TSTP Solution File: SWV235+1 by Drodi---3.6.0

View Problem - Process Solution

%------------------------------------------------------------------------------
% File     : Drodi---3.6.0
% Problem  : SWV235+1 : TPTP v8.1.2. Released v3.2.0.
% Transfm  : none
% Format   : tptp:raw
% Command  : drodi -learnfrom(drodi.lrn) -timeout(%d) %s

% Computer : n009.cluster.edu
% Model    : x86_64 x86_64
% CPU      : Intel(R) Xeon(R) CPU E5-2620 v4 2.10GHz
% Memory   : 8042.1875MB
% OS       : Linux 3.10.0-693.el7.x86_64
% CPULimit : 300s
% WCLimit  : 300s
% DateTime : Tue Apr 30 20:46:19 EDT 2024

% Result   : Theorem 5.27s 1.02s
% Output   : CNFRefutation 5.27s
% Verified : 
% SZS Type : -

% Comments : 
%------------------------------------------------------------------------------
%----WARNING: Could not form TPTP format derivation
%------------------------------------------------------------------------------
%----ORIGINAL SYSTEM OUTPUT
% 0.04/0.10  % Problem  : SWV235+1 : TPTP v8.1.2. Released v3.2.0.
% 0.04/0.11  % Command  : drodi -learnfrom(drodi.lrn) -timeout(%d) %s
% 0.09/0.31  % Computer : n009.cluster.edu
% 0.09/0.31  % Model    : x86_64 x86_64
% 0.09/0.31  % CPU      : Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz
% 0.09/0.31  % Memory   : 8042.1875MB
% 0.09/0.31  % OS       : Linux 3.10.0-693.el7.x86_64
% 0.09/0.31  % CPULimit : 300
% 0.09/0.31  % WCLimit  : 300
% 0.09/0.31  % DateTime : Tue Apr 30 00:32:55 EDT 2024
% 0.09/0.31  % CPUTime  : 
% 0.14/0.32  % Drodi V3.6.0
% 5.27/1.02  % Refutation found
% 5.27/1.02  % SZS status Theorem for theBenchmark: Theorem is valid
% 5.27/1.02  % SZS output start CNFRefutation for theBenchmark
% 5.27/1.02  fof(f1,axiom,(
% 5.27/1.02    (! [X1,X2] : xor(X1,X2) = xor(X2,X1) )),
% 5.27/1.02    file('/export/starexec/sandbox/benchmark/theBenchmark.p')).
% 5.27/1.02  fof(f2,axiom,(
% 5.27/1.02    (! [X1,X2,X3] : xor(X1,xor(X2,X3)) = xor(xor(X1,X2),X3) )),
% 5.27/1.02    file('/export/starexec/sandbox/benchmark/theBenchmark.p')).
% 5.27/1.02  fof(f4,axiom,(
% 5.27/1.02    (! [X1] : xor(X1,id) = X1 )),
% 5.27/1.02    file('/export/starexec/sandbox/benchmark/theBenchmark.p')).
% 5.27/1.02  fof(f5,axiom,(
% 5.27/1.02    (! [X1] : xor(X1,X1) = id )),
% 5.27/1.02    file('/export/starexec/sandbox/benchmark/theBenchmark.p')).
% 5.27/1.02  fof(f7,axiom,(
% 5.27/1.02    (! [Xtype,Xk1,Xkek1] :( ( p(crypt(xor(km,Xtype),Xk1))& p(Xtype)& p(crypt(xor(km,exp),Xkek1)) )=> p(crypt(xor(Xkek1,Xtype),Xk1)) ) )),
% 5.27/1.02    file('/export/starexec/sandbox/benchmark/theBenchmark.p')).
% 5.27/1.02  fof(f8,axiom,(
% 5.27/1.02    (! [Xk,Xtype] :( ( p(Xk)& p(Xtype) )=> p(crypt(xor(km,xor(kp,Xtype)),Xk)) ) )),
% 5.27/1.02    file('/export/starexec/sandbox/benchmark/theBenchmark.p')).
