TSTP Solution File: SWV234+1 by Drodi---3.6.0
View Problem
- Process Solution
%------------------------------------------------------------------------------
% File : Drodi---3.6.0
% Problem : SWV234+1 : TPTP v8.1.2. Released v3.2.0.
% Transfm : none
% Format : tptp:raw
% Command : drodi -learnfrom(drodi.lrn) -timeout(%d) %s
% Computer : n020.cluster.edu
% Model : x86_64 x86_64
% CPU : Intel(R) Xeon(R) CPU E5-2620 v4 2.10GHz
% Memory : 8042.1875MB
% OS : Linux 3.10.0-693.el7.x86_64
% CPULimit : 300s
% WCLimit : 300s
% DateTime : Tue Apr 30 20:46:18 EDT 2024
% Result : Theorem 276.70s 35.22s
% Output : CNFRefutation 277.70s
% Verified :
% SZS Type : Refutation
% Derivation depth : 15
% Number of leaves : 24
% Syntax : Number of formulae : 102 ( 42 unt; 0 def)
% Number of atoms : 192 ( 18 equ)
% Maximal formula atoms : 4 ( 1 avg)
% Number of connectives : 164 ( 74 ~; 74 |; 6 &)
% ( 6 <=>; 4 =>; 0 <=; 0 <~>)
% Maximal formula depth : 10 ( 3 avg)
% Maximal term depth : 6 ( 2 avg)
% Number of predicates : 9 ( 7 usr; 7 prp; 0-2 aty)
% Number of functors : 13 ( 13 usr; 10 con; 0-2 aty)
% Number of variables : 90 ( 90 !; 0 ?)
% Comments :
%------------------------------------------------------------------------------
fof(f1,axiom,
! [X1,X2] : xor(X1,X2) = xor(X2,X1),
file('/export/starexec/sandbox/benchmark/theBenchmark.p') ).
fof(f2,axiom,
! [X1,X2,X3] : xor(X1,xor(X2,X3)) = xor(xor(X1,X2),X3),
file('/export/starexec/sandbox/benchmark/theBenchmark.p') ).
fof(f3,axiom,
! [X1,X2] : decrypt(X1,crypt(X1,X2)) = X2,
file('/export/starexec/sandbox/benchmark/theBenchmark.p') ).
fof(f4,axiom,
! [X1] : xor(X1,id) = X1,
file('/export/starexec/sandbox/benchmark/theBenchmark.p') ).
fof(f5,axiom,
! [X1] : xor(X1,X1) = id,
file('/export/starexec/sandbox/benchmark/theBenchmark.p') ).
fof(f6,axiom,
! [Xkek1,Xtype1,Xk1,Xtype2,Xkek2] :
( ( p(crypt(xor(Xkek1,Xtype1),Xk1))
& p(Xtype2)
& p(crypt(xor(km,imp),Xkek2)) )
=> p(crypt(xor(km,Xtype2),decrypt(xor(Xkek2,Xtype2),crypt(xor(Xkek1,Xtype1),Xk1)))) ),
file('/export/starexec/sandbox/benchmark/theBenchmark.p') ).
fof(f10,axiom,
! [Xk1,Xtype,Xk2] :
( ( p(Xk1)
& p(crypt(xor(km,xor(Xtype,kp)),Xk2))
& p(Xtype) )
=> p(crypt(xor(km,Xtype),xor(Xk2,Xk1))) ),
file('/export/starexec/sandbox/benchmark/theBenchmark.p') ).
fof(f11,axiom,
! [X1,Xk1] :
( ( p(X1)
& p(crypt(xor(km,data),Xk1)) )
=> p(crypt(Xk1,X1)) ),
file('/export/starexec/sandbox/benchmark/theBenchmark.p') ).
fof(f14,axiom,
! [X1,X2] :
( ( p(X1)
& p(X2) )
=> p(xor(X1,X2)) ),
file('/export/starexec/sandbox/benchmark/theBenchmark.p') ).
