TSTP Solution File: SWW960+1 by iProver---3.9

View Problem - Process Solution

%------------------------------------------------------------------------------
% File     : iProver---3.9
% Problem  : SWW960+1 : TPTP v8.1.2. Released v7.4.0.
% Transfm  : none
% Format   : tptp:raw
% Command  : run_iprover %s %d THM

% Computer : n026.cluster.edu
% Model    : x86_64 x86_64
% CPU      : Intel(R) Xeon(R) CPU E5-2620 v4 2.10GHz
% Memory   : 8042.1875MB
% OS       : Linux 3.10.0-693.el7.x86_64
% CPULimit : 300s
% WCLimit  : 300s
% DateTime : Fri May  3 03:26:56 EDT 2024

% Result   : Theorem 7.53s 1.62s
% Output   : CNFRefutation 7.53s
% Verified : 
% SZS Type : ERROR: Analysing output (Could not find formula named definition)

% Comments : 
%------------------------------------------------------------------------------
fof(f54,axiom,
    name_A != name_objective,
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax53) ).

fof(f60,axiom,
    name_B != name_objective,
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax59) ).

fof(f79,axiom,
    ! [X0,X1] : constr_adec(constr_aenc(X1,constr_pkey(X0)),X0) = X1,
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax78) ).

fof(f81,axiom,
    ! [X4,X5] : constr_getmess(constr_sign(X5,X4)) = X5,
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax80) ).

fof(f82,axiom,
    ! [X6,X7] : constr_checksign(constr_sign(X7,X6),constr_pkey(X6)) = X7,
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax81) ).

fof(f83,axiom,
    ! [X8,X9] : constr_tuple_2_get_1_bitstring(tuple_2(X8,X9)) = X9,
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax82) ).

fof(f84,axiom,
    ! [X10,X11] : constr_tuple_2_get_0x30_bitstring(tuple_2(X10,X11)) = X10,
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax83) ).

fof(f87,axiom,
    ! [X16,X17] : pred_eq_bitstring_bitstring(X16,X17),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax86) ).

fof(f94,axiom,
    ! [X24] :
      ( pred_attacker(X24)
     => pred_attacker(constr_pkey(X24)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax93) ).

fof(f98,axiom,
    ! [X28] :
      ( pred_attacker(tuple_out_2(X28))
     => pred_attacker(X28) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax97) ).

fof(f102,axiom,
    ! [X32] :
      ( pred_attacker(tuple_key_retrieval_server_out_2(X32))
     => pred_attacker(X32) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax101) ).

fof(f103,axiom,
    ! [X33,X34] :
      ( ( pred_attacker(X34)
        & pred_attacker(X33) )
     => pred_attacker(tuple_key_retrieval_server_in_1(X33,X34)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax102) ).

fof(f106,axiom,
    ! [X39,X40] :
      ( ( pred_attacker(X40)
        & pred_attacker(X39) )
     => pred_attacker(tuple_key_register_server_in_1(X39,X40)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax105) ).

fof(f109,axiom,
    ! [X45] :
      ( pred_attacker(X45)
     => pred_attacker(constr_getmess(X45)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax108) ).

fof(f114,axiom,
    ! [X51] :
      ( pred_attacker(tuple_client_B_out_6(X51))
     => pred_attacker(X51) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax113) ).

fof(f116,axiom,
    ! [X53] :
      ( pred_attacker(tuple_client_B_out_4(X53))
     => pred_attacker(X53) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax115) ).

fof(f120,axiom,
    ! [X60] :
      ( pred_attacker(X60)
     => pred_attacker(tuple_client_B_in_5(X60)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax119) ).

fof(f122,axiom,
    ! [X62] :
      ( pred_attacker(X62)
     => pred_attacker(tuple_client_B_in_3(X62)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax121) ).

fof(f124,axiom,
    ! [X64] :
      ( pred_attacker(X64)
     => pred_attacker(tuple_client_B_in_2(X64)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax123) ).

fof(f127,axiom,
    ! [X67] :
      ( pred_attacker(tuple_client_A_out_5(X67))
     => pred_attacker(X67) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax126) ).

fof(f133,axiom,
    ! [X76] :
      ( pred_attacker(X76)
     => pred_attacker(tuple_client_A_in_4(X76)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax132) ).

fof(f135,axiom,
    ! [X78] :
      ( pred_attacker(X78)
     => pred_attacker(tuple_client_A_in_2(X78)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax134) ).

fof(f138,axiom,
    ! [X82,X83] :
      ( ( pred_attacker(X83)
        & pred_attacker(X82) )
     => pred_attacker(constr_aenc(X82,X83)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax137) ).

fof(f139,axiom,
    ! [X84,X85] :
      ( ( pred_attacker(X85)
        & pred_attacker(X84) )
     => pred_attacker(constr_adec(X84,X85)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax138) ).

fof(f145,axiom,
    ! [X86,X87] :
      ( ( pred_attacker(X87)
        & pred_attacker(X86) )
     => pred_attacker(tuple_2(X86,X87)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax144) ).

fof(f153,axiom,
    pred_attacker(name_A),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax152) ).

fof(f156,axiom,
    pred_table(tuple_keys(name_A,constr_pkey(name_skA))),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax155) ).

fof(f159,axiom,
    pred_attacker(tuple_out_2(constr_pkey(name_skB))),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax158) ).

fof(f163,axiom,
    ! [X100,X101,X102] :
      ( ( pred_attacker(tuple_client_A_in_2(X102))
        & pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X102,constr_pkey(name_skS))))
        & pred_attacker(tuple_client_A_in_4(X101))
        & pred_eq_bitstring_bitstring(name_Na(X100),constr_tuple_2_get_0x30(constr_adec(X101,name_skA))) )
     => pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X101,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X102,constr_pkey(name_skS)))))) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax162) ).

fof(f165,axiom,
    ! [X103,X104,X105] :
      ( ( pred_attacker(tuple_client_B_in_2(X105))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X105,constr_pkey(name_skS))))
        & pred_attacker(tuple_client_B_in_3(X104))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X104,name_skB))) )
     => pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X104,name_skB)),name_Nb(X103)),constr_tuple_2_get_1_bitstring(constr_checksign(X105,constr_pkey(name_skS)))))) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax164) ).

fof(f166,axiom,
    ! [X106,X107,X108,X109] :
      ( ( pred_attacker(tuple_client_B_in_2(X109))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X109,constr_pkey(name_skS))))
        & pred_attacker(tuple_client_B_in_3(X107))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X107,name_skB)))
        & pred_attacker(tuple_client_B_in_5(X108))
        & pred_eq_bitstring_bitstring(name_Nb(X106),constr_adec(X108,name_skB)) )
     => pred_attacker(tuple_client_B_out_6(name_objective)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax165) ).