% 5.27/1.02  fof(f10,axiom,(
% 5.27/1.02    (! [Xk1,Xtype,Xk2] :( ( p(Xk1)& p(crypt(xor(km,xor(Xtype,kp)),Xk2))& p(Xtype) )=> p(crypt(xor(km,Xtype),xor(Xk2,Xk1))) ) )),
% 5.27/1.02    file('/export/starexec/sandbox/benchmark/theBenchmark.p')).
% 5.27/1.02  fof(f15,axiom,(
% 5.27/1.02    (! [X1,X2] :( ( p(crypt(X1,X2))& p(X1) )=> p(X2) ) )),
% 5.27/1.02    file('/export/starexec/sandbox/benchmark/theBenchmark.p')).
% 5.27/1.02  fof(f16,axiom,(
% 5.27/1.02    (! [X1,X2] :( ( p(X2)& p(X1) )=> p(crypt(X1,X2)) ) )),
% 5.27/1.02    file('/export/starexec/sandbox/benchmark/theBenchmark.p')).
% 5.27/1.02  fof(f21,axiom,(
% 5.27/1.02    p(pin) ),
% 5.27/1.02    file('/export/starexec/sandbox/benchmark/theBenchmark.p')).
% 5.27/1.02  fof(f22,axiom,(
% 5.27/1.02    p(crypt(xor(km,pin),pp)) ),
% 5.27/1.02    file('/export/starexec/sandbox/benchmark/theBenchmark.p')).
% 5.27/1.02  fof(f27,axiom,(
% 5.27/1.02    p(exp) ),
% 5.27/1.02    file('/export/starexec/sandbox/benchmark/theBenchmark.p')).
% 5.27/1.02  fof(f28,axiom,(
% 5.27/1.02    p(a) ),
% 5.27/1.02    file('/export/starexec/sandbox/benchmark/theBenchmark.p')).
% 5.27/1.02  fof(f29,conjecture,(
% 5.27/1.02    p(crypt(pp,a)) ),
% 5.27/1.02    file('/export/starexec/sandbox/benchmark/theBenchmark.p')).
% 5.27/1.02  fof(f30,negated_conjecture,(
% 5.27/1.02    ~(p(crypt(pp,a)) )),
% 5.27/1.02    inference(negated_conjecture,[status(cth)],[f29])).
% 5.27/1.02  fof(f31,plain,(
% 5.27/1.02    ![X0,X1]: (xor(X0,X1)=xor(X1,X0))),
% 5.27/1.02    inference(cnf_transformation,[status(esa)],[f1])).
% 5.27/1.02  fof(f32,plain,(
% 5.27/1.02    ![X0,X1,X2]: (xor(X0,xor(X1,X2))=xor(xor(X0,X1),X2))),
% 5.27/1.02    inference(cnf_transformation,[status(esa)],[f2])).
% 5.27/1.02  fof(f34,plain,(
% 5.27/1.02    ![X0]: (xor(X0,id)=X0)),
% 5.27/1.02    inference(cnf_transformation,[status(esa)],[f4])).
% 5.27/1.02  fof(f35,plain,(
% 5.27/1.02    ![X0]: (xor(X0,X0)=id)),
% 5.27/1.02    inference(cnf_transformation,[status(esa)],[f5])).
% 5.27/1.02  fof(f38,plain,(
% 5.27/1.02    ![Xtype,Xk1,Xkek1]: (((~p(crypt(xor(km,Xtype),Xk1))|~p(Xtype))|~p(crypt(xor(km,exp),Xkek1)))|p(crypt(xor(Xkek1,Xtype),Xk1)))),
% 5.27/1.02    inference(pre_NNF_transformation,[status(esa)],[f7])).
% 5.27/1.02  fof(f39,plain,(
% 5.27/1.02    ![X0,X1,X2]: (~p(crypt(xor(km,X0),X1))|~p(X0)|~p(crypt(xor(km,exp),X2))|p(crypt(xor(X2,X0),X1)))),
% 5.27/1.02    inference(cnf_transformation,[status(esa)],[f38])).
% 5.27/1.02  fof(f40,plain,(
% 5.27/1.02    ![Xk,Xtype]: ((~p(Xk)|~p(Xtype))|p(crypt(xor(km,xor(kp,Xtype)),Xk)))),
% 5.27/1.02    inference(pre_NNF_transformation,[status(esa)],[f8])).
