Rutoken authentication and electronic signature tools. Authentication and electronic signature tools Rutoken Cryptopro Rutoken csp license

Here you can buy products for authentication and electronic signature Rutoken, developed by our partner JSC "Active-soft".

  • Equipping smart cards with RFID tags Em-Marine, HID Prox;
  • Equipping smart cards with RFID tags Mifare Classic 1K;
  • Equipping smart cards with RFID tags Em-Marine / HID Prox + Mifare Classic 1K;
  • Equipping smart cards with HID iClass RFID tags.
  • Smart card reader ACR38U-I1;
  • Smart card reader ACR38U-H1;
  • Smart card reader ACR3901U-H3;
  • OMNIKEY (CardMan) 3021 smart card reader;
  • OMNIKEY (CardMan) 3121 smart card reader;
  • OMNIKEY (CardMan) 5421 smart card reader;
  • IDBridge CT30 smart card reader.

Rutoken KeyBox devices are designed for administration and management life cycle key carriers (USB tokens, smart cards and other devices). Designed for use in corporate networks based on Microsoft Windows technologies. Are a system that provides communication between accounts users, authentication tools, applications and information security regulations. They are certified by FSTEC of Russia.

  • License for 1 user;
  • Distribution kit Rutoken KeuVokh, certificate of FSTEC of Russia.

Rutoken devices for Windows are designed for hardware authentication of users and protection of e-mails in networks based on Microsoft Windows. The solution is based on the use of built-in Windows security tools and electronic identifiers of the Rutoken family as carriers of key information.

CryptoTree is a workplace of legally significant document flow. It is a comprehensive boxed solution. Designed for encryption and electronic signature of documents, digital certificate management and authentication.

CryptoPro Rutoken CSP is a software and hardware cryptographic protection facility that combines the capabilities of a Russian crypto provider CryptoPro CSP and USB-token Rutoken. In CryptoPro Rutoken CSP, cryptographic operations on private keys are performed inside the token, while the keys do not leave the device itself. The product implements a functional key carrier technology that protects the exchange protocol between the software part and the token from attacks, and also provides additional security for private keys. The user's private key is valid for up to 3 years. Has a certificate of the FSB of Russia on compliance with the requirements for electronic signature facilities and cryptographic information protection facilities in the KC1 and KC2 classes.

  • CryptoPro Rutoken CSP license;
  • CryptoPro Rutoken CSP distribution kit.

Accessories

Products:

  • Cap for USB token;
  • Keychain with a field for a tag (4 colors to choose from);
  • Neck strap, red;
  • Extension cable for USB port.

The CryptoPro Rutoken CSP solution is a joint development of the CryptoPro and Aktiv companies, in which the capabilities of the CryptoPro CSP crypto provider and Rutoken USB tokens are integrated. An important feature FKN technology is the division of cryptographic powers between CryptoPro CSP and Rutoken KP - a cryptographic USB-token model specially adapted for FKN technology, based on Rutoken EDS.

Rutoken KP is used in FCN technology to generate key pairs, generation of agreement keys, implementation of electronic signatures, etc. Performing these operations on board the token ensures the highest degree of safety of key information. Rutoken KP is used and supplied only as part of CryptoPro Rutoken CSP, this USB token is not distributed separately.

V new version CryptoPro Rutoken CSP, in addition to Rutoken KP, supports the standard Rutoken EDS 2.0 model for generating and secure storage of key pairs and CryptoPro CSP containers. Key information is stored on Rutoken EDS 2.0 and cannot be retrieved. The use of Rutoken EDS 2.0 as part of CryptoPro Rutoken CSP provides an optimal solution in terms of cost and capabilities for cases where increased requirements for the level of protection of communication channels with a key carrier are not imposed.

The CryptoPro Rutoken CSP solution is the successor of the CryptoPro CSP CIPF and supports all its capabilities. It also fully integrates into the infrastructure. public keys based on the "CryptoPro UC" certification center.

