Noise Explorer beta

Noise Explorer Command-Line Tool

The Noise Explorer command-line tool can parse Noise Handshake Patterns according to the original specification. It can generate cryptographic models for formal verification, including security queries, top-level processes and malicious principals, for testing against an active or passive attacker.

Noise Explorer can also render results from the ProVerif output into an elegant and easy to read HTML format: the pattern results that can be explored on this very website were generated using the Noise Explorer command-line tool.

			$> node noiseExplorer --help
			Noise Explorer version 0.3 (specification revision 34)
			Noise Explorer has three individual modes: generation, rendering and web interface.

			--generate=(json|pv|go|rs|wasm): Specify output format.
			--pattern=[file]: Specify input pattern file (required).
			--attacker=(active|passive): Specify ProVerif attacker type (default: active).

			--render: Render results from ProVerif output files into HTML.
			--pattern=[file]: Specify input pattern file (required).
			--activeModel=[file]: Specify ProVerif active attacker model.
			--activeResults=[file]: Specify active results file for --render (required).
			--passiveResults=[file]: Specify passive results file for --render (required).

			Web interface:
			--web=(port): Make Noise Explorer's web interface available at http://localhost:(port) (default: 8000).

			--help: View this help text.


All Noise Explorer software, including this website, is licensed under the GNU General Public License, Version 3.

Download Noise Explorer for your Computer

You are welcome to view the Noise Explorer code repository.