TSTP Solution File: SWW966+1 by iProver---3.9
View Problem
- Process Solution
%------------------------------------------------------------------------------
% File : iProver---3.9
% Problem : SWW966+1 : TPTP v8.1.2. Released v7.4.0.
% Transfm : none
% Format : tptp:raw
% Command : run_iprover %s %d THM
% Computer : n029.cluster.edu
% Model : x86_64 x86_64
% CPU : Intel(R) Xeon(R) CPU E5-2620 v4 2.10GHz
% Memory : 8042.1875MB
% OS : Linux 3.10.0-693.el7.x86_64
% CPULimit : 300s
% WCLimit : 300s
% DateTime : Fri May 3 03:27:01 EDT 2024
% Result : Theorem 111.09s 15.69s
% Output : CNFRefutation 111.09s
% Verified :
% SZS Type : ERROR: Analysing output (Could not find formula named definition)
% Comments :
%------------------------------------------------------------------------------
fof(f67,axiom,
name_A != name_objective,
file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax66) ).
fof(f73,axiom,
name_B != name_objective,
file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax72) ).
fof(f92,axiom,
! [X0,X1] : constr_adec(constr_aenc(X1,constr_pkey(X0)),X0) = X1,
file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax91) ).
fof(f95,axiom,
! [X6,X7] : constr_checksign(constr_sign(X7,X6),constr_pkey(X6)) = X7,
file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax94) ).
fof(f96,axiom,
! [X8] : constr_ZERO = constr_xor(X8,X8),
file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax95) ).
fof(f97,axiom,
! [X9] : constr_xor(X9,constr_ZERO) = X9,
file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax96) ).
fof(f98,axiom,
! [X10,X11] : constr_xor(X10,X11) = constr_xor(X11,X10),
file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax97) ).
fof(f99,axiom,
! [X12,X13,X14] : constr_xor(X12,constr_xor(X13,X14)) = constr_xor(constr_xor(X12,X13),X14),
file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax98) ).
fof(f100,axiom,
! [X15,X16] : constr_tuple_2_get_1_bitstring(tuple_2(X15,X16)) = X16,
file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax99) ).
fof(f101,axiom,
! [X17,X18] : constr_tuple_2_get_0x30_bitstring(tuple_2(X17,X18)) = X17,
file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax100) ).
fof(f104,axiom,
! [X23,X24] : pred_eq_bitstring_bitstring(X23,X24),
file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax103) ).
fof(f105,axiom,
! [X25,X26] :
( ( pred_attacker(X26)
& pred_attacker(X25) )
=> pred_attacker(constr_xor(X25,X26)) ),
file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax104) ).
fof(f112,axiom,
! [X33] :
( pred_attacker(X33)
=> pred_attacker(constr_pkey(X33)) ),
file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax111) ).
fof(f120,axiom,
! [X41] :
( pred_attacker(tuple_key_retrieval_server_out_2(X41))
=> pred_attacker(X41) ),
file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax119) ).
fof(f121,axiom,
! [X42,X43] :
( ( pred_attacker(X43)
& pred_attacker(X42) )
=> pred_attacker(tuple_key_retrieval_server_in_1(X42,X43)) ),
file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax120) ).
fof(f124,axiom,
! [X48,X49] :
( ( pred_attacker(X49)
& pred_attacker(X48) )
=> pred_attacker(tuple_key_register_server_in_1(X48,X49)) ),
file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax123) ).
fof(f132,axiom,
! [X60] :
( pred_attacker(tuple_client_B_out_6(X60))
=> pred_attacker(X60) ),
file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax131) ).
fof(f134,axiom,
! [X62] :
( pred_attacker(tuple_client_B_out_4(X62))
=> pred_attacker(X62) ),
file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax133) ).
fof(f138,axiom,
! [X69] :
( pred_attacker(X69)
=> pred_attacker(tuple_client_B_in_5(X69)) ),
file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax137) ).
fof(f140,axiom,
! [X71] :
( pred_attacker(X71)
=> pred_attacker(tuple_client_B_in_3(X71)) ),
file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax139) ).
fof(f142,axiom,
! [X73] :
( pred_attacker(X73)
=> pred_attacker(tuple_client_B_in_2(X73)) ),
file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax141) ).
fof(f145,axiom,
! [X76] :
( pred_attacker(tuple_client_A_out_5(X76))
=> pred_attacker(X76) ),
file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax144) ).
