TSTP Solution File: SWV337-2 by CSE---1.6
View Problem
- Process Solution
%------------------------------------------------------------------------------
% File : CSE---1.6
% Problem : SWV337-2 : TPTP v8.1.2. Released v3.2.0.
% Transfm : none
% Format : tptp:raw
% Command : java -jar /export/starexec/sandbox/solver/bin/mcs_scs.jar %s %d
% Computer : n012.cluster.edu
% Model : x86_64 x86_64
% CPU : Intel(R) Xeon(R) CPU E5-2620 v4 2.10GHz
% Memory : 8042.1875MB
% OS : Linux 3.10.0-693.el7.x86_64
% CPULimit : 300s
% WCLimit : 300s
% DateTime : Thu Aug 31 21:33:05 EDT 2023
% Result : Unsatisfiable 0.20s 0.64s
% Output : CNFRefutation 0.20s
% Verified :
% SZS Type : -
% Comments :
%------------------------------------------------------------------------------
%----WARNING: Could not form TPTP format derivation
%------------------------------------------------------------------------------
%----ORIGINAL SYSTEM OUTPUT
% 0.11/0.12 % Problem : SWV337-2 : TPTP v8.1.2. Released v3.2.0.
% 0.11/0.13 % Command : java -jar /export/starexec/sandbox/solver/bin/mcs_scs.jar %s %d
% 0.13/0.33 % Computer : n012.cluster.edu
% 0.13/0.33 % Model : x86_64 x86_64
% 0.13/0.33 % CPU : Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz
% 0.13/0.33 % Memory : 8042.1875MB
% 0.13/0.33 % OS : Linux 3.10.0-693.el7.x86_64
% 0.13/0.33 % CPULimit : 300
% 0.13/0.33 % WCLimit : 300
% 0.13/0.33 % DateTime : Tue Aug 29 10:36:09 EDT 2023
% 0.13/0.33 % CPUTime :
% 0.20/0.56 start to proof:theBenchmark
% 0.20/0.63 %-------------------------------------------
% 0.20/0.63 % File :CSE---1.6
% 0.20/0.63 % Problem :theBenchmark
% 0.20/0.63 % Transform :cnf
% 0.20/0.63 % Format :tptp:raw
% 0.20/0.63 % Command :java -jar mcs_scs.jar %d %s
% 0.20/0.63
% 0.20/0.63 % Result :Theorem 0.020000s
% 0.20/0.63 % Output :CNFRefutation 0.020000s
% 0.20/0.63 %-------------------------------------------
% 0.20/0.64 %------------------------------------------------------------------------------
% 0.20/0.64 % File : SWV337-2 : TPTP v8.1.2. Released v3.2.0.
% 0.20/0.64 % Domain : Software Verification (Security)
% 0.20/0.64 % Problem : Cryptographic protocol problem for Yahalom
% 0.20/0.64 % Version : [Pau06] axioms : Reduced > Especial.
% 0.20/0.64 % English :
% 0.20/0.64
% 0.20/0.64 % Refs : [Pau06] Paulson (2006), Email to G. Sutcliffe
% 0.20/0.64 % Source : [Pau06]
% 0.20/0.64 % Names :
% 0.20/0.64
% 0.20/0.64 % Status : Unsatisfiable
% 0.20/0.64 % Rating : 0.14 v8.1.0, 0.00 v7.0.0, 0.25 v6.3.0, 0.00 v5.0.0, 0.07 v4.1.0, 0.00 v4.0.0, 0.14 v3.4.0, 0.25 v3.3.0, 0.00 v3.2.0
% 0.20/0.64 % Syntax : Number of clauses : 10 ( 4 unt; 1 nHn; 10 RR)
% 0.20/0.64 % Number of literals : 20 ( 0 equ; 11 neg)
% 0.20/0.64 % Maximal clause size : 4 ( 2 avg)
% 0.20/0.64 % Maximal term depth : 8 ( 2 avg)
% 0.20/0.64 % Number of predicates : 1 ( 1 usr; 0 prp; 3-3 aty)
% 0.20/0.64 % Number of functors : 27 ( 27 usr; 14 con; 0-3 aty)
% 0.20/0.64 % Number of variables : 23 ( 4 sgn)
% 0.20/0.64 % SPC : CNF_UNS_RFO_NEQ_NHN
% 0.20/0.64
% 0.20/0.64 % Comments : The problems in the [Pau06] collection each have very many axioms,
% 0.20/0.64 % of which only a small selection are required for the refutation.
