Get authentication and electronic signature Rutoken. Get Authentication and Electronic Signature Rutoken What is Rutoken Lite

Coristuvachi system zahistu data CryptoPro often vikoristuyu as the key to attach Rutoken in the company "Active". However, new models of this add-on cannot be used without being present in the system with different drivers, and today it is possible to download and install it.

The procedure takes place in two stages: installation in CryptoPro of the Rutoken support module and, finally, the installation of drivers for the designated add-on.

Stage 1: Installing the trim module

Before installing the service software for USB keys, which are being looked at, it is necessary to add a support module to the package of cryptographic protection. Fight like this:

  1. Go to the examined SKZI, sorted on the official resource of Rutoken retailers. The presented modules are like CSP, as well as the JSP-version of CryptoPro, versions of the first ones are also divided according to the size. To capture the required component, simply click on the name.
  2. To continue the promotion, you will need to accept the license agreement - read the document, then designate the item "Clean up the Licensing please read and accept from the full agreement" and press the button "Wash accepted".
  3. Get the module installer in some place, then run the download file. push on "Dali" at the first end "Maistri Installations".
  4. Press the stepping stone "Insert".
  5. The installation runs in automatic mode, so just check the completion of the procedure.


    To close the installer, press the button "Ready".

The first stage is completed and you can move on to the next one.

Stage 2: Driver installation

After installing the support module, you can install the driver directly.


On the basis of our today's task, the installation of the Rutoken drivers for CryptoPro is completely broken.

You can buy products for authentication from us electronic signature Rutoken is distributed by our partner ZAT "Active-soft".

  • Equipping smart cards with RFID tags Em-Marine, HID Prox;
  • Equipping smart cards with Mifare Classic 1K RFID tags;
  • Equipping smart cards with Em-Marine/HID Prox + Mifare Classic 1K RFID tags;
  • Equipping smart cards with HID iClass RFID tags.
  • Attachment for reading smart cards ACR38U-I1;
  • Attachment for reading smart cards ACR38U-H1;
  • Attachment for reading smart cards ACR3901U-H3;
  • Attachment for reading smart cards OMNIKEY (CardMan) 3021;
  • Attachment for reading smart cards OMNIKEY (CardMan) 3121;
  • Attachment for reading smart cards OMNIKEY (CardMan) 5421;
  • Smart card reader IDBridge CT30.

The Rutoken KeyBox add-ons are recognized for administration and maintenance of the life cycle of key carriers (USB-tokens, smart cards and other add-ons). Oriented towards corporate relationships, inspired by Microsoft Windows technologies. Є a system that secures communications between the official records of coristuvachs, authentication methods, addenda, and information security regulations. Mayut FSTEK Russia certificate.

  • License for 1 koristuvach;
  • Distribution kit Rutoken KeyBox, FSTEC Russia certificate.

The Rutoken extension for Windows is recognized for hardware authentication and screening in networks based on Microsoft Windows. The decision was made on zastosuvanny vbudovanieh Windows security tools and electronic identifiers of the Rutoken family as carrying key information.

CryptoThree e work space legally significant documentary. Є complex box solutions. Designated for encryption and electronic signature of documents, verification by digital certificates and authentication.

CryptoPro Rutoken CSP is a hardware-software SKZI, as a way to increase the possibility of the Russian crypto-provider CryptoPro CSP and USB-token Rutoken. In CryptoPro Rutoken CSP, cryptographic operations on private keys are encoded in the middle of the token, with which key the attachment itself is not blocked. The product has implemented the technology of functional key wear, which protects the protocol of exchange between the software part and the token from attacks, as well as secures the additional security of closed keys. The term for the private key of the koristuvach is up to 3 years. May a certificate of the Federal Security Service of Russia about the security of vimogams, which is presented before the electronic signature and cryptographic protection of information for the classes KS1 and KS2.

  • License for CryptoPro Rutoken CSP;
  • Distribution kit CryptoPro Rutoken CSP.

Accessories

Products:

  • Cap for USB-token;
  • Keychain with a field for a tag (4 colors per choice);
  • Str_chka-p_dv_s on the neck, chervona;
  • Mouth cable for USB port.

Solution of CryptoPro Rutoken CSP is a joint development of CryptoPro and Aktiv companies in order to integrate CryptoPro CSP crypto provider and Rutoken USB-tokens. An important feature of the FKN technology is the cryptographic strains between the cryptographic provider CryptoPro CSP and Rutoken KP - a model of a cryptographic USB-token, specially adapted to the FKN technology, based on the Rutoken EDC.

