TSTP Solution File: SWV234-10 by Otter---3.3

View Problem - Process Solution

%------------------------------------------------------------------------------
% File     : Otter---3.3
% Problem  : SWV234-10 : TPTP v8.1.0. Released v7.5.0.
% Transfm  : none
% Format   : tptp:raw
% Command  : otter-tptp-script %s

% Computer : n020.cluster.edu
% Model    : x86_64 x86_64
% CPU      : Intel(R) Xeon(R) CPU E5-2620 v4 2.10GHz
% Memory   : 8042.1875MB
% OS       : Linux 3.10.0-693.el7.x86_64
% CPULimit : 300s
% WCLimit  : 300s
% DateTime : Wed Jul 27 13:20:15 EDT 2022

% Result   : Unknown 4.25s 4.40s
% Output   : None 
% Verified : 
% SZS Type : -

% Comments : 
%------------------------------------------------------------------------------
%----No solution output by system
%------------------------------------------------------------------------------
%----ORIGINAL SYSTEM OUTPUT
% 0.07/0.12  % Problem  : SWV234-10 : TPTP v8.1.0. Released v7.5.0.
% 0.07/0.13  % Command  : otter-tptp-script %s
% 0.13/0.34  % Computer : n020.cluster.edu
% 0.13/0.34  % Model    : x86_64 x86_64
% 0.13/0.34  % CPU      : Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz
% 0.13/0.34  % Memory   : 8042.1875MB
% 0.13/0.34  % OS       : Linux 3.10.0-693.el7.x86_64
% 0.13/0.34  % CPULimit : 300
% 0.13/0.34  % WCLimit  : 300
% 0.13/0.34  % DateTime : Wed Jul 27 05:59:38 EDT 2022
% 0.13/0.34  % CPUTime  : 
% 2.05/2.22  ----- Otter 3.3f, August 2004 -----
% 2.05/2.22  The process was started by sandbox on n020.cluster.edu,
% 2.05/2.22  Wed Jul 27 05:59:38 2022
% 2.05/2.22  The command was "./otter".  The process ID is 23397.
% 2.05/2.22  
% 2.05/2.22  set(prolog_style_variables).
% 2.05/2.22  set(auto).
% 2.05/2.22     dependent: set(auto1).
% 2.05/2.22     dependent: set(process_input).
% 2.05/2.22     dependent: clear(print_kept).
% 2.05/2.22     dependent: clear(print_new_demod).
% 2.05/2.22     dependent: clear(print_back_demod).
% 2.05/2.22     dependent: clear(print_back_sub).
% 2.05/2.22     dependent: set(control_memory).
% 2.05/2.22     dependent: assign(max_mem, 12000).
% 2.05/2.22     dependent: assign(pick_given_ratio, 4).
% 2.05/2.22     dependent: assign(stats_level, 1).
% 2.05/2.22     dependent: assign(max_seconds, 10800).
% 2.05/2.22  clear(print_given).
% 2.05/2.22  
% 2.05/2.22  list(usable).
% 2.05/2.22  0 [] A=A.
% 2.05/2.22  0 [] ife_q(A,A,B,C)=B.
% 2.05/2.22  0 [] xor(X1,X2)=xor(X2,X1).
% 2.05/2.22  0 [] xor(X1,xor(X2,X3))=xor(xor(X1,X2),X3).
% 2.05/2.22  0 [] decrypt(X1,crypt(X1,X2))=X2.
% 2.05/2.22  0 [] xor(X1,id)=X1.
% 2.05/2.22  0 [] xor(X1,X1)=id.
% 2.05/2.22  0 [] ife_q(p(crypt(xor(km,imp),Xkek2)),true,ife_q(p(crypt(xor(Xkek1,Xtype1),Xk1)),true,ife_q(p(Xtype2),true,p(crypt(xor(km,Xtype2),decrypt(xor(Xkek2,Xtype2),crypt(xor(Xkek1,Xtype1),Xk1)))),true),true),true)=true.
% 2.05/2.22  0 [] ife_q(p(crypt(xor(km,exp),Xkek1)),true,ife_q(p(crypt(xor(km,Xtype),Xk1)),true,ife_q(p(Xtype),true,p(crypt(xor(Xkek1,Xtype),Xk1)),true),true),true)=true.
