Back
["Information Security (Информационная безопасность)"]
["Information Security (Информационная безопасность)","Решения для сервис-провайдеров"]
["Infrastructure (Инфраструктура)"]
["Infrastructure (Инфраструктура)","Облачные сервисы"]
["Infrastructure (Инфраструктура)","Решения для сервис-провайдеров"]
Access control and endpoint security
Anti-APT
APCS protection
Business Productivity
Computing and network infrastructure
Data management
Network Infrastructure Protection
More
Access control and endpoint security
Computing and network infrastructure
Data protection
Network Infrastructure Protection
Физическая безопасность
More
Access control and endpoint security
Anti-APT
APCS protection
Business Productivity
Computing and network infrastructure
Data management
Network Infrastructure Protection
Access control and endpoint security
Computing and network infrastructure
Data protection
Network Infrastructure Protection
Физическая безопасность
E-mail Security
Endpoint Protection Platform (EPP)
Server Protection Platform, Virtualization Platform Security (VPS & SPP)
All solutions
Extended Detection and Response (XDR)
Managed Detection and Response (MDR)
Network Sandbox
Security Awareness
Security Information and Event Management (SIEM)
Security Threat Intelligence Products and Services (TIP)
All solutions
Industrial Cyber Security (ICS)
All solutions
Unified communications (UC) and Group Video Systems
All solutions
Operating Systems
Server Virtualization Infrastructure (SVI)
All solutions
Database Management System (DBMS)
All solutions
Secure Web Gateways (SWG, Proxy)
All solutions
User Authentification (AU)
All solutions
Thin clients
All solutions
Cryptographic information protection facilities (CIPF)
All solutions
Firewall or Unified Threat Management (FW, UTM)
SD-WAN - Software-Defined Wide Area Network
Virtual Private Network (VPN)
All solutions
High-tech equipment to protect airspace from drones
All solutions
Contacts Vendors
Events & Specials
Solutions
["Information Security (Информационная безопасность)"]
["Information Security (Информационная безопасность)","Решения для сервис-провайдеров"]
["Infrastructure (Инфраструктура)"]
["Infrastructure (Инфраструктура)","Облачные сервисы"]
["Infrastructure (Инфраструктура)","Решения для сервис-провайдеров"]
Access control and endpoint security
Anti-APT
APCS protection
Business Productivity
Computing and network infrastructure
Data management
Network Infrastructure Protection
More
Access control and endpoint security
Computing and network infrastructure
Data protection
Network Infrastructure Protection
Физическая безопасность
More
DevSecOps
Social networks
Back
Access control and endpoint security
E-mail Security
Endpoint Protection Platform (EPP)
Server Protection Platform, Virtualization Platform Security (VPS & SPP)
All solutions
Anti-APT
Extended Detection and Response (XDR)
Managed Detection and Response (MDR)
Network Sandbox
Security Awareness
Security Information and Event Management (SIEM)
Security Threat Intelligence Products and Services (TIP)
All solutions
APCS protection
Industrial Cyber Security (ICS)
All solutions
Business Productivity
Unified communications (UC) and Group Video Systems
All solutions
Computing and network infrastructure
Operating Systems
Server Virtualization Infrastructure (SVI)
All solutions
Data management
Database Management System (DBMS)
All solutions
Network Infrastructure Protection
Secure Web Gateways (SWG, Proxy)
All solutions
Access control and endpoint security
User Authentification (AU)
All solutions
Computing and network infrastructure
Thin clients
All solutions
Data protection
Cryptographic information protection facilities (CIPF)
All solutions
Network Infrastructure Protection
Firewall or Unified Threat Management (FW, UTM)
SD-WAN - Software-Defined Wide Area Network
Virtual Private Network (VPN)
All solutions
Физическая безопасность
High-tech equipment to protect airspace from drones
All solutions
+(994)50-400-11-22
Write to us
Become a partner
  • Software
  • ["Information Security (Информационная безопасность)"]
  • ["Information Security (Информационная безопасность)","Решения для сервис-провайдеров"]
  • ["Infrastructure (Инфраструктура)"]
  • ["Infrastructure (Инфраструктура)","Облачные сервисы"]
  • ["Infrastructure (Инфраструктура)","Решения для сервис-провайдеров"]
  • XaaS
  • Access control and endpoint security
  • Anti-APT
  • APCS protection
  • More
  • Hardware
  • Access control and endpoint security
  • Computing and network infrastructure
  • Data protection
  • More
DevSecOps
All solutions

CryptoPro HSM

"CryptoPro HSM" is a hardware and software cryptographic module compatible with "CryptoPro CSP". "CryptoPro HSM" provides a cryptographic service to corporate network users and allows creating and verifying an electronic digital signature, calculating a hash function, encrypting and decrypting data blocks, calculating simulated insertion of data blocks, generating and secure storage of key information (all keys are encrypted) , user account management of the cryptographic service.

Cryptographic algorithms implemented by PACM "CryptoPro HSM":

  • generation of keys used in algorithms GOST 28147-89, GOST R 34.10-94, GOST R 34.10-2001, RSA;
  • encryption and decryption of data according to GOST 28147-89;
  • data integrity control by calculating the simulation insert according to GOST 28147-89;
  • calculation of the hash function value in accordance with GOST R 34.11-94;
  • calculation and verification of electronic digital signature (EDS) in accordance with GOST R 34.10-94, GOST R 34.10-2001, RSA;
  • generation of the Diffie-Hellman pairing key based on the keys according to the algorithms GOST R 34.10-94, GOST R 34.10-2001.

The interface for interaction with CryptoPro HSM is Microsoft CryptoAPI 2.0.

Need a quote, demo or consultation?

Leave a request and we will contact you
Fill in the form

Other solutions

КриптоПро Архив

The software complex "CryptoPro Archive" is designed to ensure long-term storage of documents signed with an electronic signature.

КриптоПро .NET

CryptoPro .NET is a software product that allows you to use the cryptographic information protection tool CryptoPro CSP on the Microsoft .NET Framework. CryptoPro .NET is a new version of the previously existing CryptoPro Sharpei software product and implements a set of interfaces for accessing .NET Cryptographic Provider cryptographic operations

КриптоПро NGate

CryptoPro NGate is a high-performance VPN gateway based on the TLS protocol. CryptoPro NGate enables administrators to organize a protected remote user access to corporate resources via insecure networks (e. g. the Internet).

CryptoPro JCP / JCP 2.0

CryptoPro JCP is a cryptographic information protection tool that implements Russian cryptographic standards and was developed in accordance with the JCA (Java Cryptography Architecture) specification. CryptoPro JCP integration with Java architecture allows using standard procedures, such as creation and verification of EDS (including XMLdsig), encryption, key generation, calculation of authentication codes (Message Authentication Code - MAC) in Java Cryptography Extension (JCE) in accordance with specifications on various operating systems and hardware platforms.

CryptoPro CSP

"CryptoPro CSP" has a certificate of compliance of the FSB of Russia and can be used to generate encryption keys and electronic digital signature keys, encrypt and imitate protection of data, ensure the integrity and authenticity of information that does not contain information constituting a state secret. CryptoPro CSP includes an operating system kernel level module (cryptodriver), which allows using the basic cryptographic functions (encryption, decryption, signature verification, hashing) at the operating system kernel level. The cryptodriver is primarily intended for use in special applications (encoders of the IP protocol, file system, etc.).

By using our site, you agree to the use of cookies and services for collecting technical data of visitors (IP addresses, locations, etc.) to ensure performance and improve the quality of service. More