Rutoken KP is victorious in FKN technology for generating key pairs, generating keys, creating an electronic signature, and so on. Rutoken KP is viable and is only available at the CryptoPro warehouse Rutoken CSP, but the USB token is not expandable.

At new version CryptoPro Rutoken CSP, Crim Rutoken KP, a subset of the standard model Rutoken ECP 2.0 for the generation of reliable collection of key pairs and containers in CryptoPro CSP. Key information is collected on Rutoken ECP 2.0 without the possibility of redundancy. The choice of Rutoken ECP 2.0 at the warehouse of CryptoPro Rutoken CSP gives an optimal solution configuration for options, if there is no need to move the channel to the channel lock with a key nose.

Solution of CryptoPro Rutoken CSP is the successor of SKZI CryptoPro CSP and supports all possibilities. So it will be more integrated into the infrastructure of the key keys, which is based on the center of "CryptoPro UC", which is remarkable.

Appointment

CIPF CryptoPro Rutoken CSP assignments for vikoristannya in Russian PKI systems, in systems of legally significant electronic document management and in others information systems, that win the technology of digital signature. Including:

  • in the client-bank systems, the hour of signing the payment instructions;
  • in systems of stolen document management;
  • in the systems of data collection for submission in electronic form;
  • in the bodies of power and administration at the federal and regional levels;
  • in other situations, it is necessary to secure the advancement of the defenders of the keys of the koristuvach.

Possibilities

  • Support all functionality SKZI CryptoPro CSP 3.9 .
  • Ensure full integration with the PKI infrastructure, which is based on the CryptoPro UC.
  • It also works with the standard Rutoken ECP 2.0 model.
  • For various hardware resources of Rutoken KP or Rutoken ECP 2.0, the following cryptographic operations are used:
    • generation of key pairs DERZHSTANDART R 34.10-2001;
    • forming an electronic signature according to GOST R 34.10-2001;
    • calculation of the Diff-Hellman key (RFC 4357).
  • Take care of the security of saving that choice of closed keys in the middle of the key wear without the possibility of dilution.

Functional key nose

The architecture of the FKN implements a new innovation to ensure the safe selection of key information, as it is saved on the hardware nose.

Crim for the formation of an electronic signature and the generation of encryption keys without intermediary in the microprocessor, the key nose allows you to effectively resist attacks, help to replace the hash value or the signature in the link channel.

Main advantages of FKN

  • The ability to change the signature in the exchange protocol is enabled, the electronic signature is vibrated in parts: first in the key nose, then the rest in the program part of the CSP.
  • Generation of keys of the electronic signature and keys of the agreement, as well as the creation of the electronic signature of the middle FKN.
  • Transmitting a hash value by a protected channel, which disables the ability to manage.
  • After the container has been created, the key of the key is not saved either in the key container or in the memory of the cryptographic provider, and it is also not explicitly vindicated in cryptographic transformations.
  • Possibility of protection of data for an hour of transmission over an open channel for the establishment of mutual authentication of key carrying and software storage for an additional original protocol based on the EKE (electronic key exchange) procedure. With this, the PIN code is not transmitted, but the point on the elliptic curve.
  • Increased confidentiality of private keys.
  • The key can either be generated by the FKN, or you can choose to call.
  • Vikonu cryptographic operations on elliptic curves without a middle key carrier, support of the Russian electronic signature.

, "New Khmarnі tekhnologii", "Rusbitech", "Infotex", "CryptoPRO" and "Phoenix" formed an automated work space, like high level information security. Nasampered, oriented towards winning over from state structures, as well as from commercial companies, which hang high up to the level of information protection, we reminded T-Platforms on June 30, 2018. More details.

Sumіsnіst z "Rid OS 7.1 Murom"

2017: FSB extended the certificate for "CryptoPro Rutoken CSP" version 3.9

Support for hardware cryptography "Rutoken EDS" and "Rutoken EDS" 2.0 expand the capabilities of "CryptoPro CSP" for robots with electronic signature keys, which cannot be generated "on board" the hardware extension. Once generated, such keys cannot be retrieved from the memory of the USB token, and for an hour of operations they do not reach the computer's RAM. In this way, it is impossible to prepare a duplicate of the electronic signature key, which can be countered by an intruder, was added to the company. This integrated solution has a high level of security for cryptographic operations, supplemented by increased protection of cryptographic keys for saving the total amount of money with numerous important solutions.

