TSTP Solution File: SWV014-1 by Drodi---3.6.0

View Problem - Process Solution

%------------------------------------------------------------------------------
% File     : Drodi---3.6.0
% Problem  : SWV014-1 : TPTP v8.1.2. Released v2.4.0.
% Transfm  : none
% Format   : tptp:raw
% Command  : drodi -learnfrom(drodi.lrn) -timeout(%d) %s

% Computer : n032.cluster.edu
% Model    : x86_64 x86_64
% CPU      : Intel(R) Xeon(R) CPU E5-2620 v4 2.10GHz
% Memory   : 8042.1875MB
% OS       : Linux 3.10.0-693.el7.x86_64
% CPULimit : 300s
% WCLimit  : 300s
% DateTime : Tue Apr 30 20:45:46 EDT 2024

% Result   : Unsatisfiable 0.10s 0.35s
% Output   : CNFRefutation 0.10s
% Verified : 
% SZS Type : -

% Comments : 
%------------------------------------------------------------------------------
%----WARNING: Could not form TPTP format derivation
%------------------------------------------------------------------------------
%----ORIGINAL SYSTEM OUTPUT
% 0.07/0.11  % Problem  : SWV014-1 : TPTP v8.1.2. Released v2.4.0.
% 0.07/0.11  % Command  : drodi -learnfrom(drodi.lrn) -timeout(%d) %s
% 0.10/0.32  % Computer : n032.cluster.edu
% 0.10/0.32  % Model    : x86_64 x86_64
% 0.10/0.32  % CPU      : Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz
% 0.10/0.32  % Memory   : 8042.1875MB
% 0.10/0.32  % OS       : Linux 3.10.0-693.el7.x86_64
% 0.10/0.32  % CPULimit : 300
% 0.10/0.32  % WCLimit  : 300
% 0.10/0.32  % DateTime : Tue Apr 30 00:58:35 EDT 2024
% 0.10/0.32  % CPUTime  : 
% 0.10/0.33  % Drodi V3.6.0
% 0.10/0.35  % Refutation found
% 0.10/0.35  % SZS status Unsatisfiable for theBenchmark: Theory is unsatisfiable
% 0.10/0.35  % SZS output start CNFRefutation for theBenchmark
% 0.10/0.35  fof(f1,axiom,(
% 0.10/0.35    party_of_protocol(a) ),
% 0.10/0.35    file('/export/starexec/sandbox/benchmark/theBenchmark.p')).
% 0.10/0.35  fof(f2,axiom,(
% 0.10/0.35    message(sent(a,b,pair(a,an_a_nonce))) ),
% 0.10/0.35    file('/export/starexec/sandbox/benchmark/theBenchmark.p')).
% 0.10/0.35  fof(f5,axiom,(
% 0.10/0.35    party_of_protocol(b) ),
% 0.10/0.35    file('/export/starexec/sandbox/benchmark/theBenchmark.p')).
% 0.10/0.35  fof(f6,axiom,(
% 0.10/0.35    fresh_to_b(an_a_nonce) ),
% 0.10/0.35    file('/export/starexec/sandbox/benchmark/theBenchmark.p')).
% 0.10/0.35  fof(f7,axiom,(
% 0.10/0.35    (![B,A]: (( message(sent(b,t,triple(b,generate_b_nonce(B),encrypt(triple(A,B,generate_expiration_time(B)),bt))))| ~ fresh_to_b(B)| ~ message(sent(A,b,pair(A,B))) ) ))),
% 0.10/0.35    file('/export/starexec/sandbox/benchmark/theBenchmark.p')).
% 0.10/0.35  fof(f8,axiom,(
% 0.10/0.35    (![A,B]: (( b_stored(pair(A,B))| ~ fresh_to_b(B)| ~ message(sent(A,b,pair(A,B))) ) ))),
% 0.10/0.35    file('/export/starexec/sandbox/benchmark/theBenchmark.p')).
% 0.10/0.35  fof(f9,axiom,(
% 0.10/0.35    (![B,A,C]: (( b_holds(key(B,A))| ~ b_stored(pair(A,C))| ~ message(sent(A,b,pair(encrypt(triple(A,B,generate_expiration_time(C)),bt),encrypt(generate_b_nonce(C),B)))) ) ))),
% 0.10/0.35    file('/export/starexec/sandbox/benchmark/theBenchmark.p')).
% 0.10/0.35  fof(f10,axiom,(
% 0.10/0.35    t_holds(key(at,a)) ),
% 0.10/0.35    file('/export/starexec/sandbox/benchmark/theBenchmark.p')).