fof(f167,axiom,
    ! [X110,X111,X112] :
      ( ( pred_attacker(tuple_key_retrieval_server_in_1(X112,X110))
        & pred_table(tuple_keys(X110,X111)) )
     => pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X110,X111),name_skS))) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax166) ).

fof(f168,axiom,
    ! [X113,X114] :
      ( ( pred_attacker(tuple_key_register_server_in_1(X113,X114))
        & name_A != X113
        & name_B != X113 )
     => pred_table(tuple_keys(X113,X114)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax167) ).

fof(f169,conjecture,
    ! [X115] : pred_attacker(tuple_2(name_Nb(X115),name_objective)),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',co0) ).

fof(f170,negated_conjecture,
    ~ ! [X115] : pred_attacker(tuple_2(name_Nb(X115),name_objective)),
    inference(negated_conjecture,[],[f169]) ).

fof(f172,plain,
    ! [X0,X1] : constr_getmess(constr_sign(X1,X0)) = X1,
    inference(rectify,[],[f81]) ).

fof(f173,plain,
    ! [X0,X1] : constr_checksign(constr_sign(X1,X0),constr_pkey(X0)) = X1,
    inference(rectify,[],[f82]) ).

fof(f174,plain,
    ! [X0,X1] : constr_tuple_2_get_1_bitstring(tuple_2(X0,X1)) = X1,
    inference(rectify,[],[f83]) ).

fof(f175,plain,
    ! [X0,X1] : constr_tuple_2_get_0x30_bitstring(tuple_2(X0,X1)) = X0,
    inference(rectify,[],[f84]) ).

fof(f178,plain,
    ! [X0,X1] : pred_eq_bitstring_bitstring(X0,X1),
    inference(rectify,[],[f87]) ).

fof(f184,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(constr_pkey(X0)) ),
    inference(rectify,[],[f94]) ).

fof(f188,plain,
    ! [X0] :
      ( pred_attacker(tuple_out_2(X0))
     => pred_attacker(X0) ),
    inference(rectify,[],[f98]) ).

fof(f192,plain,
    ! [X0] :
      ( pred_attacker(tuple_key_retrieval_server_out_2(X0))
     => pred_attacker(X0) ),
    inference(rectify,[],[f102]) ).

fof(f193,plain,
    ! [X0,X1] :
      ( ( pred_attacker(X1)
        & pred_attacker(X0) )
     => pred_attacker(tuple_key_retrieval_server_in_1(X0,X1)) ),
    inference(rectify,[],[f103]) ).

fof(f196,plain,
    ! [X0,X1] :
      ( ( pred_attacker(X1)
        & pred_attacker(X0) )
     => pred_attacker(tuple_key_register_server_in_1(X0,X1)) ),
    inference(rectify,[],[f106]) ).

fof(f199,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(constr_getmess(X0)) ),
    inference(rectify,[],[f109]) ).

fof(f203,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_out_6(X0))
     => pred_attacker(X0) ),
    inference(rectify,[],[f114]) ).

fof(f205,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_out_4(X0))
     => pred_attacker(X0) ),
    inference(rectify,[],[f116]) ).

fof(f209,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(tuple_client_B_in_5(X0)) ),
    inference(rectify,[],[f120]) ).

fof(f211,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(tuple_client_B_in_3(X0)) ),
    inference(rectify,[],[f122]) ).

fof(f213,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(tuple_client_B_in_2(X0)) ),
    inference(rectify,[],[f124]) ).

fof(f216,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_A_out_5(X0))
     => pred_attacker(X0) ),
    inference(rectify,[],[f127]) ).

fof(f222,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(tuple_client_A_in_4(X0)) ),
    inference(rectify,[],[f133]) ).

fof(f224,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(tuple_client_A_in_2(X0)) ),
    inference(rectify,[],[f135]) ).

fof(f227,plain,
    ! [X0,X1] :
      ( ( pred_attacker(X1)
        & pred_attacker(X0) )
     => pred_attacker(constr_aenc(X0,X1)) ),
    inference(rectify,[],[f138]) ).

fof(f228,plain,
    ! [X0,X1] :
      ( ( pred_attacker(X1)
        & pred_attacker(X0) )
     => pred_attacker(constr_adec(X0,X1)) ),
    inference(rectify,[],[f139]) ).

fof(f229,plain,
    ! [X0,X1] :
      ( ( pred_attacker(X1)
        & pred_attacker(X0) )
     => pred_attacker(tuple_2(X0,X1)) ),
    inference(rectify,[],[f145]) ).

fof(f237,plain,
    ! [X0,X1,X2] :
      ( ( pred_attacker(tuple_client_A_in_2(X2))
        & pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
        & pred_attacker(tuple_client_A_in_4(X1))
        & pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_2_get_0x30(constr_adec(X1,name_skA))) )
     => pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X1,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))))) ),
    inference(rectify,[],[f163]) ).

fof(f238,plain,
    ! [X0,X1,X2] :
      ( ( pred_attacker(tuple_client_B_in_2(X2))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
        & pred_attacker(tuple_client_B_in_3(X1))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB))) )
     => pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skB)),name_Nb(X0)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))))) ),
    inference(rectify,[],[f165]) ).

fof(f239,plain,
    ! [X0,X1,X2,X3] :
      ( ( pred_attacker(tuple_client_B_in_2(X3))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X3,constr_pkey(name_skS))))
        & pred_attacker(tuple_client_B_in_3(X1))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB)))
        & pred_attacker(tuple_client_B_in_5(X2))
        & pred_eq_bitstring_bitstring(name_Nb(X0),constr_adec(X2,name_skB)) )
     => pred_attacker(tuple_client_B_out_6(name_objective)) ),
    inference(rectify,[],[f166]) ).

fof(f240,plain,
    ! [X0,X1,X2] :
      ( ( pred_attacker(tuple_key_retrieval_server_in_1(X2,X0))
        & pred_table(tuple_keys(X0,X1)) )
     => pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS))) ),
    inference(rectify,[],[f167]) ).

fof(f241,plain,
    ! [X0,X1] :
      ( ( pred_attacker(tuple_key_register_server_in_1(X0,X1))
        & name_A != X0
        & name_B != X0 )
     => pred_table(tuple_keys(X0,X1)) ),
    inference(rectify,[],[f168]) ).

fof(f242,plain,
    ~ ! [X0] : pred_attacker(tuple_2(name_Nb(X0),name_objective)),
    inference(rectify,[],[f170]) ).

fof(f250,plain,
    ! [X0] :
      ( pred_attacker(constr_pkey(X0))
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f184]) ).

fof(f254,plain,
    ! [X0] :
      ( pred_attacker(X0)
      | ~ pred_attacker(tuple_out_2(X0)) ),
    inference(ennf_transformation,[],[f188]) ).