fof(f147,axiom,
! [X78] :
( pred_attacker(tuple_client_A_out_3(X78))
=> pred_attacker(X78) ),
file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax146) ).
fof(f151,axiom,
! [X85] :
( pred_attacker(X85)
=> pred_attacker(tuple_client_A_in_4(X85)) ),
file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax150) ).
fof(f153,axiom,
! [X87] :
( pred_attacker(X87)
=> pred_attacker(tuple_client_A_in_2(X87)) ),
file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax152) ).
fof(f157,axiom,
! [X93,X94] :
( ( pred_attacker(X94)
& pred_attacker(X93) )
=> pred_attacker(constr_adec(X93,X94)) ),
file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax156) ).
fof(f158,axiom,
pred_attacker(constr_ZERO),
file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax157) ).
fof(f164,axiom,
! [X95,X96] :
( ( pred_attacker(X96)
& pred_attacker(X95) )
=> pred_attacker(tuple_2(X95,X96)) ),
file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax163) ).
fof(f171,axiom,
pred_attacker(name_B),
file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax170) ).
fof(f172,axiom,
pred_attacker(name_A),
file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax171) ).
fof(f175,axiom,
pred_table(tuple_keys(name_A,constr_pkey(name_skA))),
file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax174) ).
fof(f176,axiom,
pred_table(tuple_keys(name_B,constr_pkey(name_skB))),
file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax175) ).
fof(f181,axiom,
! [X107,X108] :
( ( pred_attacker(tuple_client_A_in_2(X108))
& pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X108,constr_pkey(name_skS)))) )
=> pred_attacker(tuple_client_A_out_3(constr_aenc(tuple_2(name_Na(X107),name_A),constr_tuple_2_get_1_bitstring(constr_checksign(X108,constr_pkey(name_skS)))))) ),
file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax180) ).
fof(f182,axiom,
! [X109,X110,X111] :
( ( pred_attacker(tuple_client_A_in_2(X111))
& pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X111,constr_pkey(name_skS))))
& pred_attacker(tuple_client_A_in_4(X110))
& pred_eq_bitstring_bitstring(name_I,constr_xor(constr_tuple_2_get_0x30_bitstring(constr_adec(X110,name_skA)),name_Na(X109))) )
=> pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X110,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X111,constr_pkey(name_skS)))))) ),
file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax181) ).
fof(f184,axiom,
! [X112,X113,X114] :
( ( pred_attacker(tuple_client_B_in_2(X114))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X114,constr_pkey(name_skS))))
& pred_attacker(tuple_client_B_in_3(X113))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X113,name_skB))) )
=> pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_xor(constr_tuple_2_get_0x30_bitstring(constr_adec(X113,name_skB)),name_B),name_Nb(X112)),constr_tuple_2_get_1_bitstring(constr_checksign(X114,constr_pkey(name_skS)))))) ),
file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax183) ).
fof(f185,axiom,
! [X115,X116,X117,X118] :
( ( pred_attacker(tuple_client_B_in_2(X118))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X118,constr_pkey(name_skS))))
& pred_attacker(tuple_client_B_in_3(X116))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X116,name_skB)))
& pred_attacker(tuple_client_B_in_5(X117))
& pred_eq_bitstring_bitstring(name_Nb(X115),constr_adec(X117,name_skB)) )
=> pred_attacker(tuple_client_B_out_6(name_objective)) ),
file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax184) ).
fof(f186,axiom,
! [X119,X120,X121] :
( ( pred_attacker(tuple_key_retrieval_server_in_1(X121,X119))
& pred_table(tuple_keys(X119,X120)) )
=> pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X119,X120),name_skS))) ),
file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax185) ).
fof(f187,axiom,
! [X122,X123] :
( ( pred_attacker(tuple_key_register_server_in_1(X122,X123))
& name_A != X122
& name_B != X122 )
=> pred_table(tuple_keys(X122,X123)) ),
file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax186) ).
fof(f188,conjecture,
! [X124] : pred_attacker(tuple_2(name_Nb(X124),name_objective)),
file('/export/starexec/sandbox/benchmark/theBenchmark.p',co0) ).
fof(f189,negated_conjecture,
~ ! [X124] : pred_attacker(tuple_2(name_Nb(X124),name_objective)),
inference(negated_conjecture,[],[f188]) ).
fof(f192,plain,
! [X0,X1] : constr_checksign(constr_sign(X1,X0),constr_pkey(X0)) = X1,
inference(rectify,[],[f95]) ).