% 0.10/0.35  fof(f11,axiom,(
% 0.10/0.35    t_holds(key(bt,b)) ),
% 0.10/0.35    file('/export/starexec/sandbox/benchmark/theBenchmark.p')).
% 0.10/0.35  fof(f12,axiom,(
% 0.10/0.35    party_of_protocol(t) ),
% 0.10/0.35    file('/export/starexec/sandbox/benchmark/theBenchmark.p')).
% 0.10/0.35  fof(f13,axiom,(
% 0.10/0.35    (![C,A,D,E,G,F,B]: (( message(sent(t,C,triple(encrypt(quadruple(A,D,generate_key(D),E),G),encrypt(triple(C,generate_key(D),E),F),B)))| ~ a_nonce(D)| ~ message(sent(A,t,triple(A,B,encrypt(triple(C,D,E),F))))| ~ t_holds(key(G,C))| ~ t_holds(key(F,A)) ) ))),
% 0.10/0.35    file('/export/starexec/sandbox/benchmark/theBenchmark.p')).
% 0.10/0.35  fof(f14,axiom,(
% 0.10/0.35    (![C,A,B]: (( intruder_message(C)| ~ message(sent(A,B,C)) ) ))),
% 0.10/0.35    file('/export/starexec/sandbox/benchmark/theBenchmark.p')).
% 0.10/0.35  fof(f16,axiom,(
% 0.10/0.35    (![B,A]: (( intruder_message(B)| ~ intruder_message(pair(A,B)) ) ))),
% 0.10/0.35    file('/export/starexec/sandbox/benchmark/theBenchmark.p')).
% 0.10/0.35  fof(f19,axiom,(
% 0.10/0.35    (![C,A,B]: (( intruder_message(C)| ~ intruder_message(triple(A,B,C)) ) ))),
% 0.10/0.35    file('/export/starexec/sandbox/benchmark/theBenchmark.p')).
% 0.10/0.35  fof(f24,axiom,(
% 0.10/0.35    (![A,B]: (( intruder_message(pair(A,B))| ~ intruder_message(B)| ~ intruder_message(A) ) ))),
% 0.10/0.35    file('/export/starexec/sandbox/benchmark/theBenchmark.p')).
% 0.10/0.35  fof(f28,axiom,(
% 0.10/0.35    (![B,C,A]: (( message(sent(B,C,A))| ~ intruder_message(A)| ~ party_of_protocol(C)| ~ party_of_protocol(B) ) ))),
% 0.10/0.35    file('/export/starexec/sandbox/benchmark/theBenchmark.p')).
% 0.10/0.35  fof(f29,axiom,(
% 0.10/0.35    (![A,B]: (( intruder_holds(key(A,B))| ~ intruder_message(A)| ~ party_of_protocol(B) ) ))),
% 0.10/0.35    file('/export/starexec/sandbox/benchmark/theBenchmark.p')).
% 0.10/0.35  fof(f30,axiom,(
% 0.10/0.35    (![A,B,C]: (( intruder_message(encrypt(A,B))| ~ intruder_holds(key(B,C))| ~ intruder_message(A)| ~ party_of_protocol(C) ) ))),
% 0.10/0.35    file('/export/starexec/sandbox/benchmark/theBenchmark.p')).
% 0.10/0.35  fof(f31,axiom,(
% 0.10/0.35    a_nonce(an_a_nonce) ),
% 0.10/0.35    file('/export/starexec/sandbox/benchmark/theBenchmark.p')).
% 0.10/0.35  fof(f34,negated_conjecture,(
% 0.10/0.35    (![A]: (( ~ b_holds(key(A,a))| ~ intruder_holds(key(A,b)) ) ))),
% 0.10/0.35    file('/export/starexec/sandbox/benchmark/theBenchmark.p')).
% 0.10/0.35  fof(f35,plain,(
% 0.10/0.35    party_of_protocol(a)),
% 0.10/0.35    inference(cnf_transformation,[status(esa)],[f1])).
% 0.10/0.35  fof(f36,plain,(
% 0.10/0.35    message(sent(a,b,pair(a,an_a_nonce)))),
% 0.10/0.35    inference(cnf_transformation,[status(esa)],[f2])).
% 0.10/0.35  fof(f40,plain,(
% 0.10/0.35    party_of_protocol(b)),
% 0.10/0.35    inference(cnf_transformation,[status(esa)],[f5])).