fof(f17,axiom,
p(kp),
file('/export/starexec/sandbox/benchmark/theBenchmark.p') ).
fof(f18,axiom,
p(imp),
file('/export/starexec/sandbox/benchmark/theBenchmark.p') ).
fof(f19,axiom,
p(data),
file('/export/starexec/sandbox/benchmark/theBenchmark.p') ).
fof(f21,axiom,
p(pin),
file('/export/starexec/sandbox/benchmark/theBenchmark.p') ).
fof(f22,axiom,
p(crypt(xor(kek,pin),pp)),
file('/export/starexec/sandbox/benchmark/theBenchmark.p') ).
fof(f23,axiom,
p(a),
file('/export/starexec/sandbox/benchmark/theBenchmark.p') ).
fof(f24,axiom,
p(k3),
file('/export/starexec/sandbox/benchmark/theBenchmark.p') ).
fof(f25,axiom,
p(crypt(xor(km,xor(kp,imp)),xor(kek,k3))),
file('/export/starexec/sandbox/benchmark/theBenchmark.p') ).
fof(f26,conjecture,
p(crypt(pp,a)),
file('/export/starexec/sandbox/benchmark/theBenchmark.p') ).
fof(f27,negated_conjecture,
~ p(crypt(pp,a)),
inference(negated_conjecture,[status(cth)],[f26]) ).
fof(f28,plain,
! [X0,X1] : xor(X0,X1) = xor(X1,X0),
inference(cnf_transformation,[status(esa)],[f1]) ).
fof(f29,plain,
! [X0,X1,X2] : xor(X0,xor(X1,X2)) = xor(xor(X0,X1),X2),
inference(cnf_transformation,[status(esa)],[f2]) ).
fof(f30,plain,
! [X0,X1] : decrypt(X0,crypt(X0,X1)) = X1,
inference(cnf_transformation,[status(esa)],[f3]) ).
fof(f31,plain,
! [X0] : xor(X0,id) = X0,
inference(cnf_transformation,[status(esa)],[f4]) ).
fof(f32,plain,
! [X0] : xor(X0,X0) = id,
inference(cnf_transformation,[status(esa)],[f5]) ).
fof(f33,plain,
! [Xkek1,Xtype1,Xk1,Xtype2,Xkek2] :
( ~ p(crypt(xor(Xkek1,Xtype1),Xk1))
| ~ p(Xtype2)
| ~ p(crypt(xor(km,imp),Xkek2))
| p(crypt(xor(km,Xtype2),decrypt(xor(Xkek2,Xtype2),crypt(xor(Xkek1,Xtype1),Xk1)))) ),
inference(pre_NNF_transformation,[status(esa)],[f6]) ).
fof(f34,plain,
! [X0,X1,X2,X3,X4] :
( ~ p(crypt(xor(X0,X1),X2))
| ~ p(X3)
| ~ p(crypt(xor(km,imp),X4))
| p(crypt(xor(km,X3),decrypt(xor(X4,X3),crypt(xor(X0,X1),X2)))) ),
inference(cnf_transformation,[status(esa)],[f33]) ).
fof(f41,plain,
! [Xk1,Xtype,Xk2] :
( ~ p(Xk1)
| ~ p(crypt(xor(km,xor(Xtype,kp)),Xk2))
| ~ p(Xtype)
| p(crypt(xor(km,Xtype),xor(Xk2,Xk1))) ),
inference(pre_NNF_transformation,[status(esa)],[f10]) ).
fof(f42,plain,
! [X0,X1,X2] :
( ~ p(X0)
| ~ p(crypt(xor(km,xor(X1,kp)),X2))
| ~ p(X1)
| p(crypt(xor(km,X1),xor(X2,X0))) ),
inference(cnf_transformation,[status(esa)],[f41]) ).