fof(f193,plain,
! [X0] : constr_ZERO = constr_xor(X0,X0),
inference(rectify,[],[f96]) ).
fof(f194,plain,
! [X0] : constr_xor(X0,constr_ZERO) = X0,
inference(rectify,[],[f97]) ).
fof(f195,plain,
! [X0,X1] : constr_xor(X0,X1) = constr_xor(X1,X0),
inference(rectify,[],[f98]) ).
fof(f196,plain,
! [X0,X1,X2] : constr_xor(X0,constr_xor(X1,X2)) = constr_xor(constr_xor(X0,X1),X2),
inference(rectify,[],[f99]) ).
fof(f197,plain,
! [X0,X1] : constr_tuple_2_get_1_bitstring(tuple_2(X0,X1)) = X1,
inference(rectify,[],[f100]) ).
fof(f198,plain,
! [X0,X1] : constr_tuple_2_get_0x30_bitstring(tuple_2(X0,X1)) = X0,
inference(rectify,[],[f101]) ).
fof(f201,plain,
! [X0,X1] : pred_eq_bitstring_bitstring(X0,X1),
inference(rectify,[],[f104]) ).
fof(f202,plain,
! [X0,X1] :
( ( pred_attacker(X1)
& pred_attacker(X0) )
=> pred_attacker(constr_xor(X0,X1)) ),
inference(rectify,[],[f105]) ).
fof(f208,plain,
! [X0] :
( pred_attacker(X0)
=> pred_attacker(constr_pkey(X0)) ),
inference(rectify,[],[f112]) ).
fof(f216,plain,
! [X0] :
( pred_attacker(tuple_key_retrieval_server_out_2(X0))
=> pred_attacker(X0) ),
inference(rectify,[],[f120]) ).
fof(f217,plain,
! [X0,X1] :
( ( pred_attacker(X1)
& pred_attacker(X0) )
=> pred_attacker(tuple_key_retrieval_server_in_1(X0,X1)) ),
inference(rectify,[],[f121]) ).
fof(f220,plain,
! [X0,X1] :
( ( pred_attacker(X1)
& pred_attacker(X0) )
=> pred_attacker(tuple_key_register_server_in_1(X0,X1)) ),
inference(rectify,[],[f124]) ).
fof(f227,plain,
! [X0] :
( pred_attacker(tuple_client_B_out_6(X0))
=> pred_attacker(X0) ),
inference(rectify,[],[f132]) ).
fof(f229,plain,
! [X0] :
( pred_attacker(tuple_client_B_out_4(X0))
=> pred_attacker(X0) ),
inference(rectify,[],[f134]) ).
fof(f233,plain,
! [X0] :
( pred_attacker(X0)
=> pred_attacker(tuple_client_B_in_5(X0)) ),
inference(rectify,[],[f138]) ).
fof(f235,plain,
! [X0] :
( pred_attacker(X0)
=> pred_attacker(tuple_client_B_in_3(X0)) ),
inference(rectify,[],[f140]) ).
fof(f237,plain,
! [X0] :
( pred_attacker(X0)
=> pred_attacker(tuple_client_B_in_2(X0)) ),
inference(rectify,[],[f142]) ).
fof(f240,plain,
! [X0] :
( pred_attacker(tuple_client_A_out_5(X0))
=> pred_attacker(X0) ),
inference(rectify,[],[f145]) ).
fof(f242,plain,
! [X0] :
( pred_attacker(tuple_client_A_out_3(X0))
=> pred_attacker(X0) ),
inference(rectify,[],[f147]) ).
fof(f246,plain,
! [X0] :
( pred_attacker(X0)
=> pred_attacker(tuple_client_A_in_4(X0)) ),
inference(rectify,[],[f151]) ).
fof(f248,plain,
! [X0] :
( pred_attacker(X0)
=> pred_attacker(tuple_client_A_in_2(X0)) ),
inference(rectify,[],[f153]) ).
fof(f252,plain,
! [X0,X1] :
( ( pred_attacker(X1)
& pred_attacker(X0) )
=> pred_attacker(constr_adec(X0,X1)) ),
inference(rectify,[],[f157]) ).
fof(f253,plain,
! [X0,X1] :
( ( pred_attacker(X1)
& pred_attacker(X0) )
=> pred_attacker(tuple_2(X0,X1)) ),
inference(rectify,[],[f164]) ).
fof(f260,plain,
! [X0,X1] :
( ( pred_attacker(tuple_client_A_in_2(X1))
& pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X1,constr_pkey(name_skS)))) )
=> pred_attacker(tuple_client_A_out_3(constr_aenc(tuple_2(name_Na(X0),name_A),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS)))))) ),
inference(rectify,[],[f181]) ).