% 0.10/0.35  fof(f41,plain,(
% 0.10/0.35    fresh_to_b(an_a_nonce)),
% 0.10/0.35    inference(cnf_transformation,[status(esa)],[f6])).
% 0.10/0.35  fof(f42,plain,(
% 0.10/0.35    ![X0,X1]: (message(sent(b,t,triple(b,generate_b_nonce(X0),encrypt(triple(X1,X0,generate_expiration_time(X0)),bt))))|~fresh_to_b(X0)|~message(sent(X1,b,pair(X1,X0))))),
% 0.10/0.35    inference(cnf_transformation,[status(esa)],[f7])).
% 0.10/0.35  fof(f43,plain,(
% 0.10/0.35    ![X0,X1]: (b_stored(pair(X0,X1))|~fresh_to_b(X1)|~message(sent(X0,b,pair(X0,X1))))),
% 0.10/0.35    inference(cnf_transformation,[status(esa)],[f8])).
% 0.10/0.35  fof(f44,plain,(
% 0.10/0.35    ![X0,X1,X2]: (b_holds(key(X0,X1))|~b_stored(pair(X1,X2))|~message(sent(X1,b,pair(encrypt(triple(X1,X0,generate_expiration_time(X2)),bt),encrypt(generate_b_nonce(X2),X0)))))),
% 0.10/0.35    inference(cnf_transformation,[status(esa)],[f9])).
% 0.10/0.35  fof(f45,plain,(
% 0.10/0.35    t_holds(key(at,a))),
% 0.10/0.35    inference(cnf_transformation,[status(esa)],[f10])).
% 0.10/0.35  fof(f46,plain,(
% 0.10/0.35    t_holds(key(bt,b))),
% 0.10/0.35    inference(cnf_transformation,[status(esa)],[f11])).
% 0.10/0.35  fof(f47,plain,(
% 0.10/0.35    party_of_protocol(t)),
% 0.10/0.35    inference(cnf_transformation,[status(esa)],[f12])).
% 0.10/0.35  fof(f48,plain,(
% 0.10/0.35    ![A,F]: ((![C,G]: ((![D,E,B]: ((message(sent(t,C,triple(encrypt(quadruple(A,D,generate_key(D),E),G),encrypt(triple(C,generate_key(D),E),F),B)))|~a_nonce(D))|~message(sent(A,t,triple(A,B,encrypt(triple(C,D,E),F))))))|~t_holds(key(G,C))))|~t_holds(key(F,A)))),
% 0.10/0.35    inference(miniscoping,[status(esa)],[f13])).
% 0.10/0.35  fof(f49,plain,(
% 0.10/0.35    ![X0,X1,X2,X3,X4,X5,X6]: (message(sent(t,X0,triple(encrypt(quadruple(X1,X2,generate_key(X2),X3),X4),encrypt(triple(X0,generate_key(X2),X3),X5),X6)))|~a_nonce(X2)|~message(sent(X1,t,triple(X1,X6,encrypt(triple(X0,X2,X3),X5))))|~t_holds(key(X4,X0))|~t_holds(key(X5,X1)))),
% 0.10/0.35    inference(cnf_transformation,[status(esa)],[f48])).
% 0.10/0.35  fof(f50,plain,(
% 0.10/0.35    ![C]: (intruder_message(C)|(![A,B]: ~message(sent(A,B,C))))),
% 0.10/0.35    inference(miniscoping,[status(esa)],[f14])).
% 0.10/0.35  fof(f51,plain,(
% 0.10/0.35    ![X0,X1,X2]: (intruder_message(X0)|~message(sent(X1,X2,X0)))),
% 0.10/0.35    inference(cnf_transformation,[status(esa)],[f50])).
% 0.10/0.35  fof(f54,plain,(
% 0.10/0.35    ![B]: (intruder_message(B)|(![A]: ~intruder_message(pair(A,B))))),
% 0.10/0.35    inference(miniscoping,[status(esa)],[f16])).
% 0.10/0.35  fof(f55,plain,(
% 0.10/0.35    ![X0,X1]: (intruder_message(X0)|~intruder_message(pair(X1,X0)))),
% 0.10/0.35    inference(cnf_transformation,[status(esa)],[f54])).
% 0.10/0.35  fof(f60,plain,(
% 0.10/0.35    ![C]: (intruder_message(C)|(![A,B]: ~intruder_message(triple(A,B,C))))),
% 0.10/0.35    inference(miniscoping,[status(esa)],[f19])).