fof(f258,plain,
    ! [X0] :
      ( pred_attacker(X0)
      | ~ pred_attacker(tuple_key_retrieval_server_out_2(X0)) ),
    inference(ennf_transformation,[],[f192]) ).

fof(f259,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_key_retrieval_server_in_1(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f193]) ).

fof(f260,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_key_retrieval_server_in_1(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(flattening,[],[f259]) ).

fof(f263,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_key_register_server_in_1(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f196]) ).

fof(f264,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_key_register_server_in_1(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(flattening,[],[f263]) ).

fof(f267,plain,
    ! [X0] :
      ( pred_attacker(constr_getmess(X0))
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f199]) ).

fof(f273,plain,
    ! [X0] :
      ( pred_attacker(X0)
      | ~ pred_attacker(tuple_client_B_out_6(X0)) ),
    inference(ennf_transformation,[],[f203]) ).

fof(f275,plain,
    ! [X0] :
      ( pred_attacker(X0)
      | ~ pred_attacker(tuple_client_B_out_4(X0)) ),
    inference(ennf_transformation,[],[f205]) ).

fof(f280,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_in_5(X0))
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f209]) ).

fof(f282,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_in_3(X0))
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f211]) ).

fof(f284,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_in_2(X0))
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f213]) ).

fof(f287,plain,
    ! [X0] :
      ( pred_attacker(X0)
      | ~ pred_attacker(tuple_client_A_out_5(X0)) ),
    inference(ennf_transformation,[],[f216]) ).

fof(f294,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_A_in_4(X0))
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f222]) ).

fof(f296,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_A_in_2(X0))
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f224]) ).

fof(f300,plain,
    ! [X0,X1] :
      ( pred_attacker(constr_aenc(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f227]) ).

fof(f301,plain,
    ! [X0,X1] :
      ( pred_attacker(constr_aenc(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(flattening,[],[f300]) ).

fof(f302,plain,
    ! [X0,X1] :
      ( pred_attacker(constr_adec(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f228]) ).

fof(f303,plain,
    ! [X0,X1] :
      ( pred_attacker(constr_adec(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(flattening,[],[f302]) ).

fof(f304,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_2(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f229]) ).

fof(f305,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_2(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(flattening,[],[f304]) ).

fof(f314,plain,
    ! [X0,X1,X2] :
      ( pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X1,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
      | ~ pred_attacker(tuple_client_A_in_2(X2))
      | ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
      | ~ pred_attacker(tuple_client_A_in_4(X1))
      | ~ pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_2_get_0x30(constr_adec(X1,name_skA))) ),
    inference(ennf_transformation,[],[f237]) ).

fof(f315,plain,
    ! [X0,X1,X2] :
      ( pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X1,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
      | ~ pred_attacker(tuple_client_A_in_2(X2))
      | ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
      | ~ pred_attacker(tuple_client_A_in_4(X1))
      | ~ pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_2_get_0x30(constr_adec(X1,name_skA))) ),
    inference(flattening,[],[f314]) ).

fof(f316,plain,
    ! [X0,X1,X2] :
      ( pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skB)),name_Nb(X0)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
      | ~ pred_attacker(tuple_client_B_in_2(X2))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
      | ~ pred_attacker(tuple_client_B_in_3(X1))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB))) ),
    inference(ennf_transformation,[],[f238]) ).

fof(f317,plain,
    ! [X0,X1,X2] :
      ( pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skB)),name_Nb(X0)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
      | ~ pred_attacker(tuple_client_B_in_2(X2))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
      | ~ pred_attacker(tuple_client_B_in_3(X1))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB))) ),
    inference(flattening,[],[f316]) ).

fof(f318,plain,
    ! [X0,X1,X2,X3] :
      ( pred_attacker(tuple_client_B_out_6(name_objective))
      | ~ pred_attacker(tuple_client_B_in_2(X3))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X3,constr_pkey(name_skS))))
      | ~ pred_attacker(tuple_client_B_in_3(X1))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB)))
      | ~ pred_attacker(tuple_client_B_in_5(X2))
      | ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_adec(X2,name_skB)) ),
    inference(ennf_transformation,[],[f239]) ).

fof(f319,plain,
    ! [X0,X1,X2,X3] :
      ( pred_attacker(tuple_client_B_out_6(name_objective))
      | ~ pred_attacker(tuple_client_B_in_2(X3))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X3,constr_pkey(name_skS))))
      | ~ pred_attacker(tuple_client_B_in_3(X1))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB)))
      | ~ pred_attacker(tuple_client_B_in_5(X2))
      | ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_adec(X2,name_skB)) ),
    inference(flattening,[],[f318]) ).

fof(f320,plain,
    ! [X0,X1,X2] :
      ( pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS)))
      | ~ pred_attacker(tuple_key_retrieval_server_in_1(X2,X0))
      | ~ pred_table(tuple_keys(X0,X1)) ),
    inference(ennf_transformation,[],[f240]) ).

fof(f321,plain,
    ! [X0,X1,X2] :
      ( pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS)))
      | ~ pred_attacker(tuple_key_retrieval_server_in_1(X2,X0))
      | ~ pred_table(tuple_keys(X0,X1)) ),
    inference(flattening,[],[f320]) ).

fof(f322,plain,
    ! [X0,X1] :
      ( pred_table(tuple_keys(X0,X1))
      | ~ pred_attacker(tuple_key_register_server_in_1(X0,X1))
      | name_A = X0
      | name_B = X0 ),
    inference(ennf_transformation,[],[f241]) ).

fof(f323,plain,
    ! [X0,X1] :
      ( pred_table(tuple_keys(X0,X1))
      | ~ pred_attacker(tuple_key_register_server_in_1(X0,X1))
      | name_A = X0
      | name_B = X0 ),
    inference(flattening,[],[f322]) ).

fof(f324,plain,
    ? [X0] : ~ pred_attacker(tuple_2(name_Nb(X0),name_objective)),
    inference(ennf_transformation,[],[f242]) ).

fof(f325,plain,
    ( ? [X0] : ~ pred_attacker(tuple_2(name_Nb(X0),name_objective))
   => ~ pred_attacker(tuple_2(name_Nb(sK0),name_objective)) ),
    introduced(choice_axiom,[]) ).

fof(f326,plain,
    ~ pred_attacker(tuple_2(name_Nb(sK0),name_objective)),
    inference(skolemisation,[status(esa),new_symbols(skolem,[sK0])],[f324,f325]) ).

fof(f380,plain,
    name_A != name_objective,
    inference(cnf_transformation,[],[f54]) ).

fof(f386,plain,
    name_B != name_objective,
    inference(cnf_transformation,[],[f60]) ).

fof(f405,plain,
    ! [X0,X1] : constr_adec(constr_aenc(X1,constr_pkey(X0)),X0) = X1,
    inference(cnf_transformation,[],[f79]) ).