fof(f261,plain,
! [X0,X1,X2] :
( ( pred_attacker(tuple_client_A_in_2(X2))
& pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
& pred_attacker(tuple_client_A_in_4(X1))
& pred_eq_bitstring_bitstring(name_I,constr_xor(constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skA)),name_Na(X0))) )
=> pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X1,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))))) ),
inference(rectify,[],[f182]) ).
fof(f262,plain,
! [X0,X1,X2] :
( ( pred_attacker(tuple_client_B_in_2(X2))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
& pred_attacker(tuple_client_B_in_3(X1))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB))) )
=> pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_xor(constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skB)),name_B),name_Nb(X0)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))))) ),
inference(rectify,[],[f184]) ).
fof(f263,plain,
! [X0,X1,X2,X3] :
( ( pred_attacker(tuple_client_B_in_2(X3))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X3,constr_pkey(name_skS))))
& pred_attacker(tuple_client_B_in_3(X1))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB)))
& pred_attacker(tuple_client_B_in_5(X2))
& pred_eq_bitstring_bitstring(name_Nb(X0),constr_adec(X2,name_skB)) )
=> pred_attacker(tuple_client_B_out_6(name_objective)) ),
inference(rectify,[],[f185]) ).
fof(f264,plain,
! [X0,X1,X2] :
( ( pred_attacker(tuple_key_retrieval_server_in_1(X2,X0))
& pred_table(tuple_keys(X0,X1)) )
=> pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS))) ),
inference(rectify,[],[f186]) ).
fof(f265,plain,
! [X0,X1] :
( ( pred_attacker(tuple_key_register_server_in_1(X0,X1))
& name_A != X0
& name_B != X0 )
=> pred_table(tuple_keys(X0,X1)) ),
inference(rectify,[],[f187]) ).
fof(f266,plain,
~ ! [X0] : pred_attacker(tuple_2(name_Nb(X0),name_objective)),
inference(rectify,[],[f189]) ).
fof(f268,plain,
! [X0,X1] :
( pred_attacker(constr_xor(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f202]) ).
fof(f269,plain,
! [X0,X1] :
( pred_attacker(constr_xor(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(flattening,[],[f268]) ).
fof(f276,plain,
! [X0] :
( pred_attacker(constr_pkey(X0))
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f208]) ).
fof(f284,plain,
! [X0] :
( pred_attacker(X0)
| ~ pred_attacker(tuple_key_retrieval_server_out_2(X0)) ),
inference(ennf_transformation,[],[f216]) ).
fof(f285,plain,
! [X0,X1] :
( pred_attacker(tuple_key_retrieval_server_in_1(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f217]) ).
fof(f286,plain,
! [X0,X1] :
( pred_attacker(tuple_key_retrieval_server_in_1(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(flattening,[],[f285]) ).
fof(f289,plain,
! [X0,X1] :
( pred_attacker(tuple_key_register_server_in_1(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f220]) ).
fof(f290,plain,
! [X0,X1] :
( pred_attacker(tuple_key_register_server_in_1(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(flattening,[],[f289]) ).
fof(f299,plain,
! [X0] :
( pred_attacker(X0)
| ~ pred_attacker(tuple_client_B_out_6(X0)) ),
inference(ennf_transformation,[],[f227]) ).
fof(f301,plain,
! [X0] :
( pred_attacker(X0)
| ~ pred_attacker(tuple_client_B_out_4(X0)) ),
inference(ennf_transformation,[],[f229]) ).
fof(f306,plain,
! [X0] :
( pred_attacker(tuple_client_B_in_5(X0))
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f233]) ).
fof(f308,plain,
! [X0] :
( pred_attacker(tuple_client_B_in_3(X0))
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f235]) ).
fof(f310,plain,
! [X0] :
( pred_attacker(tuple_client_B_in_2(X0))
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f237]) ).
fof(f313,plain,
! [X0] :
( pred_attacker(X0)
| ~ pred_attacker(tuple_client_A_out_5(X0)) ),
inference(ennf_transformation,[],[f240]) ).
fof(f315,plain,
! [X0] :
( pred_attacker(X0)
| ~ pred_attacker(tuple_client_A_out_3(X0)) ),
inference(ennf_transformation,[],[f242]) ).
fof(f320,plain,
! [X0] :
( pred_attacker(tuple_client_A_in_4(X0))
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f246]) ).