Appointment

CIPF CryptoPro Rutoken CSP is intended for use in Russian systems PKI, in legally significant electronic document management systems and in other information systems using technologies digital signature... Including:

  • in client-bank systems when signing payment orders;
  • in secure document management systems;
  • in reporting systems for submission to in electronic format;
  • in the authorities and administration at the federal and regional levels;
  • in all other cases where it is necessary to provide increased protection of user keys.

Possibilities

  • Supports all functionality CIPF CryptoPro CSP 3.9 .
  • Provides full integration with PKI infrastructure based on CryptoPro UC.
  • It also works with the standard Rutoken EDS 2.0 model.
  • Using the hardware resources of Rutoken KP or Rutoken EDS 2.0, the following cryptographic operations are performed:
    • generation of key pairs GOST R 34.10-2001;
    • formation of an electronic signature in accordance with GOST R 34.10-2001;
    • calculating the Diffie-Hellman negotiation key (RFC 4357).
  • Provides secure storage and use of private keys inside the key carrier without the possibility of retrieval.

Functional key carrier

The FKN architecture implements a fundamentally new approach to ensuring the safe use of key information that is stored on hardware.

In addition to generating an electronic signature and generating encryption keys directly in the microprocessor, the key carrier allows you to effectively resist attacks related to the substitution of the hash value or signature in the communication channel.

The main advantages of FCN

  • The possibility of signature substitution in the exchange protocol is excluded, the electronic signature is generated in parts: first in the key carrier, then finally in the CSP software part.
  • Generation of electronic signature keys and agreement keys, as well as the creation of an electronic signature within the FKN.
  • Transmitting the hash value over a secure channel that excludes the possibility of spoofing.
  • After the container is created, the user key is not stored in either key container, nor in the memory of the cryptographic provider, nor are they explicitly used in cryptographic transformations.
  • Enhanced data protection during transmission over an open channel due to the use of mutual authentication of the key carrier and the software component using the original protocol based on the EKE (electronic key exchange) procedure. In this case, not a PIN-code is transmitted, but a point on an elliptic curve.
  • Increased confidentiality of private keys.
  • The key can be generated by the FKN or downloaded from the outside.
  • Performing cryptographic operations on elliptic curves directly with a key carrier, supporting Russian electronic signatures.

, "New cloud technologies", "Rusbitech", "Infoteks", "CryptoPRO" and "Phoenix" have formed an automated workstation, which is distinguished by a high level of information security. First of all, the solution is focused on use in government agencies, as well as in commercial companies that have high requirements for the level of information protection, reported on July 30, 2018 in "T-Platforms". More details.

Compatible with "Red OS 7.1 Moore"

2017: FSB extended the certificate for "CryptoPro Rutoken CSP" version 3.9

Hardware cryptography support Rutoken EDS and Rutoken EDS 2.0 expands the capabilities of CryptoPro CSP to work with non-retrievable electronic signature keys that can be generated on board the hardware device. Once generated, such keys cannot be retrieved from the USB token memory and do not enter the computer's RAM during operations. Thus, the possibility of making a duplicate of the electronic signature key, which can be used by an intruder, is excluded, the company stressed. In this integrated solution, users get a high speed of execution of cryptographic operations, supplemented by increased security of cryptographic keys while saving full compatibility with numerous existing solutions.

2015: CryptoPro Rutoken CSP

This hardware and software solution allows not only storing user certificates on a USB key, but also performing operations on private keys inside the device. For this, the following algorithms are implemented in hardware: key generation in accordance with GOST R 34.10-2001, generation of an electronic digital signature in accordance with GOST R 34.10-2001, and calculation of the Diffie-Hellman negotiation key (RFC 4357). SCZI CryptoPro Rutoken CSP is implemented on the basis of Rutoken EDS and CryptoPro software.

Users of the CryptoPro data protection system often use Rutoken devices from the Aktiv company as a key. However, the latest models of this device do not work without the presence of the appropriate drivers in the system, and today we will tell you where you can download them and how to install them.