% 0.10/0.35  fof(f61,plain,(
% 0.10/0.35    ![X0,X1,X2]: (intruder_message(X0)|~intruder_message(triple(X1,X2,X0)))),
% 0.10/0.35    inference(cnf_transformation,[status(esa)],[f60])).
% 0.10/0.35  fof(f70,plain,(
% 0.10/0.35    ![A]: ((![B]: (intruder_message(pair(A,B))|~intruder_message(B)))|~intruder_message(A))),
% 0.10/0.35    inference(miniscoping,[status(esa)],[f24])).
% 0.10/0.35  fof(f71,plain,(
% 0.10/0.35    ![X0,X1]: (intruder_message(pair(X0,X1))|~intruder_message(X1)|~intruder_message(X0))),
% 0.10/0.35    inference(cnf_transformation,[status(esa)],[f70])).
% 0.10/0.35  fof(f78,plain,(
% 0.10/0.35    ![B]: ((![C]: ((![A]: (message(sent(B,C,A))|~intruder_message(A)))|~party_of_protocol(C)))|~party_of_protocol(B))),
% 0.10/0.35    inference(miniscoping,[status(esa)],[f28])).
% 0.10/0.35  fof(f79,plain,(
% 0.10/0.35    ![X0,X1,X2]: (message(sent(X0,X1,X2))|~intruder_message(X2)|~party_of_protocol(X1)|~party_of_protocol(X0))),
% 0.10/0.35    inference(cnf_transformation,[status(esa)],[f78])).
% 0.10/0.35  fof(f80,plain,(
% 0.10/0.35    ![B]: ((![A]: (intruder_holds(key(A,B))|~intruder_message(A)))|~party_of_protocol(B))),
% 0.10/0.35    inference(miniscoping,[status(esa)],[f29])).
% 0.10/0.35  fof(f81,plain,(
% 0.10/0.35    ![X0,X1]: (intruder_holds(key(X0,X1))|~intruder_message(X0)|~party_of_protocol(X1))),
% 0.10/0.35    inference(cnf_transformation,[status(esa)],[f80])).
% 0.10/0.35  fof(f82,plain,(
% 0.10/0.35    ![C]: ((![A]: ((![B]: (intruder_message(encrypt(A,B))|~intruder_holds(key(B,C))))|~intruder_message(A)))|~party_of_protocol(C))),
% 0.10/0.35    inference(miniscoping,[status(esa)],[f30])).
% 0.10/0.35  fof(f83,plain,(
% 0.10/0.35    ![X0,X1,X2]: (intruder_message(encrypt(X0,X1))|~intruder_holds(key(X1,X2))|~intruder_message(X0)|~party_of_protocol(X2))),
% 0.10/0.35    inference(cnf_transformation,[status(esa)],[f82])).
% 0.10/0.35  fof(f84,plain,(
% 0.10/0.35    a_nonce(an_a_nonce)),
% 0.10/0.35    inference(cnf_transformation,[status(esa)],[f31])).
% 0.10/0.35  fof(f87,plain,(
% 0.10/0.35    ![X0]: (~b_holds(key(X0,a))|~intruder_holds(key(X0,b)))),
% 0.10/0.35    inference(cnf_transformation,[status(esa)],[f34])).
% 0.10/0.35  fof(f88,plain,(
% 0.10/0.35    intruder_message(pair(a,an_a_nonce))),
% 0.10/0.35    inference(resolution,[status(thm)],[f51,f36])).
% 0.10/0.35  fof(f89,plain,(
% 0.10/0.35    intruder_message(an_a_nonce)),
% 0.10/0.35    inference(resolution,[status(thm)],[f88,f55])).
% 0.10/0.35  fof(f92,plain,(
% 0.10/0.35    ![X0]: (intruder_holds(key(an_a_nonce,X0))|~party_of_protocol(X0))),
% 0.10/0.35    inference(resolution,[status(thm)],[f89,f81])).
% 0.10/0.35  fof(f94,plain,(
% 0.10/0.35    spl0_0 <=> party_of_protocol(b)),
% 0.10/0.35    introduced(split_symbol_definition)).
% 0.10/0.35  fof(f96,plain,(
% 0.10/0.35    ~party_of_protocol(b)|spl0_0),
% 0.10/0.36    inference(component_clause,[status(thm)],[f94])).
% 0.10/0.36  fof(f97,plain,(
% 0.10/0.36    spl0_1 <=> b_holds(key(an_a_nonce,a))),
% 0.10/0.36    introduced(split_symbol_definition)).