% 2.05/2.22  0 [] ife_q(p(Xtype),true,ife_q(p(Xk),true,p(crypt(xor(km,xor(kp,Xtype)),Xk)),true),true)=true.
% 2.05/2.22  0 [] ife_q(p(crypt(xor(km,xor(kp,Xtype)),Xk2)),true,ife_q(p(Xtype),true,ife_q(p(Xk1),true,p(crypt(xor(km,xor(Xtype,kp)),xor(Xk1,Xk2))),true),true),true)=true.
% 2.05/2.22  0 [] ife_q(p(crypt(xor(km,xor(Xtype,kp)),Xk2)),true,ife_q(p(Xtype),true,ife_q(p(Xk1),true,p(crypt(xor(km,Xtype),xor(Xk2,Xk1))),true),true),true)=true.
% 2.05/2.22  0 [] ife_q(p(crypt(xor(km,data),Xk1)),true,ife_q(p(X1),true,p(crypt(Xk1,X1)),true),true)=true.
% 2.05/2.22  0 [] ife_q(p(crypt(xor(km,data),Xk1)),true,ife_q(p(X1),true,p(decrypt(Xk1,X1)),true),true)=true.
% 2.05/2.22  0 [] ife_q(p(crypt(xor(km,exp),Xkek2)),true,ife_q(p(crypt(xor(km,imp),Xkek1)),true,ife_q(p(crypt(Xk,Xk1)),true,ife_q(p(Xtype2),true,p(crypt(xor(Xkek2,Xtype),decrypt(xor(Xtype2,Xkek1),crypt(Xk,Xk1)))),true),true),true),true)=true.
% 2.05/2.22  0 [] ife_q(p(X2),true,ife_q(p(X1),true,p(xor(X1,X2)),true),true)=true.
% 2.05/2.22  0 [] ife_q(p(crypt(X1,X2)),true,ife_q(p(X1),true,p(X2),true),true)=true.
% 2.05/2.22  0 [] ife_q(p(X2),true,ife_q(p(X1),true,p(crypt(X1,X2)),true),true)=true.
% 2.05/2.22  0 [] p(kp)=true.
% 2.05/2.22  0 [] p(imp)=true.
% 2.05/2.22  0 [] p(data)=true.
% 2.05/2.22  0 [] p(id)=true.
% 2.05/2.22  0 [] p(pin)=true.
% 2.05/2.22  0 [] p(crypt(xor(kek,pin),pp))=true.
% 2.05/2.22  0 [] p(a)=true.
% 2.05/2.22  0 [] p(k3)=true.
% 2.05/2.22  0 [] p(crypt(xor(km,xor(kp,imp)),xor(kek,k3)))=true.
% 2.05/2.22  0 [] p(crypt(pp,a))!=true.
% 2.05/2.22  end_of_list.
% 2.05/2.22  
% 2.05/2.22  SCAN INPUT: prop=0, horn=1, equality=1, symmetry=0, max_lits=1.
% 2.05/2.22  
% 2.05/2.22  All clauses are units, and equality is present; the
% 2.05/2.22  strategy will be Knuth-Bendix with positive clauses in sos.
% 2.05/2.22  
% 2.05/2.22     dependent: set(knuth_bendix).
% 2.05/2.22     dependent: set(anl_eq).
% 2.05/2.22     dependent: set(para_from).
% 2.05/2.22     dependent: set(para_into).
% 2.05/2.22     dependent: clear(para_from_right).
% 2.05/2.22     dependent: clear(para_into_right).
% 2.05/2.22     dependent: set(para_from_vars).
% 2.05/2.22     dependent: set(eq_units_both_ways).
% 2.05/2.22     dependent: set(dynamic_demod_all).
% 2.05/2.22     dependent: set(dynamic_demod).
% 2.05/2.22     dependent: set(order_eq).
% 2.05/2.22     dependent: set(back_demod).
% 2.05/2.22     dependent: set(lrpo).
% 2.05/2.22  
% 2.05/2.22  ------------> process usable:
% 2.05/2.22  ** KEPT (pick-wt=6): 1 [] p(crypt(pp,a))!=true.
% 2.05/2.22  
% 2.05/2.22  ------------> process sos:
% 2.05/2.22  ** KEPT (pick-wt=3): 2 [] A=A.