The procedure is performed in two stages: installation of the Rutoken support module in CryptoPro and, in fact, installation of drivers for the specified device.

Stage 1: Installing the helper module

Before installing the utility software for the USB dongles in question, you first need to add a support module to the cryptographic protection package. This is done as follows:

  1. Go to the considered CIPF, located on the official resource of the Rutoken developers. Modules for both CSP and JSP versions of CryptoPro are presented, versions of the former are also divided by bitness. To download the required component, just click on its name.
  2. To continue downloading, you will need to accept the license agreement - read the document, then check the box "The terms of the License Agreement have been read and accepted in in full» and click on the button "Terms accepted".
  3. Download the module installer at any appropriate place and then run the executable file. Push "Further" in the first window Installation Wizards.
  4. In the next step, click "Install".
  5. The installation is automatic, so just wait until the end of the procedure.


    To close the installer, click the button "Ready".

This completes the first stage and you can move on to the next.

Stage 2: Installing Drivers

After installing the support module, you can install the drivers directly.


This completes our today's task - the installation of Rutoken drivers for CryptoPro is fully completed.

Rutoken- personal devices for accessing information resources, information protection, means of authentication and electronic signature.

The options are:

Rutoken S

  • The main key carrier for Russian crypto assets
  • Hardware implementation of GOST 28147-89
  • FSB certificate
  • FSTEC certificate
What is Rutoken S

Electronic identifier (token) Rutoken S is a compact USB device designed for secure two-factor user authentication, secure storage of encryption keys and electronic signature keys, as well as digital certificates and other information.

Rutoken S most often it is used as a carrier of a private key of an electronic signature for access to various resources, for electronic document management and for remote banking services. Rutoken S acts as a good alternative to traditional "storage" of key information, such as floppy disks or flash drives. In contrast, user passwords and certificates are stored on Rutoken S in the protected internal memory of the device. Access to this data is possible only upon presentation of the PIN-code.

How Rutoken S works

Rutoken S provides two-factor authentication on computer systems. Successful authentication requires the fulfillment of two conditions: the physical presence of the Rutoken USB token itself and knowledge of the PIN code to it. This provides much more high level security compared to traditional password access. The basis Rutoken S make up a microcontroller that performs a cryptographic transformation of data, and a protected memory in which user data is stored in encrypted form: passwords, certificates, encryption keys, etc.

Rutoken S supports major industry standards, making it easy to use in existing information security systems.

Rutoken Lite

  • Key carrier for software and hardware cryptographic information protection tools
  • Ability to work without installing drivers
  • Protected memory for storing data
  • Working with CryptoPro without installing additional software
  • FSTEC certificate
What is Rutoken Lite

USB tokens and Rutoken Lite smart cards are protected carriers of electronic signature private keys for access to various resources, for electronic document management and remote banking services. On Rutoken Lite you can store secret keys or digital identifiers and read them when needed by the user presenting a PIN. Tokens and smart cards are not disk drives, so the information stored on them cannot be copied using the file system. Access to information is provided only through special means for working with smart cards.

Rutoken Lite provides two-factor authentication on computer systems. Successful authentication requires the fulfillment of two conditions: the user's knowledge of a unique password - PIN-code and possession of a unique item - the device itself. This provides a much higher level of security compared to traditional password access.

Simplicity and convenience

Many software and hardware cryptographic information protection tools, as well as other applications in the field of information security, do not provide for the use of the cryptographic capabilities of modern tokens. However, at the same time, they need secure means for storing key information. Such storage means should be significantly more reliable and secure than flash drives or the Windows registry, but more economical than tokens with a full set of cryptographic capabilities. In this case, in addition to safety, users are interested in the reliability of the media and ease of installation and configuration.

Electronic identifiers are usually used in conjunction with the corresponding software and hardware. Rutoken Lite supports major industry standards, making it easy to use in existing information security systems.