2015: CryptoPro Rutoken CSP

This software and hardware solution allows you not only to save certificates of coronary certificates on USB-keys, but also to perform operations on the private keys of the device. For which hardware implementation the following algorithms are used: generation of keys according to GOST R 34.10-2001, formation of an electronic digital signature according to GOST R 34.10-2001, and calculation of the Diff-Hellman key (RFC 4357). SKZI CryptoPro Rutoken CSP is implemented on the basis of Rutoken ECP and software CryptoPro.

CryptoPro Rutoken CSP- Certification of the FSB of Russia of the software and hardware SKZI of the joint distribution of the CryptoPro and Active companies, which will increase the possibility of the Russian crypto provider and the Rutoken EDC identifier.

Features of CryptoPro Rutoken CSP

The main features of CryptoPro Rutoken CSP є:

  • Invalidity of closed keys. All cryptographic operations with different private keys are locked in the middle of the CryptoPro Rutoken CSP and in no way block the attachment itself. Zavdyaki tsyoma reaches the temple of security of the secret key of the koristuvach, which allows to increase the terms of the secret keys up to 3 years.
  • Vykoristannya tekhnologii FKN. У СКЗІ КриптоПро Рутокен CSP використовується унікальна технологія ФКН, яка захищає від атак протокол обміну між програмною частиною та ключовим носієм, а також забезпечує додаткову безпеку закритих ключів завдяки набору обмежувальних лічильників, що дозволяють істотно знизити можливості реалізації атак, пов'язаних з підбором значень пароля (PIN) ).
  • There is a lot of confusion with CryptoPro CSP 3.6 and a support for all the possibilities.
  • Povna integration into the infrastructure of PKI keys, which is based on the center "CryptoPro UC", which is remarkable.

Purpose of CryptoPro Rutoken CSP

CIPF CryptoPro Rutoken CSP of appointments for typing in Russian PKI systems, in systems of legally significant electronic document management and in other information systems that use electronic digital signature technologies.

The following cryptographic operations are included in the CryptoPro Rutoken CSP versions:

  • generation of keys according to GOST R 34.10-2001;
  • forming an electronic digital signature according to GOST R 34.10-2001;
  • security of confidentiality and control of the integrity of information for additional encryption and imitation, compliant with GOST 28147-89;
  • calculation of the Diff-Hellman key (RFC 4357).

FKN architecture

The Functional Key Nose (FKN) implements a new key to ensure the safe selection of key information, as it is stored on the hardware nose. Crim for the formation of an electronic signature and the generation of keys without intermediary in the microprocessor, the key nose allows you to effectively resist attacks, by changing the hash value or the signature in the link channel.

Advantages of FKN architecture:

  • Increased confidentiality of private keys.
  • Possibility of protection of data for an hour of transmission over an open channel for the establishment of mutual authentication of key carrying and software storage for an additional original protocol based on the EKE (electronic key exchange) procedure. With this, the PIN code is not transmitted, but the point on the elliptic curve.
  • Transmitting a hash value by a protected channel, which disables the ability to manage.
  • After the container has been created, the key of the key is not stored in the key container, nor in the memory of the cryptographic provider, and is not explicitly vindicated in cryptographic transformations. Obviously, a hardware attack on the key wearer will not help to recognize the key.
  • The ability to change the signature in the exchange protocol is enabled, the electronic signature is vibrated in parts: first in the key nose, then the rest in the program part of the CSP.

Operating systems that are supported

CryptoPro Rutoken CSP supports both Windows and Linux/UNIX OS:

  • Windows 2000/XP/2003 (ia32 platform)
  • Windows XP/2003 (platform x64, ia64)
  • Windows Vista/2008/7/2008 R2/8 (ia32, x64 platform)
  • Linux Standard Base ISO/IEC 23360 (ia32, x64 platform)
  • Alt Linux 4.0 Server (ia32, x64 platform)
  • Debian-4.0 (Etch) (ia32, x64 platform)
  • FreeBSD 7 (ia32 platform)

Certificate

SKZI CryptoPro Rutoken CSP complies with GOST 28147-89, GOST R 34.11-94, GOST R 34.10.2001 and FSB Russia up to SKZI and electronic signature for classes KS1 and KS2. You can win for cryptographic protection of information, so as not to avenge statements, so to establish a sovereign mystery.