fof(f43,plain,
! [X1,Xk1] :
( ~ p(X1)
| ~ p(crypt(xor(km,data),Xk1))
| p(crypt(Xk1,X1)) ),
inference(pre_NNF_transformation,[status(esa)],[f11]) ).
fof(f44,plain,
! [X0,X1] :
( ~ p(X0)
| ~ p(crypt(xor(km,data),X1))
| p(crypt(X1,X0)) ),
inference(cnf_transformation,[status(esa)],[f43]) ).
fof(f50,plain,
! [X1,X2] :
( ~ p(X1)
| ~ p(X2)
| p(xor(X1,X2)) ),
inference(pre_NNF_transformation,[status(esa)],[f14]) ).
fof(f51,plain,
! [X0,X1] :
( ~ p(X0)
| ~ p(X1)
| p(xor(X0,X1)) ),
inference(cnf_transformation,[status(esa)],[f50]) ).
fof(f57,plain,
p(kp),
inference(cnf_transformation,[status(esa)],[f17]) ).
fof(f58,plain,
p(imp),
inference(cnf_transformation,[status(esa)],[f18]) ).
fof(f59,plain,
p(data),
inference(cnf_transformation,[status(esa)],[f19]) ).
fof(f61,plain,
p(pin),
inference(cnf_transformation,[status(esa)],[f21]) ).
fof(f62,plain,
p(crypt(xor(kek,pin),pp)),
inference(cnf_transformation,[status(esa)],[f22]) ).
fof(f63,plain,
p(a),
inference(cnf_transformation,[status(esa)],[f23]) ).
fof(f64,plain,
p(k3),
inference(cnf_transformation,[status(esa)],[f24]) ).
fof(f65,plain,
p(crypt(xor(km,xor(kp,imp)),xor(kek,k3))),
inference(cnf_transformation,[status(esa)],[f25]) ).
fof(f66,plain,
~ p(crypt(pp,a)),
inference(cnf_transformation,[status(esa)],[f27]) ).
fof(f175,plain,
! [X0] : X0 = xor(id,X0),
inference(paramodulation,[status(thm)],[f31,f28]) ).
fof(f220,plain,
! [X0,X1,X2] : xor(X0,xor(X1,X2)) = xor(X2,xor(X0,X1)),
inference(paramodulation,[status(thm)],[f28,f29]) ).
fof(f228,plain,
! [X0,X1,X2] : xor(X0,xor(X1,X2)) = xor(xor(X1,X0),X2),
inference(paramodulation,[status(thm)],[f28,f29]) ).
fof(f229,plain,
! [X0,X1,X2] : xor(X0,xor(X1,X2)) = xor(X1,xor(X0,X2)),
inference(forward_demodulation,[status(thm)],[f29,f228]) ).
fof(f232,plain,
! [X0,X1] : xor(X0,xor(X0,X1)) = xor(id,X1),
inference(paramodulation,[status(thm)],[f32,f29]) ).
fof(f233,plain,
! [X0,X1] : xor(X0,xor(X0,X1)) = X1,
inference(forward_demodulation,[status(thm)],[f175,f232]) ).
fof(f239,plain,
! [X0,X1] :
( ~ p(X0)
| ~ p(crypt(xor(km,imp),X1))
| p(crypt(xor(km,X0),decrypt(xor(X1,X0),crypt(xor(kek,pin),pp)))) ),
inference(resolution,[status(thm)],[f34,f62]) ).
fof(f240,plain,
! [X0,X1] :
( ~ p(X0)
| ~ p(crypt(xor(km,imp),X1))
| p(crypt(xor(km,X0),decrypt(xor(X1,X0),crypt(xor(pin,kek),pp)))) ),
inference(forward_demodulation,[status(thm)],[f28,f239]) ).
fof(f620,plain,
! [X0] :
( ~ p(crypt(xor(km,imp),X0))
| p(crypt(xor(km,data),decrypt(xor(X0,data),crypt(xor(pin,kek),pp)))) ),
inference(resolution,[status(thm)],[f240,f59]) ).
