Noise Explorer beta

Noise Explorer Command-Line Tool

The Noise Explorer command-line tool can parse Noise Handshake Patterns according to the original specification. It can generate cryptographic models for formal verification, including security queries, top-level processes and malicious principals, for testing against an active or passive attacker.

Noise Explorer can also render results from the ProVerif output into an elegant and easy to read HTML format: the pattern results that can be explored on this very website were generated using the Noise Explorer command-line tool.

			$> node noiseExplorer --help
				Noise Explorer version 0.3 (specification revision 34)
				Noise Explorer can either generate models or render results, and the parameters
				for either must be invoked exclusively.
				Model generation:
				--generate=(proverif|json): Specify output format.
				--pattern=[file]: Specify input pattern file (required).
				--attacker=(active|passive): Specify attacker type (default: active).
				Results rendering:
				--render=(handshake|message): Render results from ProVerif output files into HTML.
				--pattern=[file]: Specify input pattern file (required).
				--activeModel=[file]: Specify ProVerif active attacker model (required for --render=message).
				--activeResults=[file]: Specify active results file for --render (required).
				--passiveResults=[file]: Specify passive results file for --render (required).

				--help: View this help text.


All Noise Explorer software, including this website, is licensed under the GNU General Public License, Version 3.

Download Noise Explorer for your Computer

The Noise Explorer command-line tool has the following requirements:

Note that symbolic verification with ProVerif can be very resource-intensive for more complex Noise Handshake Patterns, and can sometimes takes many hours before producing results.

Get source code