fof(f407,plain,
    ! [X0,X1] : constr_getmess(constr_sign(X1,X0)) = X1,
    inference(cnf_transformation,[],[f172]) ).

fof(f408,plain,
    ! [X0,X1] : constr_checksign(constr_sign(X1,X0),constr_pkey(X0)) = X1,
    inference(cnf_transformation,[],[f173]) ).

fof(f409,plain,
    ! [X0,X1] : constr_tuple_2_get_1_bitstring(tuple_2(X0,X1)) = X1,
    inference(cnf_transformation,[],[f174]) ).

fof(f410,plain,
    ! [X0,X1] : constr_tuple_2_get_0x30_bitstring(tuple_2(X0,X1)) = X0,
    inference(cnf_transformation,[],[f175]) ).

fof(f413,plain,
    ! [X0,X1] : pred_eq_bitstring_bitstring(X0,X1),
    inference(cnf_transformation,[],[f178]) ).

fof(f420,plain,
    ! [X0] :
      ( pred_attacker(constr_pkey(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f250]) ).

fof(f424,plain,
    ! [X0] :
      ( pred_attacker(X0)
      | ~ pred_attacker(tuple_out_2(X0)) ),
    inference(cnf_transformation,[],[f254]) ).

fof(f428,plain,
    ! [X0] :
      ( pred_attacker(X0)
      | ~ pred_attacker(tuple_key_retrieval_server_out_2(X0)) ),
    inference(cnf_transformation,[],[f258]) ).

fof(f429,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_key_retrieval_server_in_1(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f260]) ).

fof(f432,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_key_register_server_in_1(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f264]) ).

fof(f435,plain,
    ! [X0] :
      ( pred_attacker(constr_getmess(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f267]) ).

fof(f440,plain,
    ! [X0] :
      ( pred_attacker(X0)
      | ~ pred_attacker(tuple_client_B_out_6(X0)) ),
    inference(cnf_transformation,[],[f273]) ).

fof(f442,plain,
    ! [X0] :
      ( pred_attacker(X0)
      | ~ pred_attacker(tuple_client_B_out_4(X0)) ),
    inference(cnf_transformation,[],[f275]) ).

fof(f446,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_in_5(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f280]) ).

fof(f448,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_in_3(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f282]) ).

fof(f450,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_in_2(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f284]) ).

fof(f453,plain,
    ! [X0] :
      ( pred_attacker(X0)
      | ~ pred_attacker(tuple_client_A_out_5(X0)) ),
    inference(cnf_transformation,[],[f287]) ).

fof(f459,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_A_in_4(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f294]) ).

fof(f461,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_A_in_2(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f296]) ).

fof(f464,plain,
    ! [X0,X1] :
      ( pred_attacker(constr_aenc(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f301]) ).

fof(f465,plain,
    ! [X0,X1] :
      ( pred_attacker(constr_adec(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f303]) ).

fof(f471,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_2(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f305]) ).

fof(f479,plain,
    pred_attacker(name_A),
    inference(cnf_transformation,[],[f153]) ).

fof(f481,plain,
    pred_table(tuple_keys(name_A,constr_pkey(name_skA))),
    inference(cnf_transformation,[],[f156]) ).

fof(f484,plain,
    pred_attacker(tuple_out_2(constr_pkey(name_skB))),
    inference(cnf_transformation,[],[f159]) ).

fof(f488,plain,
    ! [X2,X0,X1] :
      ( pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X1,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
      | ~ pred_attacker(tuple_client_A_in_2(X2))
      | ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
      | ~ pred_attacker(tuple_client_A_in_4(X1))
      | ~ pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_2_get_0x30(constr_adec(X1,name_skA))) ),
    inference(cnf_transformation,[],[f315]) ).

fof(f490,plain,
    ! [X2,X0,X1] :
      ( pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skB)),name_Nb(X0)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
      | ~ pred_attacker(tuple_client_B_in_2(X2))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
      | ~ pred_attacker(tuple_client_B_in_3(X1))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB))) ),
    inference(cnf_transformation,[],[f317]) ).

fof(f491,plain,
    ! [X2,X3,X0,X1] :
      ( pred_attacker(tuple_client_B_out_6(name_objective))
      | ~ pred_attacker(tuple_client_B_in_2(X3))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X3,constr_pkey(name_skS))))
      | ~ pred_attacker(tuple_client_B_in_3(X1))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB)))
      | ~ pred_attacker(tuple_client_B_in_5(X2))
      | ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_adec(X2,name_skB)) ),
    inference(cnf_transformation,[],[f319]) ).

fof(f492,plain,
    ! [X2,X0,X1] :
      ( pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS)))
      | ~ pred_attacker(tuple_key_retrieval_server_in_1(X2,X0))
      | ~ pred_table(tuple_keys(X0,X1)) ),
    inference(cnf_transformation,[],[f321]) ).

fof(f493,plain,
    ! [X0,X1] :
      ( pred_table(tuple_keys(X0,X1))
      | ~ pred_attacker(tuple_key_register_server_in_1(X0,X1))
      | name_A = X0
      | name_B = X0 ),
    inference(cnf_transformation,[],[f323]) ).

fof(f494,plain,
    ~ pred_attacker(tuple_2(name_Nb(sK0),name_objective)),
    inference(cnf_transformation,[],[f326]) ).

cnf(c_102,plain,
    name_A != name_objective,
    inference(cnf_transformation,[],[f380]) ).

cnf(c_108,plain,
    name_B != name_objective,
    inference(cnf_transformation,[],[f386]) ).

cnf(c_127,plain,
    constr_adec(constr_aenc(X0,constr_pkey(X1)),X1) = X0,
    inference(cnf_transformation,[],[f405]) ).

cnf(c_129,plain,
    constr_getmess(constr_sign(X0,X1)) = X0,
    inference(cnf_transformation,[],[f407]) ).

cnf(c_130,plain,
    constr_checksign(constr_sign(X0,X1),constr_pkey(X1)) = X0,
    inference(cnf_transformation,[],[f408]) ).

cnf(c_131,plain,
    constr_tuple_2_get_1_bitstring(tuple_2(X0,X1)) = X1,
    inference(cnf_transformation,[],[f409]) ).

cnf(c_132,plain,
    constr_tuple_2_get_0x30_bitstring(tuple_2(X0,X1)) = X0,
    inference(cnf_transformation,[],[f410]) ).

cnf(c_135,plain,
    pred_eq_bitstring_bitstring(X0,X1),
    inference(cnf_transformation,[],[f413]) ).

cnf(c_142,plain,
    ( ~ pred_attacker(X0)
    | pred_attacker(constr_pkey(X0)) ),
    inference(cnf_transformation,[],[f420]) ).

cnf(c_146,plain,
    ( ~ pred_attacker(tuple_out_2(X0))
    | pred_attacker(X0) ),
    inference(cnf_transformation,[],[f424]) ).