% 5.27/1.02  fof(f41,plain,(
% 5.27/1.02    ![X0,X1]: (~p(X0)|~p(X1)|p(crypt(xor(km,xor(kp,X1)),X0)))),
% 5.27/1.02    inference(cnf_transformation,[status(esa)],[f40])).
% 5.27/1.02  fof(f44,plain,(
% 5.27/1.02    ![Xk1,Xtype,Xk2]: (((~p(Xk1)|~p(crypt(xor(km,xor(Xtype,kp)),Xk2)))|~p(Xtype))|p(crypt(xor(km,Xtype),xor(Xk2,Xk1))))),
% 5.27/1.02    inference(pre_NNF_transformation,[status(esa)],[f10])).
% 5.27/1.02  fof(f45,plain,(
% 5.27/1.02    ![X0,X1,X2]: (~p(X0)|~p(crypt(xor(km,xor(X1,kp)),X2))|~p(X1)|p(crypt(xor(km,X1),xor(X2,X0))))),
% 5.27/1.02    inference(cnf_transformation,[status(esa)],[f44])).
% 5.27/1.02  fof(f55,plain,(
% 5.27/1.02    ![X1,X2]: ((~p(crypt(X1,X2))|~p(X1))|p(X2))),
% 5.27/1.02    inference(pre_NNF_transformation,[status(esa)],[f15])).
% 5.27/1.02  fof(f56,plain,(
% 5.27/1.02    ![X2]: ((![X1]: (~p(crypt(X1,X2))|~p(X1)))|p(X2))),
% 5.27/1.02    inference(miniscoping,[status(esa)],[f55])).
% 5.27/1.02  fof(f57,plain,(
% 5.27/1.02    ![X0,X1]: (~p(crypt(X0,X1))|~p(X0)|p(X1))),
% 5.27/1.02    inference(cnf_transformation,[status(esa)],[f56])).
% 5.27/1.02  fof(f58,plain,(
% 5.27/1.02    ![X1,X2]: ((~p(X2)|~p(X1))|p(crypt(X1,X2)))),
% 5.27/1.02    inference(pre_NNF_transformation,[status(esa)],[f16])).
% 5.27/1.02  fof(f59,plain,(
% 5.27/1.02    ![X0,X1]: (~p(X0)|~p(X1)|p(crypt(X1,X0)))),
% 5.27/1.02    inference(cnf_transformation,[status(esa)],[f58])).
% 5.27/1.02  fof(f64,plain,(
% 5.27/1.02    p(pin)),
% 5.27/1.02    inference(cnf_transformation,[status(esa)],[f21])).
% 5.27/1.03  fof(f65,plain,(
% 5.27/1.03    p(crypt(xor(km,pin),pp))),
% 5.27/1.03    inference(cnf_transformation,[status(esa)],[f22])).
% 5.27/1.03  fof(f70,plain,(
% 5.27/1.03    p(exp)),
% 5.27/1.03    inference(cnf_transformation,[status(esa)],[f27])).
% 5.27/1.03  fof(f71,plain,(
% 5.27/1.03    p(a)),
% 5.27/1.03    inference(cnf_transformation,[status(esa)],[f28])).
% 5.27/1.03  fof(f72,plain,(
% 5.27/1.03    ~p(crypt(pp,a))),
% 5.27/1.03    inference(cnf_transformation,[status(esa)],[f30])).
% 5.27/1.03  fof(f73,plain,(
% 5.27/1.03    ![X0]: (~p(X0)|p(crypt(X0,a)))),
% 5.27/1.03    inference(resolution,[status(thm)],[f59,f71])).
% 5.27/1.03  fof(f77,plain,(
% 5.27/1.03    spl0_1 <=> p(pp)),
% 5.27/1.03    introduced(split_symbol_definition)).
% 5.27/1.03  fof(f78,plain,(
% 5.27/1.03    p(pp)|~spl0_1),
% 5.27/1.03    inference(component_clause,[status(thm)],[f77])).