% 0.10/0.36  fof(f100,plain,(
% 0.10/0.36    ~party_of_protocol(b)|~b_holds(key(an_a_nonce,a))),
% 0.10/0.36    inference(resolution,[status(thm)],[f92,f87])).
% 0.10/0.36  fof(f101,plain,(
% 0.10/0.36    ~spl0_0|~spl0_1),
% 0.10/0.36    inference(split_clause,[status(thm)],[f100,f94,f97])).
% 0.10/0.36  fof(f102,plain,(
% 0.10/0.36    spl0_2 <=> ~party_of_protocol(X0)|~party_of_protocol(X0)),
% 0.10/0.36    introduced(split_symbol_definition)).
% 0.10/0.36  fof(f103,plain,(
% 0.10/0.36    ![X0]: (~party_of_protocol(X0)|~party_of_protocol(X0)|~spl0_2)),
% 0.10/0.36    inference(component_clause,[status(thm)],[f102])).
% 0.10/0.36  fof(f105,plain,(
% 0.10/0.36    spl0_3 <=> intruder_message(encrypt(X1,an_a_nonce))|~intruder_message(X1)),
% 0.10/0.36    introduced(split_symbol_definition)).
% 0.10/0.36  fof(f106,plain,(
% 0.10/0.36    ![X0]: (intruder_message(encrypt(X0,an_a_nonce))|~intruder_message(X0)|~spl0_3)),
% 0.10/0.36    inference(component_clause,[status(thm)],[f105])).
% 0.10/0.36  fof(f108,plain,(
% 0.10/0.36    ![X0,X1]: (~party_of_protocol(X0)|intruder_message(encrypt(X1,an_a_nonce))|~intruder_message(X1)|~party_of_protocol(X0))),
% 0.10/0.36    inference(resolution,[status(thm)],[f92,f83])).
% 0.10/0.36  fof(f109,plain,(
% 0.10/0.36    spl0_2|spl0_3),
% 0.10/0.36    inference(split_clause,[status(thm)],[f108,f102,f105])).
% 0.10/0.36  fof(f118,plain,(
% 0.10/0.36    $false|spl0_0),
% 0.10/0.36    inference(forward_subsumption_resolution,[status(thm)],[f96,f40])).
% 0.10/0.36  fof(f119,plain,(
% 0.10/0.36    spl0_0),
% 0.10/0.36    inference(contradiction_clause,[status(thm)],[f118])).
% 0.10/0.36  fof(f120,plain,(
% 0.10/0.36    ![X0]: (~party_of_protocol(X0)|~spl0_2)),
% 0.10/0.36    inference(duplicate_literals_removal,[status(esa)],[f103])).
% 0.10/0.36  fof(f150,plain,(
% 0.10/0.36    ![X0,X1]: (~fresh_to_b(X0)|~message(sent(X1,b,pair(X1,X0)))|intruder_message(triple(b,generate_b_nonce(X0),encrypt(triple(X1,X0,generate_expiration_time(X0)),bt))))),
% 0.10/0.36    inference(resolution,[status(thm)],[f42,f51])).
% 0.10/0.36  fof(f151,plain,(
% 0.10/0.36    spl0_12 <=> b_stored(pair(a,an_a_nonce))),
% 0.10/0.36    introduced(split_symbol_definition)).
% 0.10/0.36  fof(f152,plain,(
% 0.10/0.36    b_stored(pair(a,an_a_nonce))|~spl0_12),
% 0.10/0.36    inference(component_clause,[status(thm)],[f151])).
% 0.10/0.36  fof(f154,plain,(
% 0.10/0.36    spl0_13 <=> fresh_to_b(an_a_nonce)),
% 0.10/0.36    introduced(split_symbol_definition)).
% 0.10/0.36  fof(f156,plain,(
% 0.10/0.36    ~fresh_to_b(an_a_nonce)|spl0_13),
% 0.10/0.36    inference(component_clause,[status(thm)],[f154])).
% 0.10/0.36  fof(f157,plain,(
% 0.10/0.36    b_stored(pair(a,an_a_nonce))|~fresh_to_b(an_a_nonce)),
% 0.10/0.36    inference(resolution,[status(thm)],[f43,f36])).
% 0.10/0.36  fof(f158,plain,(
% 0.10/0.36    spl0_12|~spl0_13),
% 0.10/0.36    inference(split_clause,[status(thm)],[f157,f151,f154])).
% 0.10/0.36  fof(f159,plain,(
% 0.10/0.36    $false|spl0_13),
% 0.10/0.36    inference(forward_subsumption_resolution,[status(thm)],[f156,f41])).