To work with Rutoken Lite the CCID driver is used, which is already part of modern operating systems, and no additional software is required, except for those cryptographic information protection tools and applications that must work with it.

Rutoken EDS

  • Support for the Russian standard of electronic signature
  • Non-retrievability of cryptographic keys
  • Hardware implementation of Russian and Western cryptoalgorithms
  • Two execution options: standard and micro-token
  • FSTEC and FSB certificates, compliance with FZ-63
What is Rutoken EDS for?

Rutoken EDS designed for secure two-factor authentication of users, generation and secure storage of encryption keys and electronic signature keys, performing encryption and the electronic signature itself "on board" the device, as well as storing digital certificates and other data.

Hardware implementation of national standards for electronic signature, encryption and hashing allows you to use Rutoken EDS as an intelligent key carrier and means of electronic signature in Russian PKI systems, in legally significant electronic document management systems and in other information systems using electronic signature technologies. Possibilities Rutoken EDS allow you to perform cryptographic operations in such a way that a private Key information never leaves the token limits. Thus, the possibility of compromising the key is excluded and the overall security of the information system is increased.

How Rutoken EDS works

Rutoken EDS provides two-factor authentication on computer systems. Successful authentication requires the fulfillment of two conditions: the user's knowledge of the PIN-code and the physical presence of the token itself. This provides a much higher level of security compared to traditional password access. The basis Rutoken EDS makes up a modern secure microcontroller and built-in secure memory, which safely stores user data: passwords, encryption and signature keys, certificates, etc.

Electronic identifier Rutoken EDS supports the main Russian and international standards in the field of information security. This makes it easy, without additional effort, to build its support into existing information systems.

Rutoken Web

  • Hardware replacement of login and password
  • Building reliable authentication systems on web resources
  • Works in all popular browsers and operating systems
  • No driver installation required, functions as a HID device
  • All cryptographic capabilities Rutoken EDS
Rutoken Web features

Using Trojans, phishing or traffic interception, it is impossible to steal the hardware device itself, nor to forge or alter an electronic signature. Solution Rutoken Web is cross-platform and multi-browser, has a low cost of ownership and is easy to use.

The product is based on electronic signature technology and consists of three components:

  1. USB token - electronic key that has the ability to carry out an electronic signature. Works as a HID device, no drivers required.
  2. Browser plugin - communicates between the USB token and the browser. Doesn't require administrative rights to install. Uses only the APIs built into the browser and does not require the installation of additional components, frameworks and platforms such as Java, Microsoft Silverlight and others. Works with all known browsers on MS Windows, Apple OS X, GNU / Linux platforms.
  3. Server part - implementation of electronic signature verification on the server. The mechanisms are implemented for different platforms and development tools, namely: PHP, ASP.NET, WordPress, Joomla and Bitrix.

KritoPro Rutoken CSP

  • Hardware and software cryptographic information protection system based on Rutoken EDS
  • All features of CryptoPro CSP 3.6
  • Private key validity period - 3 years
  • Unique FCN technology
  • Integration with PKI based on CryptoPro UC
What is CryptoPro Rutoken CSP

Solution CryptoPro Rutoken CSP is a joint development of the companies "CRYPTO-PRO" and "Aktiv", based on the integration of the CryptoPro CSP crypto provider and the Rutoken EDS USB token. An important feature of the solution is the use of the Rutoken EDS cryptographic capabilities to generate key pairs, generate agreement keys, implement an electronic signature, etc. Performing these operations on board the token ensures the highest degree of security of key information.

In the CIPF CryptoPro Rutoken CSP for the first time, a unique PCN technology was applied, which protects the exchange protocol between the software part and the key carrier from attacks, and also provides additional security for private keys. Solution CryptoPro Rutoken CSP is the successor of the CryptoPro CSP CIPF and supports all its capabilities. It is also fully integrated into the public key infrastructure based on the CryptoPro UC certification center.

