed library, where everything is on the shelves. Open regedit and find the section there

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\

In this section there will be many folders with unclear names in the form of numbers and letters in a chaotic sequence. Below you need to find the following values:

  • 05480A45343B0B0429E4860F13549069\InstallProperties - this is cryptopro 3.9
  • 7AB5E7046046FB044ACD63458B5F481C\InstallProperties - this is cryptopro 4

On the right side, you need to find the ProductID line, its value is the cryptopro license key, you can copy it and give it to another employee or reinstall the program on another computer using it.

I hope the article was useful to you and you have an even better understanding of how the Windows operating system functions and works.

Tariff description

Mandatory software for working with any type of electronic signatures

Perpetual license for CIPF Crypto-Pro 4.0

Used for all types of electronic document management

At this rate, software is issued within 24 hours after payment

Additional services

CIPF license “CryptoPro CSP” 4.0 for 1 year (500 rub.)

USB key drive Rutoken (RUB 1,100)

Remote workplace setup (RUB 1,000)

Visit of a specialist to set up your computer (RUB 2,500)

Application area

CIPF "CryptoPro CSP" is required to create and verify an electronic signature to ensure the legal significance of electronic documents. Supported Windows operating systems: Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10.

Attention: this license is not suitable for server operating systems!

Documents for download

A license to use the CryptoPro CSP CIPF is purchased for use in Information systems in which Taxcom LLC provides certification center services (including in cases of loss of the license, installation of a different version of the CryptoPro CSP CIPF). The license to use the CryptoPro CSP CIPF gives the right to install and use one copy of the CryptoPro CSP software product in accordance with the License Agreement with CRYPTO PRO LLC. The list of versions of the software product and the operating systems corresponding to it can be found on the Taxcom LLC website when placing an order.

Popular about the tariff

  • What is the validity period of an electronic signature?
    The maximum validity period of an electronic signature is 1 year from the moment the certificate is generated.
  • For which employee can this electronic signature be made?
    As a rule, an electronic signature for tenders and government services is issued to the head of the organization. But it can also be made for any employee who has the necessary authority in the organization.
  • How to get an electronic signature in Orel?
    Apply for an electronic signature on our website. After this, you will receive invoices for payment and detailed instructions for further actions.
  • What software do you need to work with electronic signatures?
    To work with an electronic signature, you must have the Crypto-Pro CSP program installed, version no lower than 3.6
  • What is an electronic signature?
    Physically, an electronic signature consists of several files.
  • Where is the electronic signature recorded?
    An electronic signature (electronic signature key certificate) can be recorded on any removable storage medium (token, flash drive, floppy disk) or in the computer registry.
  • Why do we recommend using a Token for electronic signature and what is it?
    A token is a secure USB flash drive designed exclusively for recording an electronic signature on it. Using the Token you will protect yourself from accidental loss of your signature or its theft.

Software "CryptoPro CSP" designed to monitor the integrity of system and application software, manage key elements of the system in accordance with the regulations on security measures, authorization and ensure the legal significance of electronic documents when exchanging them between users. In addition to the crypto provider itself, CryptoPro CSP includes the products CryptoPro TLS, CryptoPro EAP-TLS, CryptoPro Winlogon and CryptoPro Revocation Provider.


The solution is intended for:

  • authorization and ensuring the legal significance of electronic documents when exchanging them between users, through the use of procedures for generating and verifying an electronic signature (ES) in accordance with domestic standards GOST R 34.10-2001 / GOST R 34.10-2012 (using GOST R 34.11-94 / GOST R 34.11-2012);
  • ensuring confidentiality and monitoring the integrity of information through its encryption and imitation protection, in accordance with GOST 28147-89;
  • ensuring authenticity, confidentiality and imitational protection of connections via the TLS protocol;
  • monitoring the integrity of system and application software to protect it from unauthorized changes and violations of correct functioning;
  • management of key elements of the system in accordance with the regulations on protective equipment.

Implemented Algorithms

  • The algorithm for generating the hash function value is implemented in accordance with the requirements of GOST R 34.11-94 / GOST R 34.11-2012 “Information technology. Cryptographic information protection. Hash function."
  • Algorithms for generating and verifying an electronic signature are implemented in accordance with the requirements of GOST R 34.10-2001 / GOST R 34.10-2012 “Information technology. Cryptographic information protection. Processes of formation and verification of electronic digital signatures.”
  • The data encryption/decryption algorithm and the calculation of imitative inserts are implemented in accordance with the requirements of GOST 28147-89 “Information processing systems. Cryptographic protection."

When generating private and public keys, it is possible to generate with various parameters in accordance with GOST R 34.10-2001 / GOST R 34.10-2012.
When generating a hash function value and encryption, it is possible to use various replacement nodes in accordance with GOST R 34.11-94 and GOST 28147-89.

Supported key media types

  • floppy disks 3.5;
  • smart cards using smart card readers that support the PC/SC protocol;
  • Touch-Memory tablets DS1993 - DS1996 using Accord 4+ devices, an electronic lock “Sobol”, “Krypton” or a Touch-Memory DALLAS tablet reader (Windows version only);
  • electronic keys with a USB interface (USB tokens);
  • removable media with USB interface;
  • Windows OS registry;
  • Solaris/Linux/FreeBSD OS files.
CSP 3.6 CSP 3.9 CSP 4.0 CSP 5.0
Windows Server 2016 x64* x64** x64
Windows 10 x86 / x64* x86 / x64** x86/x64
Windows Server 2012 R2 x64 x64 x64
Windows 8.1 x86/x64 x86/x64 x86/x64
Windows Server 2012 x64 x64 x64 x64
Windows 8 x86/x64 x86/x64 x86/x64
Windows Server 2008 R2 x64/iteanium x64 x64 x64
Windows 7 x86/x64 x86/x64 x86/x64 x86/x64
Windows Server 2008 x86 / x64 / itanium x86/x64 x86/x64 x86/x64
Windows Vista x86/x64 x86/x64
Windows Server 2003 R2 x86 / x64 / itanium x86/x64 x86/x64 x86/x64
Windows Server 2003 x86 / x64 / itanium x86/x64 x86/x64 x86/x64
Windows XP x86/x64
Windows 2000 x86
Loading...