% 2.05/2.22  ** KEPT (pick-wt=7): 3 [] ife_q(A,A,B,C)=B.
% 2.05/2.22  ---> New Demodulator: 4 [new_demod,3] ife_q(A,A,B,C)=B.
% 2.05/2.22  ** KEPT (pick-wt=7): 5 [] xor(A,B)=xor(B,A).
% 2.05/2.22  ** KEPT (pick-wt=11): 7 [copy,6,flip.1] xor(xor(A,B),C)=xor(A,xor(B,C)).
% 2.05/2.22  ---> New Demodulator: 8 [new_demod,7] xor(xor(A,B),C)=xor(A,xor(B,C)).
% 2.05/2.22  ** KEPT (pick-wt=7): 9 [] decrypt(A,crypt(A,B))=B.
% 2.05/2.22  ---> New Demodulator: 10 [new_demod,9] decrypt(A,crypt(A,B))=B.
% 2.05/2.22  ** KEPT (pick-wt=5): 11 [] xor(A,id)=A.
% 2.05/2.22  ---> New Demodulator: 12 [new_demod,11] xor(A,id)=A.
% 2.05/2.22  ** KEPT (pick-wt=5): 13 [] xor(A,A)=id.
% 2.05/2.22  ---> New Demodulator: 14 [new_demod,13] xor(A,A)=id.
% 2.05/2.22  ** KEPT (pick-wt=39): 15 [] ife_q(p(crypt(xor(km,imp),A)),true,ife_q(p(crypt(xor(B,C),D)),true,ife_q(p(E),true,p(crypt(xor(km,E),decrypt(xor(A,E),crypt(xor(B,C),D)))),true),true),true)=true.
% 2.05/2.22  ---> New Demodulator: 16 [new_demod,15] ife_q(p(crypt(xor(km,imp),A)),true,ife_q(p(crypt(xor(B,C),D)),true,ife_q(p(E),true,p(crypt(xor(km,E),decrypt(xor(A,E),crypt(xor(B,C),D)))),true),true),true)=true.
% 2.05/2.22  ** KEPT (pick-wt=31): 17 [] ife_q(p(crypt(xor(km,exp),A)),true,ife_q(p(crypt(xor(km,B),C)),true,ife_q(p(B),true,p(crypt(xor(A,B),C)),true),true),true)=true.
% 2.05/2.22  ---> New Demodulator: 18 [new_demod,17] ife_q(p(crypt(xor(km,exp),A)),true,ife_q(p(crypt(xor(km,B),C)),true,ife_q(p(B),true,p(crypt(xor(A,B),C)),true),true),true)=true.
% 2.05/2.22  ** KEPT (pick-wt=20): 19 [] ife_q(p(A),true,ife_q(p(B),true,p(crypt(xor(km,xor(kp,A)),B)),true),true)=true.
% 2.05/2.22  ---> New Demodulator: 20 [new_demod,19] ife_q(p(A),true,ife_q(p(B),true,p(crypt(xor(km,xor(kp,A)),B)),true),true)=true.
% 2.05/2.22  ** KEPT (pick-wt=33): 21 [] ife_q(p(crypt(xor(km,xor(kp,A)),B)),true,ife_q(p(A),true,ife_q(p(C),true,p(crypt(xor(km,xor(A,kp)),xor(C,B))),true),true),true)=true.
% 2.05/2.22  ---> New Demodulator: 22 [new_demod,21] ife_q(p(crypt(xor(km,xor(kp,A)),B)),true,ife_q(p(A),true,ife_q(p(C),true,p(crypt(xor(km,xor(A,kp)),xor(C,B))),true),true),true)=true.
% 2.05/2.22  ** KEPT (pick-wt=31): 23 [] ife_q(p(crypt(xor(km,xor(A,kp)),B)),true,ife_q(p(A),true,ife_q(p(C),true,p(crypt(xor(km,A),xor(B,C))),true),true),true)=true.
% 2.05/2.22  ---> New Demodulator: 24 [new_demod,23] ife_q(p(crypt(xor(km,xor(A,kp)),B)),true,ife_q(p(A),true,ife_q(p(C),true,p(crypt(xor(km,A),xor(B,C))),true),true),true)=true.