% 0.10/0.36  fof(f160,plain,(
% 0.10/0.36    spl0_13),
% 0.10/0.36    inference(contradiction_clause,[status(thm)],[f159])).
% 0.10/0.36  fof(f161,plain,(
% 0.10/0.36    spl0_14 <=> message(sent(t,X0,triple(encrypt(quadruple(b,X1,generate_key(X1),generate_expiration_time(X1)),X2),encrypt(triple(X0,generate_key(X1),generate_expiration_time(X1)),bt),generate_b_nonce(X1))))|~a_nonce(X1)|~t_holds(key(X2,X0))|~fresh_to_b(X1)|~message(sent(X0,b,pair(X0,X1)))),
% 0.10/0.36    introduced(split_symbol_definition)).
% 0.10/0.36  fof(f162,plain,(
% 0.10/0.36    ![X0,X1,X2]: (message(sent(t,X0,triple(encrypt(quadruple(b,X1,generate_key(X1),generate_expiration_time(X1)),X2),encrypt(triple(X0,generate_key(X1),generate_expiration_time(X1)),bt),generate_b_nonce(X1))))|~a_nonce(X1)|~t_holds(key(X2,X0))|~fresh_to_b(X1)|~message(sent(X0,b,pair(X0,X1)))|~spl0_14)),
% 0.10/0.36    inference(component_clause,[status(thm)],[f161])).
% 0.10/0.36  fof(f164,plain,(
% 0.10/0.36    spl0_15 <=> t_holds(key(bt,b))),
% 0.10/0.36    introduced(split_symbol_definition)).
% 0.10/0.36  fof(f166,plain,(
% 0.10/0.36    ~t_holds(key(bt,b))|spl0_15),
% 0.10/0.36    inference(component_clause,[status(thm)],[f164])).
% 0.10/0.36  fof(f167,plain,(
% 0.10/0.36    ![X0,X1,X2]: (message(sent(t,X0,triple(encrypt(quadruple(b,X1,generate_key(X1),generate_expiration_time(X1)),X2),encrypt(triple(X0,generate_key(X1),generate_expiration_time(X1)),bt),generate_b_nonce(X1))))|~a_nonce(X1)|~t_holds(key(X2,X0))|~t_holds(key(bt,b))|~fresh_to_b(X1)|~message(sent(X0,b,pair(X0,X1))))),
% 0.10/0.36    inference(resolution,[status(thm)],[f49,f42])).
% 0.10/0.36  fof(f168,plain,(
% 0.10/0.36    spl0_14|~spl0_15),
% 0.10/0.36    inference(split_clause,[status(thm)],[f167,f161,f164])).
% 0.10/0.36  fof(f169,plain,(
% 0.10/0.36    $false|spl0_15),
% 0.10/0.36    inference(forward_subsumption_resolution,[status(thm)],[f166,f46])).
% 0.10/0.36  fof(f170,plain,(
% 0.10/0.36    spl0_15),
% 0.10/0.36    inference(contradiction_clause,[status(thm)],[f169])).
% 0.10/0.36  fof(f171,plain,(
% 0.10/0.36    $false|~spl0_2),
% 0.10/0.36    inference(backward_subsumption_resolution,[status(thm)],[f47,f120])).
% 0.10/0.36  fof(f172,plain,(
% 0.10/0.36    ~spl0_2),
% 0.10/0.36    inference(contradiction_clause,[status(thm)],[f171])).
% 0.10/0.36  fof(f173,plain,(
% 0.10/0.36    ![X0]: (b_holds(key(X0,a))|~message(sent(a,b,pair(encrypt(triple(a,X0,generate_expiration_time(an_a_nonce)),bt),encrypt(generate_b_nonce(an_a_nonce),X0))))|~spl0_12)),
% 0.10/0.36    inference(resolution,[status(thm)],[f152,f44])).
% 0.10/0.36  fof(f174,plain,(
% 0.10/0.36    spl0_16 <=> message(sent(t,a,triple(encrypt(quadruple(b,an_a_nonce,generate_key(an_a_nonce),generate_expiration_time(an_a_nonce)),X0),encrypt(triple(a,generate_key(an_a_nonce),generate_expiration_time(an_a_nonce)),bt),generate_b_nonce(an_a_nonce))))|~t_holds(key(X0,a))),
% 0.10/0.36    introduced(split_symbol_definition)).