% 5.27/1.03  fof(f193,plain,(
% 5.27/1.03    ![X0]: (X0=xor(id,X0))),
% 5.27/1.03    inference(paramodulation,[status(thm)],[f34,f31])).
% 5.27/1.03  fof(f201,plain,(
% 5.27/1.03    spl0_8 <=> p(pin)),
% 5.27/1.03    introduced(split_symbol_definition)).
% 5.27/1.03  fof(f203,plain,(
% 5.27/1.03    ~p(pin)|spl0_8),
% 5.27/1.03    inference(component_clause,[status(thm)],[f201])).
% 5.27/1.03  fof(f211,plain,(
% 5.27/1.03    ![X0,X1,X2]: (xor(X0,xor(X1,X2))=xor(X2,xor(X0,X1)))),
% 5.27/1.03    inference(paramodulation,[status(thm)],[f31,f32])).
% 5.27/1.03  fof(f219,plain,(
% 5.27/1.03    ![X0,X1,X2]: (xor(X0,xor(X1,X2))=xor(xor(X1,X0),X2))),
% 5.27/1.03    inference(paramodulation,[status(thm)],[f31,f32])).
% 5.27/1.03  fof(f220,plain,(
% 5.27/1.03    ![X0,X1,X2]: (xor(X0,xor(X1,X2))=xor(X1,xor(X0,X2)))),
% 5.27/1.03    inference(forward_demodulation,[status(thm)],[f32,f219])).
% 5.27/1.03  fof(f240,plain,(
% 5.27/1.03    spl0_9 <=> ~p(crypt(xor(km,exp),X0))|p(crypt(xor(X0,pin),pp))),
% 5.27/1.03    introduced(split_symbol_definition)).
% 5.27/1.03  fof(f241,plain,(
% 5.27/1.03    ![X0]: (~p(crypt(xor(km,exp),X0))|p(crypt(xor(X0,pin),pp))|~spl0_9)),
% 5.27/1.03    inference(component_clause,[status(thm)],[f240])).
% 5.27/1.03  fof(f243,plain,(
% 5.27/1.03    ![X0]: (~p(pin)|~p(crypt(xor(km,exp),X0))|p(crypt(xor(X0,pin),pp)))),
% 5.27/1.03    inference(resolution,[status(thm)],[f39,f65])).
% 5.27/1.03  fof(f244,plain,(
% 5.27/1.03    ~spl0_8|spl0_9),
% 5.27/1.03    inference(split_clause,[status(thm)],[f243,f201,f240])).
% 5.27/1.03  fof(f265,plain,(
% 5.27/1.03    $false|spl0_8),
% 5.27/1.03    inference(forward_subsumption_resolution,[status(thm)],[f203,f64])).
% 5.27/1.03  fof(f266,plain,(
% 5.27/1.03    spl0_8),
% 5.27/1.03    inference(contradiction_clause,[status(thm)],[f265])).
% 5.27/1.03  fof(f462,plain,(
% 5.27/1.03    spl0_20 <=> p(exp)),
% 5.27/1.03    introduced(split_symbol_definition)).
% 5.27/1.03  fof(f464,plain,(
% 5.27/1.03    ~p(exp)|spl0_20),
% 5.27/1.03    inference(component_clause,[status(thm)],[f462])).
% 5.27/1.03  fof(f485,plain,(
% 5.27/1.03    $false|spl0_20),
% 5.27/1.03    inference(forward_subsumption_resolution,[status(thm)],[f464,f70])).
% 5.27/1.03  fof(f486,plain,(
% 5.27/1.03    spl0_20),
% 5.27/1.03    inference(contradiction_clause,[status(thm)],[f485])).
% 5.27/1.03  fof(f1204,plain,(
% 5.27/1.03    ![X0,X1,X2]: (xor(X0,xor(X1,X2))=xor(X0,xor(X2,X1)))),
% 5.27/1.03    inference(paramodulation,[status(thm)],[f211,f220])).
% 5.27/1.03  fof(f1672,plain,(
% 5.27/1.03    ![X0]: (~p(X0)|p(crypt(xor(km,xor(kp,X0)),a)))),
% 5.27/1.03    inference(resolution,[status(thm)],[f41,f71])).