fof(f746,plain,
( spl0_19
<=> p(kp) ),
introduced(split_symbol_definition) ).
fof(f747,plain,
( p(kp)
| ~ spl0_19 ),
inference(component_clause,[status(thm)],[f746]) ).
fof(f748,plain,
( ~ p(kp)
| spl0_19 ),
inference(component_clause,[status(thm)],[f746]) ).
fof(f1112,plain,
! [X0,X1] : xor(X0,xor(X1,X0)) = X1,
inference(paramodulation,[status(thm)],[f28,f233]) ).
fof(f1250,plain,
! [X0,X1,X2] : xor(X0,xor(X1,X2)) = xor(X0,xor(X2,X1)),
inference(paramodulation,[status(thm)],[f220,f229]) ).
fof(f1713,plain,
! [X0,X1] :
( ~ p(crypt(xor(km,xor(X0,kp)),X1))
| ~ p(X0)
| p(crypt(xor(km,X0),xor(X1,pin))) ),
inference(resolution,[status(thm)],[f42,f61]) ).
fof(f1716,plain,
! [X0,X1] :
( ~ p(crypt(xor(km,xor(X0,kp)),X1))
| ~ p(X0)
| p(crypt(xor(km,X0),xor(X1,data))) ),
inference(resolution,[status(thm)],[f42,f59]) ).
fof(f1823,plain,
! [X0] :
( ~ p(crypt(xor(km,data),X0))
| p(crypt(X0,a)) ),
inference(resolution,[status(thm)],[f44,f63]) ).
fof(f5160,plain,
p(crypt(xor(km,xor(imp,kp)),xor(kek,k3))),
inference(forward_demodulation,[status(thm)],[f1250,f65]) ).
fof(f5161,plain,
( spl0_79
<=> p(imp) ),
introduced(split_symbol_definition) ).
fof(f5163,plain,
( ~ p(imp)
| spl0_79 ),
inference(component_clause,[status(thm)],[f5161]) ).
fof(f5184,plain,
( spl0_84
<=> p(xor(imp,kp)) ),
introduced(split_symbol_definition) ).
fof(f5186,plain,
( ~ p(xor(imp,kp))
| spl0_84 ),
inference(component_clause,[status(thm)],[f5184]) ).
fof(f5545,plain,
( $false
| spl0_19 ),
inference(forward_subsumption_resolution,[status(thm)],[f57,f748]) ).
fof(f5546,plain,
spl0_19,
inference(contradiction_clause,[status(thm)],[f5545]) ).
fof(f5570,plain,
! [X0] :
( ~ p(X0)
| p(xor(imp,X0)) ),
inference(resolution,[status(thm)],[f58,f51]) ).
fof(f5608,plain,
! [X0,X1] :
( ~ p(crypt(xor(km,xor(X0,kp)),X1))
| ~ p(X0)
| p(crypt(xor(km,X0),xor(X1,k3))) ),
inference(resolution,[status(thm)],[f64,f42]) ).
fof(f5835,plain,
( $false
| spl0_79 ),
inference(forward_subsumption_resolution,[status(thm)],[f5163,f58]) ).
fof(f5836,plain,
spl0_79,
inference(contradiction_clause,[status(thm)],[f5835]) ).
fof(f10657,plain,
! [X0,X1] :
( ~ p(crypt(xor(km,xor(kp,X0)),X1))
| ~ p(X0)
| p(crypt(xor(km,X0),xor(X1,pin))) ),
inference(paramodulation,[status(thm)],[f1250,f1713]) ).
fof(f10754,plain,
( spl0_194
<=> p(crypt(xor(km,imp),xor(xor(kek,k3),k3))) ),
introduced(split_symbol_definition) ).