% 0.10/0.36  fof(f175,plain,(
% 0.10/0.36    ![X0]: (message(sent(t,a,triple(encrypt(quadruple(b,an_a_nonce,generate_key(an_a_nonce),generate_expiration_time(an_a_nonce)),X0),encrypt(triple(a,generate_key(an_a_nonce),generate_expiration_time(an_a_nonce)),bt),generate_b_nonce(an_a_nonce))))|~t_holds(key(X0,a))|~spl0_16)),
% 0.10/0.36    inference(component_clause,[status(thm)],[f174])).
% 0.10/0.36  fof(f177,plain,(
% 0.10/0.36    spl0_17 <=> a_nonce(an_a_nonce)),
% 0.10/0.36    introduced(split_symbol_definition)).
% 0.10/0.36  fof(f179,plain,(
% 0.10/0.36    ~a_nonce(an_a_nonce)|spl0_17),
% 0.10/0.36    inference(component_clause,[status(thm)],[f177])).
% 0.10/0.36  fof(f180,plain,(
% 0.10/0.36    ![X0]: (message(sent(t,a,triple(encrypt(quadruple(b,an_a_nonce,generate_key(an_a_nonce),generate_expiration_time(an_a_nonce)),X0),encrypt(triple(a,generate_key(an_a_nonce),generate_expiration_time(an_a_nonce)),bt),generate_b_nonce(an_a_nonce))))|~a_nonce(an_a_nonce)|~t_holds(key(X0,a))|~fresh_to_b(an_a_nonce)|~spl0_14)),
% 0.10/0.36    inference(resolution,[status(thm)],[f162,f36])).
% 0.10/0.36  fof(f181,plain,(
% 0.10/0.36    spl0_16|~spl0_17|~spl0_13|~spl0_14),
% 0.10/0.36    inference(split_clause,[status(thm)],[f180,f174,f177,f154,f161])).
% 0.10/0.36  fof(f182,plain,(
% 0.10/0.36    $false|spl0_17),
% 0.10/0.36    inference(forward_subsumption_resolution,[status(thm)],[f179,f84])).
% 0.10/0.36  fof(f183,plain,(
% 0.10/0.36    spl0_17),
% 0.10/0.36    inference(contradiction_clause,[status(thm)],[f182])).
% 0.10/0.36  fof(f184,plain,(
% 0.10/0.36    message(sent(t,a,triple(encrypt(quadruple(b,an_a_nonce,generate_key(an_a_nonce),generate_expiration_time(an_a_nonce)),at),encrypt(triple(a,generate_key(an_a_nonce),generate_expiration_time(an_a_nonce)),bt),generate_b_nonce(an_a_nonce))))|~spl0_16),
% 0.10/0.36    inference(resolution,[status(thm)],[f175,f45])).
% 0.10/0.36  fof(f193,plain,(
% 0.10/0.36    intruder_message(triple(encrypt(quadruple(b,an_a_nonce,generate_key(an_a_nonce),generate_expiration_time(an_a_nonce)),at),encrypt(triple(a,generate_key(an_a_nonce),generate_expiration_time(an_a_nonce)),bt),generate_b_nonce(an_a_nonce)))|~spl0_16),
% 0.10/0.36    inference(resolution,[status(thm)],[f184,f51])).
% 0.10/0.36  fof(f200,plain,(
% 0.10/0.36    intruder_message(generate_b_nonce(an_a_nonce))|~spl0_16),
% 0.10/0.36    inference(resolution,[status(thm)],[f193,f61])).
% 0.10/0.36  fof(f292,plain,(
% 0.10/0.36    ![X0,X1]: (message(sent(X0,b,X1))|~intruder_message(X1)|~party_of_protocol(X0))),
% 0.10/0.36    inference(resolution,[status(thm)],[f40,f79])).
% 0.10/0.36  fof(f309,plain,(
% 0.10/0.36    ![X0]: (message(sent(a,b,X0))|~intruder_message(X0))),
% 0.10/0.36    inference(resolution,[status(thm)],[f292,f35])).
% 0.10/0.36  fof(f310,plain,(
% 0.10/0.36    ![X0]: (~intruder_message(pair(encrypt(triple(a,X0,generate_expiration_time(an_a_nonce)),bt),encrypt(generate_b_nonce(an_a_nonce),X0)))|b_holds(key(X0,a))|~spl0_12)),
% 0.10/0.36    inference(resolution,[status(thm)],[f309,f173])).