Appointment

SKZI CryptoPro Rutoken CSP intended for use in Russian PKI systems, in legally significant electronic document management systems and in other information systems using digital signature technologies, for example:

  • in client-bank systems when signing payment orders,
  • in secure document management systems,
  • in systems for collecting reports for submission in electronic form,
  • in the authorities and administration at the federal and regional levels,
  • in all other cases where it is necessary to provide increased protection of user keys.
Possibilities
  • All functionality of CryptoPro CSP 3.6 is supported.
  • Full integration with PKI infrastructure based on CryptoPro UC is provided.
  • The following cryptographic operations are performed using Rutoken EDS hardware resources:
    • generation of key pairs GOST R 34.10-2001,
    • formation of an electronic signature in accordance with GOST R 34.10-2001,
    • calculating the Diffie-Hellman negotiation key (RFC 4357).
  • Provides secure storage and use of private keys inside the key carrier without the possibility of retrieval.

Rutoken for Windows

  • Turnkey solution for hardware authentication and email security
  • All options for using Rutoken EDS and Rutoken S in Windows networks
  • Detailed step-by-step instructions for configuring security tools operating system MS Windows
Scope of application

Rutoken for Windows can be used by any organization and enterprise whose information structure is based on Microsoft Windows networks. For deployment and subsequent operation, you do not need to involve third-party specialists and purchase additional equipment and software third parties. All the necessary network settings can be performed by the full-time system administrator of the enterprise, following detailed instructions in the Implementation Guide Rutoken for Windows.

To get started with Rutoken for Windows, you need to purchase a Starter Kit, with the help of which all the necessary network settings are made. After that, it remains only to order the required number of electronic identifiers Rutoken S or Rutoken EDS.

Appointment

Product Rutoken for Windows intended primarily for system administrators and IT specialists of enterprises. Detailed illustrated step-by-step instruction on setting up services will save a lot of time studying Microsoft proprietary documentation and avoid many problems that you may encounter when setting up yourself.

The instructions included in the starter kit also provide information on how to use electronic signatures and encryption in Microsoft Office applications. This allows for faster and more efficient training of company personnel on how to securely access information resources and protect correspondence and documents, since IT specialists do not need much time to develop documentation for end users.

CryptoThree

  • CryptoPro CSP + CryptoARM + Rutoken S
  • Workplace legally significant document flow
  • Certified solution that fully complies with 63-FZ
  • Focused on the untrained user
  • Requires minimal implementation costs
What is CryptoThree

CryptoThree is a comprehensive solution for organizing workplaces for secure workflow: encryption and electronic signature of documents, digital certificate management, authentication, etc.

Part CryptoThree includes certified products:

  • the crypto provider "CryptoPro CSP" (the company "CRYPTO-PRO");
  • CryptoARM software (Digital Technologies company);
  • key carrier Rutoken S 32KB (Aktiv company).
How CryptoThree works

The CryptoPro CSP crypto provider ensures the use of Russian cryptographic algorithms at the operating system kernel level. The "CryptoARM" client application offers a convenient interface for the encryption / decryption, signature and signature verification functions performed by the encryption provider electronic document, and also has extensive capabilities for managing signing key certificates, CRLs, etc.

All keys and signature key certificates are stored on a secure key carrier Rutoken S to prevent unauthorized access to secret data. For government organizations and commercial companies using information security policies in accordance with industry and national standards, a certified version of Rutoken S is offered.

Please note that d

To use tokens in the EGAIS system, it is necessary to acquire positions with an FSB certificate. The presented items are supplied without FSB certificate.

* For delivery, it is mandatory to purchase 1 set of documentation Set of FSTEC documentation for Rutoken Lite

** For delivery, it is mandatory to purchase 1 set of documentation Set of FSTEC documentation for Rutoken s

*** For delivery, it is mandatory to purchase 1 set of documentation Set of documentation FSTEK PAK Rutoken

mob_info