fof(f10755,plain,
( p(crypt(xor(km,imp),xor(xor(kek,k3),k3)))
| ~ spl0_194 ),
inference(component_clause,[status(thm)],[f10754]) ).
fof(f10757,plain,
( ~ p(imp)
| p(crypt(xor(km,imp),xor(xor(kek,k3),k3))) ),
inference(resolution,[status(thm)],[f5608,f5160]) ).
fof(f10758,plain,
( ~ spl0_79
| spl0_194 ),
inference(split_clause,[status(thm)],[f10757,f5161,f10754]) ).
fof(f10785,plain,
( p(crypt(xor(km,imp),xor(kek,xor(k3,k3))))
| ~ spl0_194 ),
inference(forward_demodulation,[status(thm)],[f29,f10755]) ).
fof(f10786,plain,
( p(crypt(xor(km,imp),xor(kek,id)))
| ~ spl0_194 ),
inference(forward_demodulation,[status(thm)],[f32,f10785]) ).
fof(f10787,plain,
( p(crypt(xor(km,imp),kek))
| ~ spl0_194 ),
inference(forward_demodulation,[status(thm)],[f31,f10786]) ).
fof(f10857,plain,
! [X0,X1] :
( ~ p(crypt(xor(km,X0),X1))
| ~ p(xor(X0,kp))
| p(crypt(xor(km,xor(X0,kp)),xor(X1,pin))) ),
inference(paramodulation,[status(thm)],[f1112,f10657]) ).
fof(f29368,plain,
( spl0_1184
<=> p(crypt(xor(km,xor(imp,kp)),xor(kek,pin))) ),
introduced(split_symbol_definition) ).
fof(f29369,plain,
( p(crypt(xor(km,xor(imp,kp)),xor(kek,pin)))
| ~ spl0_1184 ),
inference(component_clause,[status(thm)],[f29368]) ).
fof(f29371,plain,
( ~ p(xor(imp,kp))
| p(crypt(xor(km,xor(imp,kp)),xor(kek,pin)))
| ~ spl0_194 ),
inference(resolution,[status(thm)],[f10857,f10787]) ).
fof(f29372,plain,
( ~ spl0_84
| spl0_1184
| ~ spl0_194 ),
inference(split_clause,[status(thm)],[f29371,f5184,f29368,f10754]) ).
fof(f57285,plain,
( p(xor(imp,kp))
| ~ spl0_19 ),
inference(resolution,[status(thm)],[f5570,f747]) ).
fof(f57286,plain,
( $false
| spl0_84
| ~ spl0_19 ),
inference(forward_subsumption_resolution,[status(thm)],[f57285,f5186]) ).
fof(f57287,plain,
( spl0_84
| ~ spl0_19 ),
inference(contradiction_clause,[status(thm)],[f57286]) ).
fof(f57905,plain,
( p(crypt(xor(km,xor(imp,kp)),xor(pin,kek)))
| ~ spl0_1184 ),
inference(forward_demodulation,[status(thm)],[f28,f29369]) ).
fof(f60089,plain,
( spl0_1989
<=> p(crypt(xor(km,imp),xor(xor(pin,kek),data))) ),
introduced(split_symbol_definition) ).
fof(f60090,plain,
( p(crypt(xor(km,imp),xor(xor(pin,kek),data)))
| ~ spl0_1989 ),
inference(component_clause,[status(thm)],[f60089]) ).
fof(f60092,plain,
( ~ p(imp)
| p(crypt(xor(km,imp),xor(xor(pin,kek),data)))
| ~ spl0_1184 ),
inference(resolution,[status(thm)],[f57905,f1716]) ).
fof(f60093,plain,
( ~ spl0_79
| spl0_1989
| ~ spl0_1184 ),
inference(split_clause,[status(thm)],[f60092,f5161,f60089,f29368]) ).