% 0.20/0.64 % The mission is to find those few axioms, after which a refutation
% 0.20/0.64 % can be quite easily found. This version has only the necessary
% 0.20/0.64 % axioms.
% 0.20/0.64 %------------------------------------------------------------------------------
% 0.20/0.64 cnf(cls_conjecture_0,negated_conjecture,
% 0.20/0.64 c_in(v_evs4,c_Yahalom_Oyahalom,tc_List_Olist(tc_Event_Oevent)) ).
% 0.20/0.64
% 0.20/0.64 cnf(cls_conjecture_3,negated_conjecture,
% 0.20/0.64 c_in(c_Event_Oevent_OGets(v_A,c_Message_Omsg_OMPair(c_Message_Omsg_OCrypt(c_Public_OshrK(v_A),c_Message_Omsg_OMPair(c_Message_Omsg_OAgent(v_B),c_Message_Omsg_OMPair(c_Message_Omsg_OKey(v_K),c_Message_Omsg_OMPair(c_Message_Omsg_ONonce(v_NA),c_Message_Omsg_ONonce(v_NB))))),v_X)),c_List_Oset(v_evs4,tc_Event_Oevent),tc_Event_Oevent) ).
% 0.20/0.64
% 0.20/0.64 cnf(cls_conjecture_6,negated_conjecture,
% 0.20/0.64 ~ c_in(c_Message_Omsg_ONonce(v_NB),c_Message_Oanalz(c_Event_Oknows(c_Message_Oagent_OSpy,v_evs4)),tc_Message_Omsg) ).
% 0.20/0.64
% 0.20/0.64 cnf(cls_conjecture_8,negated_conjecture,
% 0.20/0.64 ~ c_in(c_Event_Oevent_OSays(c_Message_Oagent_OServer,V_U,c_Message_Omsg_OMPair(c_Message_Omsg_OCrypt(c_Public_OshrK(V_U),c_Message_Omsg_OMPair(c_Message_Omsg_OAgent(V_V),c_Message_Omsg_OMPair(c_Message_Omsg_OKey(v_K),c_Message_Omsg_OMPair(c_Message_Omsg_ONonce(V_W),c_Message_Omsg_ONonce(v_NB))))),c_Message_Omsg_OCrypt(c_Public_OshrK(V_V),c_Message_Omsg_OMPair(c_Message_Omsg_OAgent(V_U),c_Message_Omsg_OKey(v_K))))),c_List_Oset(v_evs4,tc_Event_Oevent),tc_Event_Oevent) ).
% 0.20/0.64
% 0.20/0.64 cnf(cls_Message_OMPair__analz_0,axiom,
% 0.20/0.64 ( ~ c_in(c_Message_Omsg_OMPair(V_X,V_Y),c_Message_Oanalz(V_H),tc_Message_Omsg)
% 0.20/0.64 | c_in(V_Y,c_Message_Oanalz(V_H),tc_Message_Omsg) ) ).
% 0.20/0.64
% 0.20/0.64 cnf(cls_Message_OMPair__analz_1,axiom,
% 0.20/0.64 ( ~ c_in(c_Message_Omsg_OMPair(V_X,V_Y),c_Message_Oanalz(V_H),tc_Message_Omsg)
% 0.20/0.64 | c_in(V_X,c_Message_Oanalz(V_H),tc_Message_Omsg) ) ).
% 0.20/0.64
% 0.20/0.64 cnf(cls_Message_Oanalz__into__parts__dest_0,axiom,
% 0.20/0.64 ( ~ c_in(V_c,c_Message_Oanalz(V_H),tc_Message_Omsg)
% 0.20/0.64 | c_in(V_c,c_Message_Oparts(V_H),tc_Message_Omsg) ) ).