% 2.05/2.22  ** KEPT (pick-wt=20): 25 [] ife_q(p(crypt(xor(km,data),A)),true,ife_q(p(B),true,p(crypt(A,B)),true),true)=true.
% 2.05/2.22  ---> New Demodulator: 26 [new_demod,25] ife_q(p(crypt(xor(km,data),A)),true,ife_q(p(B),true,p(crypt(A,B)),true),true)=true.
% 2.05/2.22  ** KEPT (pick-wt=20): 27 [] ife_q(p(crypt(xor(km,data),A)),true,ife_q(p(B),true,p(decrypt(A,B)),true),true)=true.
% 2.05/2.22  ---> New Demodulator: 28 [new_demod,27] ife_q(p(crypt(xor(km,data),A)),true,ife_q(p(B),true,p(decrypt(A,B)),true),true)=true.
% 2.05/2.22  ** KEPT (pick-wt=44): 29 [] ife_q(p(crypt(xor(km,exp),A)),true,ife_q(p(crypt(xor(km,imp),B)),true,ife_q(p(crypt(C,D)),true,ife_q(p(E),true,p(crypt(xor(A,F),decrypt(xor(E,B),crypt(C,D)))),true),true),true),true)=true.
% 2.05/2.22  ---> New Demodulator: 30 [new_demod,29] ife_q(p(crypt(xor(km,exp),A)),true,ife_q(p(crypt(xor(km,imp),B)),true,ife_q(p(crypt(C,D)),true,ife_q(p(E),true,p(crypt(xor(A,F),decrypt(xor(E,B),crypt(C,D)))),true),true),true),true)=true.
% 2.05/2.22  ** KEPT (pick-wt=16): 31 [] ife_q(p(A),true,ife_q(p(B),true,p(xor(B,A)),true),true)=true.
% 2.05/2.22  ---> New Demodulator: 32 [new_demod,31] ife_q(p(A),true,ife_q(p(B),true,p(xor(B,A)),true),true)=true.
% 2.05/2.22  ** KEPT (pick-wt=16): 33 [] ife_q(p(crypt(A,B)),true,ife_q(p(A),true,p(B),true),true)=true.
% 2.05/2.22  ---> New Demodulator: 34 [new_demod,33] ife_q(p(crypt(A,B)),true,ife_q(p(A),true,p(B),true),true)=true.
% 2.05/2.22  ** KEPT (pick-wt=16): 35 [] ife_q(p(A),true,ife_q(p(B),true,p(crypt(B,A)),true),true)=true.
% 2.05/2.22  ---> New Demodulator: 36 [new_demod,35] ife_q(p(A),true,ife_q(p(B),true,p(crypt(B,A)),true),true)=true.
% 2.05/2.22  ** KEPT (pick-wt=4): 37 [] p(kp)=true.
% 2.05/2.22  ---> New Demodulator: 38 [new_demod,37] p(kp)=true.
% 2.05/2.22  ** KEPT (pick-wt=4): 39 [] p(imp)=true.
% 2.05/2.22  ---> New Demodulator: 40 [new_demod,39] p(imp)=true.
% 2.05/2.22  ** KEPT (pick-wt=4): 41 [] p(data)=true.
% 2.05/2.22  ---> New Demodulator: 42 [new_demod,41] p(data)=true.
% 2.05/2.22  ** KEPT (pick-wt=4): 43 [] p(id)=true.
% 2.05/2.22  ---> New Demodulator: 44 [new_demod,43] p(id)=true.
% 2.05/2.22  ** KEPT (pick-wt=4): 45 [] p(pin)=true.
% 2.05/2.22  ---> New Demodulator: 46 [new_demod,45] p(pin)=true.
% 2.05/2.22  ** KEPT (pick-wt=8): 47 [] p(crypt(xor(kek,pin),pp))=true.
% 2.05/2.22  ---> New Demodulator: 48 [new_demod,47] p(crypt(xor(kek,pin),pp))=true.
% 2.05/2.22  ** KEPT (pick-wt=4): 49 [] p(a)=true.
% 2.05/2.22  ---> New Demodulator: 50 [new_demod,49] p(a)=true.
% 2.05/2.22  ** KEPT (pick-wt=4): 51 [] p(k3)=true.
% 2.05/2.22  ---> New Demodulator: 52 [new_demod,51] p(k3)=true.