fof(f322,plain,
! [X0] :
( pred_attacker(tuple_client_A_in_2(X0))
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f248]) ).
fof(f328,plain,
! [X0,X1] :
( pred_attacker(constr_adec(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f252]) ).
fof(f329,plain,
! [X0,X1] :
( pred_attacker(constr_adec(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(flattening,[],[f328]) ).
fof(f330,plain,
! [X0,X1] :
( pred_attacker(tuple_2(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f253]) ).
fof(f331,plain,
! [X0,X1] :
( pred_attacker(tuple_2(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(flattening,[],[f330]) ).
fof(f338,plain,
! [X0,X1] :
( pred_attacker(tuple_client_A_out_3(constr_aenc(tuple_2(name_Na(X0),name_A),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS))))))
| ~ pred_attacker(tuple_client_A_in_2(X1))
| ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X1,constr_pkey(name_skS)))) ),
inference(ennf_transformation,[],[f260]) ).
fof(f339,plain,
! [X0,X1] :
( pred_attacker(tuple_client_A_out_3(constr_aenc(tuple_2(name_Na(X0),name_A),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS))))))
| ~ pred_attacker(tuple_client_A_in_2(X1))
| ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X1,constr_pkey(name_skS)))) ),
inference(flattening,[],[f338]) ).
fof(f340,plain,
! [X0,X1,X2] :
( pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X1,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
| ~ pred_attacker(tuple_client_A_in_2(X2))
| ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_A_in_4(X1))
| ~ pred_eq_bitstring_bitstring(name_I,constr_xor(constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skA)),name_Na(X0))) ),
inference(ennf_transformation,[],[f261]) ).
fof(f341,plain,
! [X0,X1,X2] :
( pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X1,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
| ~ pred_attacker(tuple_client_A_in_2(X2))
| ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_A_in_4(X1))
| ~ pred_eq_bitstring_bitstring(name_I,constr_xor(constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skA)),name_Na(X0))) ),
inference(flattening,[],[f340]) ).
fof(f342,plain,
! [X0,X1,X2] :
( pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_xor(constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skB)),name_B),name_Nb(X0)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
| ~ pred_attacker(tuple_client_B_in_2(X2))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB))) ),
inference(ennf_transformation,[],[f262]) ).
fof(f343,plain,
! [X0,X1,X2] :
( pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_xor(constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skB)),name_B),name_Nb(X0)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
| ~ pred_attacker(tuple_client_B_in_2(X2))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB))) ),
inference(flattening,[],[f342]) ).
fof(f344,plain,
! [X0,X1,X2,X3] :
( pred_attacker(tuple_client_B_out_6(name_objective))
| ~ pred_attacker(tuple_client_B_in_2(X3))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X3,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB)))
| ~ pred_attacker(tuple_client_B_in_5(X2))
| ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_adec(X2,name_skB)) ),
inference(ennf_transformation,[],[f263]) ).
fof(f345,plain,
! [X0,X1,X2,X3] :
( pred_attacker(tuple_client_B_out_6(name_objective))
| ~ pred_attacker(tuple_client_B_in_2(X3))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X3,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB)))
| ~ pred_attacker(tuple_client_B_in_5(X2))
| ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_adec(X2,name_skB)) ),
inference(flattening,[],[f344]) ).
fof(f346,plain,
! [X0,X1,X2] :
( pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS)))
| ~ pred_attacker(tuple_key_retrieval_server_in_1(X2,X0))
| ~ pred_table(tuple_keys(X0,X1)) ),
inference(ennf_transformation,[],[f264]) ).
fof(f347,plain,
! [X0,X1,X2] :
( pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS)))
| ~ pred_attacker(tuple_key_retrieval_server_in_1(X2,X0))
| ~ pred_table(tuple_keys(X0,X1)) ),
inference(flattening,[],[f346]) ).
fof(f348,plain,
! [X0,X1] :
( pred_table(tuple_keys(X0,X1))
| ~ pred_attacker(tuple_key_register_server_in_1(X0,X1))
| name_A = X0
| name_B = X0 ),
inference(ennf_transformation,[],[f265]) ).
fof(f349,plain,
! [X0,X1] :
( pred_table(tuple_keys(X0,X1))
| ~ pred_attacker(tuple_key_register_server_in_1(X0,X1))
| name_A = X0
| name_B = X0 ),
inference(flattening,[],[f348]) ).
fof(f350,plain,
? [X0] : ~ pred_attacker(tuple_2(name_Nb(X0),name_objective)),
inference(ennf_transformation,[],[f266]) ).