fof(f60238,plain,
( p(crypt(xor(km,imp),xor(pin,xor(kek,data))))
| ~ spl0_1989 ),
inference(forward_demodulation,[status(thm)],[f29,f60090]) ).
fof(f60239,plain,
( p(crypt(xor(km,imp),xor(pin,xor(data,kek))))
| ~ spl0_1989 ),
inference(forward_demodulation,[status(thm)],[f1250,f60238]) ).
fof(f60240,plain,
( p(crypt(xor(km,imp),xor(data,xor(pin,kek))))
| ~ spl0_1989 ),
inference(forward_demodulation,[status(thm)],[f229,f60239]) ).
fof(f65650,plain,
( p(crypt(xor(km,data),decrypt(xor(xor(data,xor(pin,kek)),data),crypt(xor(pin,kek),pp))))
| ~ spl0_1989 ),
inference(resolution,[status(thm)],[f60240,f620]) ).
fof(f65651,plain,
( p(crypt(xor(km,data),decrypt(xor(data,xor(xor(pin,kek),data)),crypt(xor(pin,kek),pp))))
| ~ spl0_1989 ),
inference(forward_demodulation,[status(thm)],[f29,f65650]) ).
fof(f65652,plain,
( p(crypt(xor(km,data),decrypt(xor(data,xor(data,xor(pin,kek))),crypt(xor(pin,kek),pp))))
| ~ spl0_1989 ),
inference(forward_demodulation,[status(thm)],[f1250,f65651]) ).
fof(f65653,plain,
( p(crypt(xor(km,data),decrypt(xor(pin,kek),crypt(xor(pin,kek),pp))))
| ~ spl0_1989 ),
inference(forward_demodulation,[status(thm)],[f233,f65652]) ).
fof(f65654,plain,
( p(crypt(xor(km,data),pp))
| ~ spl0_1989 ),
inference(forward_demodulation,[status(thm)],[f30,f65653]) ).
fof(f65802,plain,
( p(crypt(pp,a))
| ~ spl0_1989 ),
inference(resolution,[status(thm)],[f65654,f1823]) ).
fof(f65803,plain,
( $false
| ~ spl0_1989 ),
inference(forward_subsumption_resolution,[status(thm)],[f65802,f66]) ).
fof(f65804,plain,
~ spl0_1989,
inference(contradiction_clause,[status(thm)],[f65803]) ).
fof(f65805,plain,
$false,
inference(sat_refutation,[status(thm)],[f5546,f5836,f10758,f29372,f57287,f60093,f65804]) ).
%------------------------------------------------------------------------------
%----ORIGINAL SYSTEM OUTPUT
% 0.07/0.13 % Problem : SWV234+1 : TPTP v8.1.2. Released v3.2.0.
% 0.07/0.14 % Command : drodi -learnfrom(drodi.lrn) -timeout(%d) %s
% 0.13/0.35 % Computer : n020.cluster.edu
% 0.13/0.35 % Model : x86_64 x86_64
% 0.13/0.35 % CPU : Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz
% 0.13/0.35 % Memory : 8042.1875MB
% 0.13/0.35 % OS : Linux 3.10.0-693.el7.x86_64
% 0.13/0.35 % CPULimit : 300
% 0.13/0.35 % WCLimit : 300
% 0.13/0.35 % DateTime : Tue Apr 30 00:40:17 EDT 2024
% 0.13/0.35 % CPUTime :
% 0.13/0.36 % Drodi V3.6.0
% 276.70/35.22 % Refutation found
% 276.70/35.22 % SZS status Theorem for theBenchmark: Theorem is valid
% 276.70/35.22 % SZS output start CNFRefutation for theBenchmark
% See solution above
% 279.60/36.54 % Elapsed time: 35.965739 seconds
% 279.60/36.54 % CPU time: 269.281260 seconds
% 279.60/36.54 % Total memory used: 976.787 MB
% 279.60/36.54 % Net memory used: 938.312 MB
%------------------------------------------------------------------------------