% 2.05/2.22  ** KEPT (pick-wt=12): 53 [] p(crypt(xor(km,xor(kp,imp)),xor(kek,k3)))=true.
% 2.05/2.22  ---> New Demodulator: 54 [new_demod,53] p(crypt(xor(km,xor(kp,imp)),xor(kek,k3)))=true.
% 2.05/2.22    Following clause subsumed by 2 during input processing: 0 [copy,2,flip.1] A=A.
% 2.05/2.22  >>>> Starting back demodulation with 4.
% 2.05/2.22    Following clause subsumed by 5 during input processing: 0 [copy,5,flip.1] xor(A,B)=xor(B,A).
% 2.05/2.22  >>>> Starting back demodulation with 8.
% 2.05/2.22  >>>> Starting back demodulation with 10.
% 2.05/2.22  >>>> Starting back demodulation with 12.
% 4.25/4.40  >>>> Starting back demodulation with 14.
% 4.25/4.40  >>>> Starting back demodulation with 16.
% 4.25/4.40  >>>> Starting back demodulation with 18.
% 4.25/4.40  >>>> Starting back demodulation with 20.
% 4.25/4.40  >>>> Starting back demodulation with 22.
% 4.25/4.40  >>>> Starting back demodulation with 24.
% 4.25/4.40  >>>> Starting back demodulation with 26.
% 4.25/4.40  >>>> Starting back demodulation with 28.
% 4.25/4.40  >>>> Starting back demodulation with 30.
% 4.25/4.40  >>>> Starting back demodulation with 32.
% 4.25/4.40  >>>> Starting back demodulation with 34.
% 4.25/4.40  >>>> Starting back demodulation with 36.
% 4.25/4.40  >>>> Starting back demodulation with 38.
% 4.25/4.40  >>>> Starting back demodulation with 40.
% 4.25/4.40  >>>> Starting back demodulation with 42.
% 4.25/4.40  >>>> Starting back demodulation with 44.
% 4.25/4.40  >>>> Starting back demodulation with 46.
% 4.25/4.40  >>>> Starting back demodulation with 48.
% 4.25/4.40  >>>> Starting back demodulation with 50.
% 4.25/4.40  >>>> Starting back demodulation with 52.
% 4.25/4.40  >>>> Starting back demodulation with 54.
% 4.25/4.40  
% 4.25/4.40  ======= end of input processing =======
% 4.25/4.40  
% 4.25/4.40  =========== start of search ===========
% 4.25/4.40  
% 4.25/4.40  
% 4.25/4.40  Resetting weight limit to 12.
% 4.25/4.40  
% 4.25/4.40  
% 4.25/4.40  Resetting weight limit to 12.
% 4.25/4.40  
% 4.25/4.40  sos_size=220
% 4.25/4.40  
% 4.25/4.40  
% 4.25/4.40  Resetting weight limit to 8.
% 4.25/4.40  
% 4.25/4.40  
% 4.25/4.40  Resetting weight limit to 8.
% 4.25/4.40  
% 4.25/4.40  sos_size=285
% 4.25/4.40  
% 4.25/4.40  Search stopped because sos empty.
% 4.25/4.40  
% 4.25/4.40  
% 4.25/4.40  Search stopped because sos empty.
% 4.25/4.40  
% 4.25/4.40  ============ end of search ============
% 4.25/4.40  
% 4.25/4.40  -------------- statistics -------------
% 4.25/4.40  clauses given               2571
% 4.25/4.40  clauses generated         533205
% 4.25/4.40  clauses kept                2582
% 4.25/4.40  clauses forward subsumed   25737
% 4.25/4.40  clauses back subsumed          0
% 4.25/4.40  Kbytes malloced            10742
% 4.25/4.40  
% 4.25/4.40  ----------- times (seconds) -----------
% 4.25/4.40  user CPU time          2.18          (0 hr, 0 min, 2 sec)
% 4.25/4.40  system CPU time        0.01          (0 hr, 0 min, 0 sec)
% 4.25/4.40  wall-clock time        4             (0 hr, 0 min, 4 sec)
% 4.25/4.40  
% 4.25/4.40  Process 23397 finished Wed Jul 27 05:59:42 2022
% 4.25/4.40  Otter interrupted
% 4.25/4.40  PROOF NOT FOUND
%------------------------------------------------------------------------------