cnf(c_150,plain,
    ( ~ pred_attacker(tuple_key_retrieval_server_out_2(X0))
    | pred_attacker(X0) ),
    inference(cnf_transformation,[],[f428]) ).

cnf(c_151,plain,
    ( ~ pred_attacker(X0)
    | ~ pred_attacker(X1)
    | pred_attacker(tuple_key_retrieval_server_in_1(X1,X0)) ),
    inference(cnf_transformation,[],[f429]) ).

cnf(c_154,plain,
    ( ~ pred_attacker(X0)
    | ~ pred_attacker(X1)
    | pred_attacker(tuple_key_register_server_in_1(X1,X0)) ),
    inference(cnf_transformation,[],[f432]) ).

cnf(c_157,plain,
    ( ~ pred_attacker(X0)
    | pred_attacker(constr_getmess(X0)) ),
    inference(cnf_transformation,[],[f435]) ).

cnf(c_162,plain,
    ( ~ pred_attacker(tuple_client_B_out_6(X0))
    | pred_attacker(X0) ),
    inference(cnf_transformation,[],[f440]) ).

cnf(c_164,plain,
    ( ~ pred_attacker(tuple_client_B_out_4(X0))
    | pred_attacker(X0) ),
    inference(cnf_transformation,[],[f442]) ).

cnf(c_168,plain,
    ( ~ pred_attacker(X0)
    | pred_attacker(tuple_client_B_in_5(X0)) ),
    inference(cnf_transformation,[],[f446]) ).

cnf(c_170,plain,
    ( ~ pred_attacker(X0)
    | pred_attacker(tuple_client_B_in_3(X0)) ),
    inference(cnf_transformation,[],[f448]) ).

cnf(c_172,plain,
    ( ~ pred_attacker(X0)
    | pred_attacker(tuple_client_B_in_2(X0)) ),
    inference(cnf_transformation,[],[f450]) ).

cnf(c_175,plain,
    ( ~ pred_attacker(tuple_client_A_out_5(X0))
    | pred_attacker(X0) ),
    inference(cnf_transformation,[],[f453]) ).

cnf(c_181,plain,
    ( ~ pred_attacker(X0)
    | pred_attacker(tuple_client_A_in_4(X0)) ),
    inference(cnf_transformation,[],[f459]) ).

cnf(c_183,plain,
    ( ~ pred_attacker(X0)
    | pred_attacker(tuple_client_A_in_2(X0)) ),
    inference(cnf_transformation,[],[f461]) ).

cnf(c_186,plain,
    ( ~ pred_attacker(X0)
    | ~ pred_attacker(X1)
    | pred_attacker(constr_aenc(X1,X0)) ),
    inference(cnf_transformation,[],[f464]) ).

cnf(c_187,plain,
    ( ~ pred_attacker(X0)
    | ~ pred_attacker(X1)
    | pred_attacker(constr_adec(X1,X0)) ),
    inference(cnf_transformation,[],[f465]) ).

cnf(c_193,plain,
    ( ~ pred_attacker(X0)
    | ~ pred_attacker(X1)
    | pred_attacker(tuple_2(X1,X0)) ),
    inference(cnf_transformation,[],[f471]) ).

cnf(c_201,plain,
    pred_attacker(name_A),
    inference(cnf_transformation,[],[f479]) ).

cnf(c_203,plain,
    pred_table(tuple_keys(name_A,constr_pkey(name_skA))),
    inference(cnf_transformation,[],[f481]) ).

cnf(c_206,plain,
    pred_attacker(tuple_out_2(constr_pkey(name_skB))),
    inference(cnf_transformation,[],[f484]) ).

cnf(c_210,plain,
    ( ~ pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_2_get_0x30(constr_adec(X1,name_skA)))
    | ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
    | ~ pred_attacker(tuple_client_A_in_4(X1))
    | ~ pred_attacker(tuple_client_A_in_2(X2))
    | pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X1,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))))) ),
    inference(cnf_transformation,[],[f488]) ).

cnf(c_212,plain,
    ( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X0,constr_pkey(name_skS))))
    | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB)))
    | ~ pred_attacker(tuple_client_B_in_3(X1))
    | ~ pred_attacker(tuple_client_B_in_2(X0))
    | pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skB)),name_Nb(X2)),constr_tuple_2_get_1_bitstring(constr_checksign(X0,constr_pkey(name_skS)))))) ),
    inference(cnf_transformation,[],[f490]) ).

cnf(c_213,plain,
    ( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X0,constr_pkey(name_skS))))
    | ~ pred_eq_bitstring_bitstring(name_Nb(X1),constr_adec(X2,name_skB))
    | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X3,name_skB)))
    | ~ pred_attacker(tuple_client_B_in_5(X2))
    | ~ pred_attacker(tuple_client_B_in_3(X3))
    | ~ pred_attacker(tuple_client_B_in_2(X0))
    | pred_attacker(tuple_client_B_out_6(name_objective)) ),
    inference(cnf_transformation,[],[f491]) ).

cnf(c_214,plain,
    ( ~ pred_attacker(tuple_key_retrieval_server_in_1(X0,X1))
    | ~ pred_table(tuple_keys(X1,X2))
    | pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X1,X2),name_skS))) ),
    inference(cnf_transformation,[],[f492]) ).

cnf(c_215,plain,
    ( ~ pred_attacker(tuple_key_register_server_in_1(X0,X1))
    | X0 = name_A
    | X0 = name_B
    | pred_table(tuple_keys(X0,X1)) ),
    inference(cnf_transformation,[],[f493]) ).

cnf(c_216,negated_conjecture,
    ~ pred_attacker(tuple_2(name_Nb(sK0),name_objective)),
    inference(cnf_transformation,[],[f494]) ).

cnf(c_224,plain,
    ( ~ pred_attacker(name_A)
    | pred_attacker(tuple_client_B_in_3(name_A)) ),
    inference(instantiation,[status(thm)],[c_170]) ).

cnf(c_225,plain,
    ( ~ pred_attacker(name_A)
    | pred_attacker(tuple_client_B_in_5(name_A)) ),
    inference(instantiation,[status(thm)],[c_168]) ).

cnf(c_233,plain,
    ( ~ pred_attacker(name_A)
    | pred_attacker(constr_pkey(name_A)) ),
    inference(instantiation,[status(thm)],[c_142]) ).

cnf(c_298,plain,
    ( ~ pred_attacker(X0)
    | pred_attacker(tuple_client_B_in_2(X0)) ),
    inference(prop_impl_just,[status(thm)],[c_172]) ).

cnf(c_589,plain,
    ( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X0,constr_pkey(name_skS))))
    | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB)))
    | ~ pred_attacker(tuple_client_B_in_3(X1))
    | ~ pred_attacker(X0)
    | pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skB)),name_Nb(X2)),constr_tuple_2_get_1_bitstring(constr_checksign(X0,constr_pkey(name_skS)))))) ),
    inference(bin_hyper_res,[status(thm)],[c_212,c_298]) ).