% 0.10/0.36  fof(f335,plain,(
% 0.10/0.36    ![X0]: (~message(sent(X0,b,pair(X0,an_a_nonce)))|intruder_message(triple(b,generate_b_nonce(an_a_nonce),encrypt(triple(X0,an_a_nonce,generate_expiration_time(an_a_nonce)),bt))))),
% 0.10/0.36    inference(resolution,[status(thm)],[f150,f41])).
% 0.10/0.36  fof(f336,plain,(
% 0.10/0.36    ![X0]: (~message(sent(X0,b,pair(X0,an_a_nonce)))|intruder_message(encrypt(triple(X0,an_a_nonce,generate_expiration_time(an_a_nonce)),bt)))),
% 0.10/0.36    inference(resolution,[status(thm)],[f335,f61])).
% 0.10/0.36  fof(f382,plain,(
% 0.10/0.36    ![X0]: (b_holds(key(X0,a))|~intruder_message(encrypt(generate_b_nonce(an_a_nonce),X0))|~intruder_message(encrypt(triple(a,X0,generate_expiration_time(an_a_nonce)),bt))|~spl0_12)),
% 0.10/0.36    inference(resolution,[status(thm)],[f310,f71])).
% 0.10/0.36  fof(f391,plain,(
% 0.10/0.36    spl0_45 <=> intruder_message(encrypt(generate_b_nonce(an_a_nonce),an_a_nonce))),
% 0.10/0.36    introduced(split_symbol_definition)).
% 0.10/0.36  fof(f393,plain,(
% 0.10/0.36    ~intruder_message(encrypt(generate_b_nonce(an_a_nonce),an_a_nonce))|spl0_45),
% 0.10/0.36    inference(component_clause,[status(thm)],[f391])).
% 0.10/0.36  fof(f394,plain,(
% 0.10/0.36    spl0_46 <=> message(sent(a,b,pair(a,an_a_nonce)))),
% 0.10/0.36    introduced(split_symbol_definition)).
% 0.10/0.36  fof(f396,plain,(
% 0.10/0.36    ~message(sent(a,b,pair(a,an_a_nonce)))|spl0_46),
% 0.10/0.36    inference(component_clause,[status(thm)],[f394])).
% 0.10/0.36  fof(f397,plain,(
% 0.10/0.36    b_holds(key(an_a_nonce,a))|~intruder_message(encrypt(generate_b_nonce(an_a_nonce),an_a_nonce))|~message(sent(a,b,pair(a,an_a_nonce)))|~spl0_12),
% 0.10/0.36    inference(resolution,[status(thm)],[f382,f336])).
% 0.10/0.36  fof(f398,plain,(
% 0.10/0.36    spl0_1|~spl0_45|~spl0_46|~spl0_12),
% 0.10/0.36    inference(split_clause,[status(thm)],[f397,f97,f391,f394,f151])).
% 0.10/0.36  fof(f409,plain,(
% 0.10/0.36    ~intruder_message(generate_b_nonce(an_a_nonce))|spl0_45|~spl0_3),
% 0.10/0.36    inference(resolution,[status(thm)],[f393,f106])).
% 0.10/0.36  fof(f410,plain,(
% 0.10/0.36    $false|~spl0_16|spl0_45|~spl0_3),
% 0.10/0.36    inference(forward_subsumption_resolution,[status(thm)],[f409,f200])).
% 0.10/0.36  fof(f411,plain,(
% 0.10/0.36    ~spl0_16|spl0_45|~spl0_3),
% 0.10/0.36    inference(contradiction_clause,[status(thm)],[f410])).
% 0.10/0.36  fof(f412,plain,(
% 0.10/0.36    $false|spl0_46),
% 0.10/0.36    inference(forward_subsumption_resolution,[status(thm)],[f396,f36])).
% 0.10/0.36  fof(f413,plain,(
% 0.10/0.36    spl0_46),
% 0.10/0.36    inference(contradiction_clause,[status(thm)],[f412])).
% 0.10/0.36  fof(f414,plain,(
% 0.10/0.36    $false),
% 0.10/0.36    inference(sat_refutation,[status(thm)],[f101,f109,f119,f158,f160,f168,f170,f172,f181,f183,f398,f411,f413])).
% 0.10/0.36  % SZS output end CNFRefutation for theBenchmark.p
% 0.10/0.36  % Elapsed time: 0.034485 seconds
% 0.10/0.36  % CPU time: 0.145412 seconds
% 0.10/0.36  % Total memory used: 27.591 MB
% 0.10/0.36  % Net memory used: 26.886 MB
%------------------------------------------------------------------------------