Answer the question
In order to leave comments, you need to log in
How does the ECP work?
Can someone explain in simple terms?
Purpose of the task: sign text messages, sign documents.
I have:
1) CRYPTO PRO CSP
2) CryptoPro Extension for CAdES Browser Plug-in
Can anyone tell me how the signature works and how to validate it on the server?
1) The browser plugin fills in the certificates in the system, we have a list of certificates
2) ...
3) ...
I'm Ivanov Ivan Petrovich and I have a text string, I generated a signature based on my certificate, as a result I have a long Base64 sequence of characters, as I understand it, is the signature.
What's next? how the server will understand that the signature is real? What do I need to send to the server?
If the string is more or less clear, then how to get the signature of the file in JS?
Answer the question
In order to leave comments, you need to log in
then how to get file signature on JS?
A crypto system is a rather complicated thing, it includes private keys and public keys signed by a trusted certifying authority. After applying the signature, you send the resulting file in which the information itself and the signature, or separately the information + the signature file, somewhere. On the receiving side, they remove the signature based on their private-public key pair (certificate) and by checking the list of reviews that the certification center publishes. To exchange information, exchange points must exchange their public keys, which are signed by this certification authority (these are certificates). Private keys should not leave the exchange points.
The browser plugin works with the crypto provider itself, and has its own API, you can do a lot of things with it, cpdn.cryptopro.ru/default.asp?url=content/cades/pl...download the library from the manufacturer and there you can figure out how it works.
To work, you need either a third-party CA, or deploy your own, install the CA root certificate in trusted on the server and client, issue 2 key certificates, for the server and for the client, install a client certificate on the server, install a server certificate on the client, and on the client personal store install your certificate.
Sign on the client, send the file to the server in any way, remove the signature there, get the source file. For all manipulations there is software from the manufacturer.
I explain.
I will say right away that I have no idea what CryptoPro is and why it is, but the electronic signature of, say, an email message looks like this:
- A certain CA that is trusted by both the sender and the recipient (this is a critical condition) issues a certificate to Ivanov Ivan Ferapontovich.
- Ivan Ferapontovich configures his mail program (eg Thunderbird) to sign all outgoing messages.
- Using his certificate key, Ivan Ferapontovich generates an electronic signature that does not protect the text of the letter from being read, but protectsfrom change. That is, if a change is made to the text of the letter, the signature will not match and a corresponding notification will appear. After that, the letter is sent
- The recipient checks the correctness of the letter using Ivan Ferapontovich's certificate, which can be transmitted along with the letter. If the signature matches, the recipient sees the "correct electronic signature" icon.
The most important thing here is that both the sender and the recipient trust the certificates used for the signature. If CryptoPro is some kind of state certificate, then it can be used to sign, at least to sign messages
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question