% 5.27/1.03  fof(f1798,plain,(
% 5.27/1.03    ![X0,X1]: (~p(crypt(xor(km,xor(X0,kp)),X1))|~p(X0)|p(crypt(xor(km,X0),xor(X1,a))))),
% 5.27/1.03    inference(resolution,[status(thm)],[f45,f71])).
% 5.27/1.03  fof(f1799,plain,(
% 5.27/1.03    p(crypt(xor(km,xor(kp,exp)),a))),
% 5.27/1.03    inference(resolution,[status(thm)],[f1672,f70])).
% 5.27/1.03  fof(f1800,plain,(
% 5.27/1.03    p(crypt(xor(km,xor(exp,kp)),a))),
% 5.27/1.03    inference(forward_demodulation,[status(thm)],[f1204,f1799])).
% 5.27/1.03  fof(f3604,plain,(
% 5.27/1.03    spl0_169 <=> p(crypt(xor(km,exp),xor(a,a)))),
% 5.27/1.03    introduced(split_symbol_definition)).
% 5.27/1.03  fof(f3605,plain,(
% 5.27/1.03    p(crypt(xor(km,exp),xor(a,a)))|~spl0_169),
% 5.27/1.03    inference(component_clause,[status(thm)],[f3604])).
% 5.27/1.03  fof(f3607,plain,(
% 5.27/1.03    ~p(exp)|p(crypt(xor(km,exp),xor(a,a)))),
% 5.27/1.03    inference(resolution,[status(thm)],[f1798,f1800])).
% 5.27/1.03  fof(f3608,plain,(
% 5.27/1.03    ~spl0_20|spl0_169),
% 5.27/1.03    inference(split_clause,[status(thm)],[f3607,f462,f3604])).
% 5.27/1.03  fof(f3636,plain,(
% 5.27/1.03    p(crypt(xor(km,exp),id))|~spl0_169),
% 5.27/1.03    inference(forward_demodulation,[status(thm)],[f35,f3605])).
% 5.27/1.03  fof(f3950,plain,(
% 5.27/1.03    p(crypt(xor(id,pin),pp))|~spl0_169|~spl0_9),
% 5.27/1.03    inference(resolution,[status(thm)],[f3636,f241])).
% 5.27/1.03  fof(f3951,plain,(
% 5.27/1.03    p(crypt(pin,pp))|~spl0_169|~spl0_9),
% 5.27/1.03    inference(forward_demodulation,[status(thm)],[f193,f3950])).
% 5.27/1.03  fof(f3986,plain,(
% 5.27/1.03    ~p(pin)|p(pp)|~spl0_169|~spl0_9),
% 5.27/1.03    inference(resolution,[status(thm)],[f3951,f57])).
% 5.27/1.03  fof(f3987,plain,(
% 5.27/1.03    ~spl0_8|spl0_1|~spl0_169|~spl0_9),
% 5.27/1.03    inference(split_clause,[status(thm)],[f3986,f201,f77,f3604,f240])).
% 5.27/1.03  fof(f4028,plain,(
% 5.27/1.03    p(crypt(pp,a))|~spl0_1),
% 5.27/1.03    inference(resolution,[status(thm)],[f78,f73])).
% 5.27/1.04  fof(f4029,plain,(
% 5.27/1.04    $false|~spl0_1),
% 5.27/1.04    inference(forward_subsumption_resolution,[status(thm)],[f4028,f72])).
% 5.27/1.04  fof(f4030,plain,(
% 5.27/1.04    ~spl0_1),
% 5.27/1.04    inference(contradiction_clause,[status(thm)],[f4029])).
% 5.27/1.04  fof(f4031,plain,(
% 5.27/1.04    $false),
% 5.27/1.04    inference(sat_refutation,[status(thm)],[f244,f266,f486,f3608,f3987,f4030])).
% 5.27/1.04  % SZS output end CNFRefutation for theBenchmark.p
% 5.69/1.05  % Elapsed time: 0.728101 seconds
% 5.69/1.05  % CPU time: 5.658005 seconds
% 5.69/1.05  % Total memory used: 93.509 MB
% 5.69/1.05  % Net memory used: 86.512 MB
%------------------------------------------------------------------------------