cnf(c_590,plain,
    ( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X0,constr_pkey(name_skS))))
    | ~ pred_eq_bitstring_bitstring(name_Nb(X1),constr_adec(X2,name_skB))
    | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X3,name_skB)))
    | ~ pred_attacker(tuple_client_B_in_5(X2))
    | ~ pred_attacker(tuple_client_B_in_3(X3))
    | ~ pred_attacker(X0)
    | pred_attacker(tuple_client_B_out_6(name_objective)) ),
    inference(bin_hyper_res,[status(thm)],[c_213,c_298]) ).

cnf(c_619,plain,
    ( ~ pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_2_get_0x30(constr_adec(X1,name_skA)))
    | ~ pred_attacker(tuple_client_A_in_4(X1))
    | ~ pred_attacker(tuple_client_A_in_2(X2))
    | pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X1,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))))) ),
    inference(backward_subsumption_resolution,[status(thm)],[c_210,c_135]) ).

cnf(c_620,plain,
    ( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X0,name_skB)))
    | ~ pred_attacker(tuple_client_B_in_3(X0))
    | ~ pred_attacker(X1)
    | pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X0,name_skB)),name_Nb(X2)),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS)))))) ),
    inference(backward_subsumption_resolution,[status(thm)],[c_589,c_135]) ).

cnf(c_621,plain,
    ( ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_adec(X1,name_skB))
    | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X2,name_skB)))
    | ~ pred_attacker(tuple_client_B_in_5(X1))
    | ~ pred_attacker(tuple_client_B_in_3(X2))
    | ~ pred_attacker(X3)
    | pred_attacker(tuple_client_B_out_6(name_objective)) ),
    inference(backward_subsumption_resolution,[status(thm)],[c_590,c_135]) ).

cnf(c_1084,plain,
    ( ~ pred_attacker(tuple_client_A_in_4(X0))
    | ~ pred_attacker(tuple_client_A_in_2(X1))
    | pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X0,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS)))))) ),
    inference(forward_subsumption_resolution,[status(thm)],[c_619,c_135]) ).

cnf(c_1099,plain,
    ( ~ pred_attacker(tuple_client_B_in_3(X0))
    | ~ pred_attacker(X1)
    | pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X0,name_skB)),name_Nb(X2)),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS)))))) ),
    inference(forward_subsumption_resolution,[status(thm)],[c_620,c_135]) ).

cnf(c_1116,plain,
    ( ~ pred_attacker(tuple_client_B_in_5(X0))
    | ~ pred_attacker(tuple_client_B_in_3(X1))
    | ~ pred_attacker(X2)
    | pred_attacker(tuple_client_B_out_6(name_objective)) ),
    inference(forward_subsumption_resolution,[status(thm)],[c_621,c_135,c_135]) ).

cnf(c_1117,plain,
    ( ~ pred_attacker(tuple_client_B_in_5(name_A))
    | ~ pred_attacker(tuple_client_B_in_3(name_A))
    | ~ pred_attacker(name_A)
    | pred_attacker(tuple_client_B_out_6(name_objective)) ),
    inference(instantiation,[status(thm)],[c_1116]) ).

cnf(c_1118,plain,
    pred_attacker(tuple_client_B_out_6(name_objective)),
    inference(global_subsumption_just,[status(thm)],[c_1116,c_201,c_224,c_225,c_1117]) ).

cnf(c_1513,plain,
    ( ~ pred_attacker(X0)
    | pred_attacker(tuple_client_B_in_3(X0)) ),
    inference(prop_impl_just,[status(thm)],[c_170]) ).

cnf(c_1529,plain,
    ( ~ pred_attacker(X0)
    | pred_attacker(tuple_client_A_in_4(X0)) ),
    inference(prop_impl_just,[status(thm)],[c_181]) ).

cnf(c_1797,plain,
    ( ~ pred_attacker(tuple_client_A_in_2(X0))
    | ~ pred_attacker(X1)
    | pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X1,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X0,constr_pkey(name_skS)))))) ),
    inference(bin_hyper_res,[status(thm)],[c_1084,c_1529]) ).

cnf(c_1798,plain,
    ( ~ pred_attacker(X0)
    | ~ pred_attacker(X1)
    | pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X0,name_skB)),name_Nb(X2)),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS)))))) ),
    inference(bin_hyper_res,[status(thm)],[c_1099,c_1513]) ).

cnf(c_2621,plain,
    name_Nb(sK0) = sP0_iProver_def,
    definition ).

cnf(c_2622,plain,
    tuple_2(sP0_iProver_def,name_objective) = sP1_iProver_def,
    definition ).

cnf(c_2623,negated_conjecture,
    ~ pred_attacker(sP1_iProver_def),
    inference(demodulation,[status(thm)],[c_216,c_2621,c_2622]) ).

cnf(c_4746,plain,
    ( ~ pred_attacker(X0)
    | ~ pred_attacker(X1)
    | pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X0,name_skB)),sP0_iProver_def),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS)))))) ),
    inference(superposition,[status(thm)],[c_2621,c_1798]) ).

cnf(c_4796,plain,
    pred_attacker(constr_pkey(name_skB)),
    inference(superposition,[status(thm)],[c_206,c_146]) ).

cnf(c_4829,plain,
    pred_attacker(name_objective),
    inference(superposition,[status(thm)],[c_1118,c_162]) ).

cnf(c_4840,plain,
    ( ~ pred_attacker(X0)
    | ~ pred_attacker(X1)
    | pred_attacker(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X0,name_skB)),sP0_iProver_def),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS))))) ),
    inference(superposition,[status(thm)],[c_4746,c_164]) ).

cnf(c_4892,plain,
    ( ~ pred_attacker(tuple_client_A_in_2(X0))
    | ~ pred_attacker(X1)
    | pred_attacker(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X1,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X0,constr_pkey(name_skS))))) ),
    inference(superposition,[status(thm)],[c_1797,c_175]) ).

cnf(c_4928,plain,
    ( ~ pred_attacker(constr_sign(X0,X1))
    | pred_attacker(X0) ),
    inference(superposition,[status(thm)],[c_129,c_157]) ).

cnf(c_5001,plain,
    ( ~ pred_attacker(constr_aenc(X0,constr_pkey(name_skA)))
    | ~ pred_attacker(tuple_client_A_in_2(X1))
    | pred_attacker(constr_aenc(constr_tuple_2_get_1_bitstring(X0),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS))))) ),
    inference(superposition,[status(thm)],[c_127,c_4892]) ).