fof(f351,plain,
( ? [X0] : ~ pred_attacker(tuple_2(name_Nb(X0),name_objective))
=> ~ pred_attacker(tuple_2(name_Nb(sK0),name_objective)) ),
introduced(choice_axiom,[]) ).
fof(f352,plain,
~ pred_attacker(tuple_2(name_Nb(sK0),name_objective)),
inference(skolemisation,[status(esa),new_symbols(skolem,[sK0])],[f350,f351]) ).
fof(f419,plain,
name_A != name_objective,
inference(cnf_transformation,[],[f67]) ).
fof(f425,plain,
name_B != name_objective,
inference(cnf_transformation,[],[f73]) ).
fof(f444,plain,
! [X0,X1] : constr_adec(constr_aenc(X1,constr_pkey(X0)),X0) = X1,
inference(cnf_transformation,[],[f92]) ).
fof(f447,plain,
! [X0,X1] : constr_checksign(constr_sign(X1,X0),constr_pkey(X0)) = X1,
inference(cnf_transformation,[],[f192]) ).
fof(f448,plain,
! [X0] : constr_ZERO = constr_xor(X0,X0),
inference(cnf_transformation,[],[f193]) ).
fof(f449,plain,
! [X0] : constr_xor(X0,constr_ZERO) = X0,
inference(cnf_transformation,[],[f194]) ).
fof(f450,plain,
! [X0,X1] : constr_xor(X0,X1) = constr_xor(X1,X0),
inference(cnf_transformation,[],[f195]) ).
fof(f451,plain,
! [X2,X0,X1] : constr_xor(X0,constr_xor(X1,X2)) = constr_xor(constr_xor(X0,X1),X2),
inference(cnf_transformation,[],[f196]) ).
fof(f452,plain,
! [X0,X1] : constr_tuple_2_get_1_bitstring(tuple_2(X0,X1)) = X1,
inference(cnf_transformation,[],[f197]) ).
fof(f453,plain,
! [X0,X1] : constr_tuple_2_get_0x30_bitstring(tuple_2(X0,X1)) = X0,
inference(cnf_transformation,[],[f198]) ).
fof(f456,plain,
! [X0,X1] : pred_eq_bitstring_bitstring(X0,X1),
inference(cnf_transformation,[],[f201]) ).
fof(f457,plain,
! [X0,X1] :
( pred_attacker(constr_xor(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f269]) ).
fof(f464,plain,
! [X0] :
( pred_attacker(constr_pkey(X0))
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f276]) ).
fof(f472,plain,
! [X0] :
( pred_attacker(X0)
| ~ pred_attacker(tuple_key_retrieval_server_out_2(X0)) ),
inference(cnf_transformation,[],[f284]) ).
fof(f473,plain,
! [X0,X1] :
( pred_attacker(tuple_key_retrieval_server_in_1(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f286]) ).
fof(f476,plain,
! [X0,X1] :
( pred_attacker(tuple_key_register_server_in_1(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f290]) ).
fof(f484,plain,
! [X0] :
( pred_attacker(X0)
| ~ pred_attacker(tuple_client_B_out_6(X0)) ),
inference(cnf_transformation,[],[f299]) ).
fof(f486,plain,
! [X0] :
( pred_attacker(X0)
| ~ pred_attacker(tuple_client_B_out_4(X0)) ),
inference(cnf_transformation,[],[f301]) ).
fof(f490,plain,
! [X0] :
( pred_attacker(tuple_client_B_in_5(X0))
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f306]) ).
fof(f492,plain,
! [X0] :
( pred_attacker(tuple_client_B_in_3(X0))
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f308]) ).
fof(f494,plain,
! [X0] :
( pred_attacker(tuple_client_B_in_2(X0))
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f310]) ).
fof(f497,plain,
! [X0] :
( pred_attacker(X0)
| ~ pred_attacker(tuple_client_A_out_5(X0)) ),
inference(cnf_transformation,[],[f313]) ).
fof(f499,plain,
! [X0] :
( pred_attacker(X0)
| ~ pred_attacker(tuple_client_A_out_3(X0)) ),
inference(cnf_transformation,[],[f315]) ).
fof(f503,plain,
! [X0] :
( pred_attacker(tuple_client_A_in_4(X0))
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f320]) ).
fof(f505,plain,
! [X0] :
( pred_attacker(tuple_client_A_in_2(X0))
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f322]) ).
fof(f509,plain,
! [X0,X1] :
( pred_attacker(constr_adec(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f329]) ).