% 0.20/0.64
% 0.20/0.64 cnf(cls_Public_OCrypt__Spy__analz__bad_0,axiom,
% 0.20/0.64 ( ~ c_in(V_A,c_Event_Obad,tc_Message_Oagent)
% 0.20/0.64 | ~ c_in(c_Message_Omsg_OCrypt(c_Public_OshrK(V_A),V_X),c_Message_Oanalz(c_Event_Oknows(c_Message_Oagent_OSpy,V_evs)),tc_Message_Omsg)
% 0.20/0.64 | c_in(V_X,c_Message_Oanalz(c_Event_Oknows(c_Message_Oagent_OSpy,V_evs)),tc_Message_Omsg) ) ).
% 0.20/0.64
% 0.20/0.64 cnf(cls_Yahalom_OA__trusts__YM3_0,axiom,
% 0.20/0.64 ( ~ c_in(V_evs,c_Yahalom_Oyahalom,tc_List_Olist(tc_Event_Oevent))
% 0.20/0.64 | ~ c_in(c_Message_Omsg_OCrypt(c_Public_OshrK(V_A),c_Message_Omsg_OMPair(c_Message_Omsg_OAgent(V_B),c_Message_Omsg_OMPair(c_Message_Omsg_OKey(V_K),c_Message_Omsg_OMPair(V_na,V_nb)))),c_Message_Oparts(c_Event_Oknows(c_Message_Oagent_OSpy,V_evs)),tc_Message_Omsg)
% 0.20/0.64 | c_in(V_A,c_Event_Obad,tc_Message_Oagent)
% 0.20/0.64 | c_in(c_Event_Oevent_OSays(c_Message_Oagent_OServer,V_A,c_Message_Omsg_OMPair(c_Message_Omsg_OCrypt(c_Public_OshrK(V_A),c_Message_Omsg_OMPair(c_Message_Omsg_OAgent(V_B),c_Message_Omsg_OMPair(c_Message_Omsg_OKey(V_K),c_Message_Omsg_OMPair(V_na,V_nb)))),c_Message_Omsg_OCrypt(c_Public_OshrK(V_B),c_Message_Omsg_OMPair(c_Message_Omsg_OAgent(V_A),c_Message_Omsg_OKey(V_K))))),c_List_Oset(V_evs,tc_Event_Oevent),tc_Event_Oevent) ) ).
% 0.20/0.64
% 0.20/0.64 cnf(cls_Yahalom_OGets__imp__analz__Spy__dest_0,axiom,
% 0.20/0.64 ( ~ c_in(V_evs,c_Yahalom_Oyahalom,tc_List_Olist(tc_Event_Oevent))
% 0.20/0.64 | ~ c_in(c_Event_Oevent_OGets(V_B,V_X),c_List_Oset(V_evs,tc_Event_Oevent),tc_Event_Oevent)
% 0.20/0.64 | c_in(V_X,c_Message_Oanalz(c_Event_Oknows(c_Message_Oagent_OSpy,V_evs)),tc_Message_Omsg) ) ).