cnf(c_5003,plain,
    ( ~ pred_attacker(constr_aenc(X0,constr_pkey(name_skB)))
    | ~ pred_attacker(X1)
    | pred_attacker(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(X0),sP0_iProver_def),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS))))) ),
    inference(superposition,[status(thm)],[c_127,c_4840]) ).

cnf(c_5146,plain,
    ( ~ pred_attacker(constr_aenc(X0,constr_pkey(X1)))
    | ~ pred_attacker(X1)
    | pred_attacker(X0) ),
    inference(superposition,[status(thm)],[c_127,c_187]) ).

cnf(c_5156,plain,
    ( ~ pred_attacker(name_objective)
    | ~ pred_attacker(sP0_iProver_def)
    | pred_attacker(sP1_iProver_def) ),
    inference(superposition,[status(thm)],[c_2622,c_193]) ).

cnf(c_5159,plain,
    ~ pred_attacker(sP0_iProver_def),
    inference(forward_subsumption_resolution,[status(thm)],[c_5156,c_2623,c_4829]) ).

cnf(c_5174,plain,
    ( ~ pred_table(tuple_keys(X0,X1))
    | ~ pred_attacker(X0)
    | ~ pred_attacker(X2)
    | pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS))) ),
    inference(superposition,[status(thm)],[c_151,c_214]) ).

cnf(c_5188,plain,
    ( ~ pred_attacker(X0)
    | ~ pred_attacker(X1)
    | X1 = name_A
    | X1 = name_B
    | pred_table(tuple_keys(X1,X0)) ),
    inference(superposition,[status(thm)],[c_154,c_215]) ).

cnf(c_5388,plain,
    ( ~ pred_attacker(constr_aenc(X0,constr_pkey(name_skA)))
    | ~ pred_attacker(tuple_client_A_in_2(constr_sign(X1,name_skS)))
    | pred_attacker(constr_aenc(constr_tuple_2_get_1_bitstring(X0),constr_tuple_2_get_1_bitstring(X1))) ),
    inference(superposition,[status(thm)],[c_130,c_5001]) ).

cnf(c_5843,plain,
    ( ~ pred_table(tuple_keys(X0,X1))
    | ~ pred_attacker(X0)
    | pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS))) ),
    inference(superposition,[status(thm)],[c_4829,c_5174]) ).

cnf(c_5899,plain,
    ( ~ pred_table(tuple_keys(X0,X1))
    | ~ pred_attacker(X0)
    | pred_attacker(constr_sign(tuple_2(X0,X1),name_skS)) ),
    inference(superposition,[status(thm)],[c_5843,c_150]) ).

cnf(c_5911,plain,
    ( ~ pred_table(tuple_keys(X0,X1))
    | ~ pred_attacker(X0)
    | pred_attacker(tuple_2(X0,X1)) ),
    inference(superposition,[status(thm)],[c_5899,c_4928]) ).

cnf(c_5931,plain,
    ( ~ pred_attacker(name_A)
    | pred_attacker(tuple_2(name_A,constr_pkey(name_skA))) ),
    inference(superposition,[status(thm)],[c_203,c_5911]) ).

cnf(c_5935,plain,
    pred_attacker(tuple_2(name_A,constr_pkey(name_skA))),
    inference(forward_subsumption_resolution,[status(thm)],[c_5931,c_201]) ).

cnf(c_6002,plain,
    ( ~ pred_attacker(constr_aenc(tuple_2(X0,X1),constr_pkey(name_skB)))
    | ~ pred_attacker(X2)
    | pred_attacker(constr_aenc(tuple_2(X0,sP0_iProver_def),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))) ),
    inference(superposition,[status(thm)],[c_132,c_5003]) ).

cnf(c_6019,plain,
    ( ~ pred_attacker(constr_aenc(tuple_2(X0,X1),constr_pkey(name_skA)))
    | ~ pred_attacker(tuple_client_A_in_2(constr_sign(X2,name_skS)))
    | pred_attacker(constr_aenc(X1,constr_tuple_2_get_1_bitstring(X2))) ),
    inference(superposition,[status(thm)],[c_131,c_5388]) ).

cnf(c_9847,plain,
    ( ~ pred_attacker(tuple_2(X0,X1))
    | ~ pred_attacker(constr_pkey(name_skB))
    | ~ pred_attacker(X2)
    | pred_attacker(constr_aenc(tuple_2(X0,sP0_iProver_def),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))) ),
    inference(superposition,[status(thm)],[c_186,c_6002]) ).

cnf(c_9862,plain,
    ( ~ pred_attacker(tuple_2(X0,X1))
    | ~ pred_attacker(X2)
    | pred_attacker(constr_aenc(tuple_2(X0,sP0_iProver_def),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))) ),
    inference(forward_subsumption_resolution,[status(thm)],[c_9847,c_4796]) ).

cnf(c_10627,plain,
    ( ~ pred_attacker(X0)
    | pred_attacker(constr_aenc(tuple_2(name_A,sP0_iProver_def),constr_tuple_2_get_1_bitstring(constr_checksign(X0,constr_pkey(name_skS))))) ),
    inference(superposition,[status(thm)],[c_5935,c_9862]) ).

cnf(c_10682,plain,
    ( ~ pred_attacker(constr_sign(X0,name_skS))
    | pred_attacker(constr_aenc(tuple_2(name_A,sP0_iProver_def),constr_tuple_2_get_1_bitstring(X0))) ),
    inference(superposition,[status(thm)],[c_130,c_10627]) ).

cnf(c_10690,plain,
    ( ~ pred_attacker(constr_sign(tuple_2(X0,X1),name_skS))
    | pred_attacker(constr_aenc(tuple_2(name_A,sP0_iProver_def),X1)) ),
    inference(superposition,[status(thm)],[c_131,c_10682]) ).

cnf(c_10729,plain,
    ( ~ pred_table(tuple_keys(X0,X1))
    | ~ pred_attacker(X0)
    | pred_attacker(constr_aenc(tuple_2(name_A,sP0_iProver_def),X1)) ),
    inference(superposition,[status(thm)],[c_5899,c_10690]) ).

cnf(c_11721,plain,
    ( ~ pred_attacker(name_A)
    | pred_attacker(constr_aenc(tuple_2(name_A,sP0_iProver_def),constr_pkey(name_skA))) ),
    inference(superposition,[status(thm)],[c_203,c_10729]) ).

cnf(c_11725,plain,
    pred_attacker(constr_aenc(tuple_2(name_A,sP0_iProver_def),constr_pkey(name_skA))),
    inference(forward_subsumption_resolution,[status(thm)],[c_11721,c_201]) ).

cnf(c_11744,plain,
    ( ~ pred_attacker(tuple_client_A_in_2(constr_sign(X0,name_skS)))
    | pred_attacker(constr_aenc(sP0_iProver_def,constr_tuple_2_get_1_bitstring(X0))) ),
    inference(superposition,[status(thm)],[c_11725,c_6019]) ).