fof(f510,plain,
pred_attacker(constr_ZERO),
inference(cnf_transformation,[],[f158]) ).
fof(f516,plain,
! [X0,X1] :
( pred_attacker(tuple_2(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f331]) ).
fof(f523,plain,
pred_attacker(name_B),
inference(cnf_transformation,[],[f171]) ).
fof(f524,plain,
pred_attacker(name_A),
inference(cnf_transformation,[],[f172]) ).
fof(f526,plain,
pred_table(tuple_keys(name_A,constr_pkey(name_skA))),
inference(cnf_transformation,[],[f175]) ).
fof(f527,plain,
pred_table(tuple_keys(name_B,constr_pkey(name_skB))),
inference(cnf_transformation,[],[f176]) ).
fof(f532,plain,
! [X0,X1] :
( pred_attacker(tuple_client_A_out_3(constr_aenc(tuple_2(name_Na(X0),name_A),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS))))))
| ~ pred_attacker(tuple_client_A_in_2(X1))
| ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X1,constr_pkey(name_skS)))) ),
inference(cnf_transformation,[],[f339]) ).
fof(f533,plain,
! [X2,X0,X1] :
( pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X1,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
| ~ pred_attacker(tuple_client_A_in_2(X2))
| ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_A_in_4(X1))
| ~ pred_eq_bitstring_bitstring(name_I,constr_xor(constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skA)),name_Na(X0))) ),
inference(cnf_transformation,[],[f341]) ).
fof(f535,plain,
! [X2,X0,X1] :
( pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_xor(constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skB)),name_B),name_Nb(X0)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
| ~ pred_attacker(tuple_client_B_in_2(X2))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB))) ),
inference(cnf_transformation,[],[f343]) ).
fof(f536,plain,
! [X2,X3,X0,X1] :
( pred_attacker(tuple_client_B_out_6(name_objective))
| ~ pred_attacker(tuple_client_B_in_2(X3))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X3,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB)))
| ~ pred_attacker(tuple_client_B_in_5(X2))
| ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_adec(X2,name_skB)) ),
inference(cnf_transformation,[],[f345]) ).
fof(f537,plain,
! [X2,X0,X1] :
( pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS)))
| ~ pred_attacker(tuple_key_retrieval_server_in_1(X2,X0))
| ~ pred_table(tuple_keys(X0,X1)) ),
inference(cnf_transformation,[],[f347]) ).
fof(f538,plain,
! [X0,X1] :
( pred_table(tuple_keys(X0,X1))
| ~ pred_attacker(tuple_key_register_server_in_1(X0,X1))
| name_A = X0
| name_B = X0 ),
inference(cnf_transformation,[],[f349]) ).
fof(f539,plain,
~ pred_attacker(tuple_2(name_Nb(sK0),name_objective)),
inference(cnf_transformation,[],[f352]) ).
cnf(c_115,plain,
name_A != name_objective,
inference(cnf_transformation,[],[f419]) ).
cnf(c_121,plain,
name_B != name_objective,
inference(cnf_transformation,[],[f425]) ).
cnf(c_140,plain,
constr_adec(constr_aenc(X0,constr_pkey(X1)),X1) = X0,
inference(cnf_transformation,[],[f444]) ).
cnf(c_143,plain,
constr_checksign(constr_sign(X0,X1),constr_pkey(X1)) = X0,
inference(cnf_transformation,[],[f447]) ).
cnf(c_144,plain,
constr_xor(X0,X0) = constr_ZERO,
inference(cnf_transformation,[],[f448]) ).
cnf(c_145,plain,
constr_xor(X0,constr_ZERO) = X0,
inference(cnf_transformation,[],[f449]) ).
cnf(c_146,plain,
constr_xor(X0,X1) = constr_xor(X1,X0),
inference(cnf_transformation,[],[f450]) ).
cnf(c_147,plain,
constr_xor(constr_xor(X0,X1),X2) = constr_xor(X0,constr_xor(X1,X2)),
inference(cnf_transformation,[],[f451]) ).
cnf(c_148,plain,
constr_tuple_2_get_1_bitstring(tuple_2(X0,X1)) = X1,
inference(cnf_transformation,[],[f452]) ).
cnf(c_149,plain,
constr_tuple_2_get_0x30_bitstring(tuple_2(X0,X1)) = X0,
inference(cnf_transformation,[],[f453]) ).
cnf(c_152,plain,
pred_eq_bitstring_bitstring(X0,X1),
inference(cnf_transformation,[],[f456]) ).