% 0.20/0.64
% 0.20/0.64 %------------------------------------------------------------------------------
% 0.20/0.64 %-------------------------------------------
% 0.20/0.64 % Proof found
% 0.20/0.64 % SZS status Theorem for theBenchmark
% 0.20/0.64 % SZS output start Proof
% 0.20/0.64 %ClaNum:10(EqnAxiom:0)
% 0.20/0.64 %VarNum:50(SingletonVarNum:23)
% 0.20/0.64 %MaxLitNum:4
% 0.20/0.64 %MaxfuncDepth:7
% 0.20/0.64 %SharedTerms:32
% 0.20/0.64 %goalClause: 1 2 3 4
% 0.20/0.64 %singleGoalClaCount:4
% 0.20/0.64 [1]P1(a1,a2,f19(a18))
% 0.20/0.64 [3]~P1(f15(a26),f12(f8(a10,a1)),a21)
% 0.20/0.64 [2]P1(f5(a20,f16(f14(f3(a20),f16(f4(a23),f16(f13(a24),f16(f15(a25),f15(a26))))),a27)),f7(a1,a18),a18)
% 0.20/0.64 [4]~P1(f9(a11,x41,f16(f14(f3(x41),f16(f4(x42),f16(f13(a24),f16(f15(x43),f15(a26))))),f14(f3(x42),f16(f4(x41),f13(a24))))),f7(a1,a18),a18)
% 0.20/0.64 [5]~P1(x51,f12(x52),a21)+P1(x51,f17(x52),a21)
% 0.20/0.64 [6]P1(x61,f12(x62),a21)+~P1(f16(x63,x61),f12(x62),a21)
% 0.20/0.64 [7]P1(x71,f12(x72),a21)+~P1(f16(x71,x73),f12(x72),a21)
% 0.20/0.64 [8]~P1(f5(x83,x81),f7(x82,a18),a18)+~P1(x82,a2,f19(a18))+P1(x81,f12(f8(a10,x82)),a21)
% 0.20/0.64 [9]~P1(x93,a6,a22)+~P1(f14(f3(x93),x91),f12(f8(a10,x92)),a21)+P1(x91,f12(f8(a10,x92)),a21)
% 0.20/0.64 [10]P1(x101,a6,a22)+~P1(x106,a2,f19(a18))+~P1(f14(f3(x101),f16(f4(x102),f16(f13(x103),f16(x104,x105)))),f17(f8(a10,x106)),a21)+P1(f9(a11,x101,f16(f14(f3(x101),f16(f4(x102),f16(f13(x103),f16(x104,x105)))),f14(f3(x102),f16(f4(x101),f13(x103))))),f7(x106,a18),a18)
% 0.20/0.64 %EqnAxiom
% 0.20/0.64
% 0.20/0.64 %-------------------------------------------
% 0.20/0.64 cnf(11,plain,
% 0.20/0.64 (~P1(f16(f15(a26),x111),f12(f8(a10,a1)),a21)),
% 0.20/0.64 inference(scs_inference,[],[3,7])).
% 0.20/0.64 cnf(12,plain,
% 0.20/0.64 (~P1(f16(x121,f15(a26)),f12(f8(a10,a1)),a21)),
% 0.20/0.64 inference(scs_inference,[],[3,7,6])).
% 0.20/0.64 cnf(23,plain,
% 0.20/0.64 (P1(f14(f3(a20),f16(f4(a23),f16(f13(a24),f16(f15(a25),f15(a26))))),f12(f8(a10,a1)),a21)),
% 0.20/0.64 inference(scs_inference,[],[1,2,8,6,7])).
% 0.20/0.64 cnf(25,plain,
% 0.20/0.64 (P1(x251,a6,a22)+~P1(f14(f3(x251),f16(f4(x252),f16(f13(a24),f16(f15(x253),f15(a26))))),f17(f8(a10,a1)),a21)),
% 0.20/0.64 inference(scs_inference,[],[1,2,4,8,6,7,10])).
% 0.20/0.64 cnf(33,plain,
% 0.20/0.64 (~P1(a20,a6,a22)+P1(f16(f4(a23),f16(f13(a24),f16(f15(a25),f15(a26)))),f12(f8(a10,a1)),a21)),
% 0.20/0.64 inference(scs_inference,[],[11,23,7,6,9])).
% 0.20/0.64 cnf(47,plain,
% 0.20/0.64 (~P1(f16(x471,f16(x472,f15(a26))),f12(f8(a10,a1)),a21)),
% 0.20/0.64 inference(scs_inference,[],[12,7,6])).
% 0.20/0.64 cnf(54,plain,
% 0.20/0.64 (~P1(a20,a6,a22)),
% 0.20/0.64 inference(scs_inference,[],[47,33,6])).
% 0.20/0.64 cnf(57,plain,
% 0.20/0.64 ($false),
% 0.20/0.64 inference(scs_inference,[],[23,54,25,5]),
% 0.20/0.64 ['proof']).
% 0.20/0.65 % SZS output end Proof
% 0.20/0.65 % Total time :0.020000s
%------------------------------------------------------------------------------