cnf(c_11986,plain,
    ( ~ pred_attacker(constr_sign(X0,name_skS))
    | pred_attacker(constr_aenc(sP0_iProver_def,constr_tuple_2_get_1_bitstring(X0))) ),
    inference(superposition,[status(thm)],[c_183,c_11744]) ).

cnf(c_11994,plain,
    ( ~ pred_attacker(constr_sign(tuple_2(X0,X1),name_skS))
    | pred_attacker(constr_aenc(sP0_iProver_def,X1)) ),
    inference(superposition,[status(thm)],[c_131,c_11986]) ).

cnf(c_12039,plain,
    ( ~ pred_table(tuple_keys(X0,X1))
    | ~ pred_attacker(X0)
    | pred_attacker(constr_aenc(sP0_iProver_def,X1)) ),
    inference(superposition,[status(thm)],[c_5899,c_11994]) ).

cnf(c_12080,plain,
    ( ~ pred_attacker(X0)
    | ~ pred_attacker(X1)
    | X1 = name_A
    | X1 = name_B
    | pred_attacker(constr_aenc(sP0_iProver_def,X0)) ),
    inference(superposition,[status(thm)],[c_5188,c_12039]) ).

cnf(c_16483,plain,
    ( ~ pred_attacker(X0)
    | name_A = name_objective
    | name_B = name_objective
    | pred_attacker(constr_aenc(sP0_iProver_def,X0)) ),
    inference(superposition,[status(thm)],[c_4829,c_12080]) ).

cnf(c_16694,plain,
    ( ~ pred_attacker(X0)
    | pred_attacker(constr_aenc(sP0_iProver_def,X0)) ),
    inference(forward_subsumption_resolution,[status(thm)],[c_16483,c_108,c_102]) ).

cnf(c_16706,plain,
    ( ~ pred_attacker(constr_pkey(X0))
    | ~ pred_attacker(X0)
    | pred_attacker(sP0_iProver_def) ),
    inference(superposition,[status(thm)],[c_16694,c_5146]) ).

cnf(c_16707,plain,
    ( ~ pred_attacker(constr_pkey(X0))
    | ~ pred_attacker(X0) ),
    inference(forward_subsumption_resolution,[status(thm)],[c_16706,c_5159]) ).

cnf(c_16712,plain,
    ( ~ pred_attacker(constr_pkey(name_A))
    | ~ pred_attacker(name_A) ),
    inference(instantiation,[status(thm)],[c_16707]) ).

cnf(c_16713,plain,
    $false,
    inference(prop_impl_just,[status(thm)],[c_16712,c_233,c_201]) ).


%------------------------------------------------------------------------------
%----ORIGINAL SYSTEM OUTPUT
% 0.00/0.10  % Problem  : SWW960+1 : TPTP v8.1.2. Released v7.4.0.
% 0.00/0.11  % Command  : run_iprover %s %d THM
% 0.11/0.32  % Computer : n026.cluster.edu
% 0.11/0.32  % Model    : x86_64 x86_64
% 0.11/0.32  % CPU      : Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz
% 0.11/0.32  % Memory   : 8042.1875MB
% 0.11/0.32  % OS       : Linux 3.10.0-693.el7.x86_64
% 0.11/0.32  % CPULimit : 300
% 0.11/0.32  % WCLimit  : 300
% 0.11/0.32  % DateTime : Thu May  2 22:45:21 EDT 2024
% 0.11/0.32  % CPUTime  : 
% 0.16/0.43  Running first-order theorem proving
% 0.16/0.43  Running: /export/starexec/sandbox2/solver/bin/run_problem --schedule fof_schedule --heuristic_context casc_unsat --no_cores 8 /export/starexec/sandbox2/benchmark/theBenchmark.p 300
% 7.53/1.62  % SZS status Started for theBenchmark.p
% 7.53/1.62  % SZS status Theorem for theBenchmark.p
% 7.53/1.62  
% 7.53/1.62  %---------------- iProver v3.9 (pre CASC 2024/SMT-COMP 2024) ----------------%
% 7.53/1.62  
% 7.53/1.62  ------  iProver source info
% 7.53/1.62  
% 7.53/1.62  git: date: 2024-05-02 19:28:25 +0000
% 7.53/1.62  git: sha1: a33b5eb135c74074ba803943bb12f2ebd971352f
% 7.53/1.62  git: non_committed_changes: false
% 7.53/1.62  
% 7.53/1.62  ------ Parsing...
% 7.53/1.62  ------ Clausification by vclausify_rel  & Parsing by iProver...
% 7.53/1.62  
% 7.53/1.62  ------ Preprocessing... sup_sim: 0  sf_s  rm: 2 0s  sf_e  pe_s  pe:1:0s pe_e  sup_sim: 0  sf_s  rm: 1 0s  sf_e  pe_s  pe_e 
% 7.53/1.62  
% 7.53/1.62  ------ Preprocessing... gs_s  sp: 0 0s  gs_e  snvd_s sp: 0 0s snvd_e 
% 7.53/1.62  
% 7.53/1.62  ------ Preprocessing... sf_s  rm: 1 0s  sf_e  sf_s  rm: 0 0s  sf_e 
% 7.53/1.62  ------ Proving...
% 7.53/1.62  ------ Problem Properties 
% 7.53/1.62  
% 7.53/1.62  
% 7.53/1.62  clauses                                 167
% 7.53/1.62  conjectures                             1
% 7.53/1.62  EPR                                     90
% 7.53/1.62  Horn                                    166
% 7.53/1.62  unary                                   109
% 7.53/1.62  binary                                  43
% 7.53/1.62  lits                                    241
% 7.53/1.62  lits eq                                 90
% 7.53/1.62  fd_pure                                 0
% 7.53/1.62  fd_pseudo                               0
% 7.53/1.62  fd_cond                                 1
% 7.53/1.62  fd_pseudo_cond                          0
% 7.53/1.62  AC symbols                              0
% 7.53/1.62  
% 7.53/1.62  ------ Schedule dynamic 5 is on 
% 7.53/1.62  
% 7.53/1.62  ------ Input Options "--resolution_flag false --inst_lit_sel_side none" Time Limit: 10.
% 7.53/1.62  
% 7.53/1.62  
% 7.53/1.62  ------ 
% 7.53/1.62  Current options:
% 7.53/1.62  ------ 
% 7.53/1.62  
% 7.53/1.62  
% 7.53/1.62  
% 7.53/1.62  
% 7.53/1.62  ------ Proving...
% 7.53/1.62  
% 7.53/1.62  
% 7.53/1.62  % SZS status Theorem for theBenchmark.p
% 7.53/1.62  
% 7.53/1.62  % SZS output start CNFRefutation for theBenchmark.p
% See solution above
% 7.53/1.62  
% 7.53/1.63  
%------------------------------------------------------------------------------