cnf(c_153,plain,
( ~ pred_attacker(X0)
| ~ pred_attacker(X1)
| pred_attacker(constr_xor(X1,X0)) ),
inference(cnf_transformation,[],[f457]) ).
cnf(c_160,plain,
( ~ pred_attacker(X0)
| pred_attacker(constr_pkey(X0)) ),
inference(cnf_transformation,[],[f464]) ).
cnf(c_168,plain,
( ~ pred_attacker(tuple_key_retrieval_server_out_2(X0))
| pred_attacker(X0) ),
inference(cnf_transformation,[],[f472]) ).
cnf(c_169,plain,
( ~ pred_attacker(X0)
| ~ pred_attacker(X1)
| pred_attacker(tuple_key_retrieval_server_in_1(X1,X0)) ),
inference(cnf_transformation,[],[f473]) ).
cnf(c_172,plain,
( ~ pred_attacker(X0)
| ~ pred_attacker(X1)
| pred_attacker(tuple_key_register_server_in_1(X1,X0)) ),
inference(cnf_transformation,[],[f476]) ).
cnf(c_180,plain,
( ~ pred_attacker(tuple_client_B_out_6(X0))
| pred_attacker(X0) ),
inference(cnf_transformation,[],[f484]) ).
cnf(c_182,plain,
( ~ pred_attacker(tuple_client_B_out_4(X0))
| pred_attacker(X0) ),
inference(cnf_transformation,[],[f486]) ).
cnf(c_186,plain,
( ~ pred_attacker(X0)
| pred_attacker(tuple_client_B_in_5(X0)) ),
inference(cnf_transformation,[],[f490]) ).
cnf(c_188,plain,
( ~ pred_attacker(X0)
| pred_attacker(tuple_client_B_in_3(X0)) ),
inference(cnf_transformation,[],[f492]) ).
cnf(c_190,plain,
( ~ pred_attacker(X0)
| pred_attacker(tuple_client_B_in_2(X0)) ),
inference(cnf_transformation,[],[f494]) ).
cnf(c_193,plain,
( ~ pred_attacker(tuple_client_A_out_5(X0))
| pred_attacker(X0) ),
inference(cnf_transformation,[],[f497]) ).
cnf(c_195,plain,
( ~ pred_attacker(tuple_client_A_out_3(X0))
| pred_attacker(X0) ),
inference(cnf_transformation,[],[f499]) ).
cnf(c_199,plain,
( ~ pred_attacker(X0)
| pred_attacker(tuple_client_A_in_4(X0)) ),
inference(cnf_transformation,[],[f503]) ).
cnf(c_201,plain,
( ~ pred_attacker(X0)
| pred_attacker(tuple_client_A_in_2(X0)) ),
inference(cnf_transformation,[],[f505]) ).
cnf(c_205,plain,
( ~ pred_attacker(X0)
| ~ pred_attacker(X1)
| pred_attacker(constr_adec(X1,X0)) ),
inference(cnf_transformation,[],[f509]) ).
cnf(c_206,plain,
pred_attacker(constr_ZERO),
inference(cnf_transformation,[],[f510]) ).
cnf(c_212,plain,
( ~ pred_attacker(X0)
| ~ pred_attacker(X1)
| pred_attacker(tuple_2(X1,X0)) ),
inference(cnf_transformation,[],[f516]) ).
cnf(c_219,plain,
pred_attacker(name_B),
inference(cnf_transformation,[],[f523]) ).
cnf(c_220,plain,
pred_attacker(name_A),
inference(cnf_transformation,[],[f524]) ).
cnf(c_222,plain,
pred_table(tuple_keys(name_A,constr_pkey(name_skA))),
inference(cnf_transformation,[],[f526]) ).
cnf(c_223,plain,
pred_table(tuple_keys(name_B,constr_pkey(name_skB))),
inference(cnf_transformation,[],[f527]) ).
cnf(c_228,plain,
( ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X0,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_A_in_2(X0))
| pred_attacker(tuple_client_A_out_3(constr_aenc(tuple_2(name_Na(X1),name_A),constr_tuple_2_get_1_bitstring(constr_checksign(X0,constr_pkey(name_skS)))))) ),
inference(cnf_transformation,[],[f532]) ).
cnf(c_229,plain,
( ~ pred_eq_bitstring_bitstring(name_I,constr_xor(constr_tuple_2_get_0x30_bitstring(constr_adec(X0,name_skA)),name_Na(X1)))
| ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_A_in_4(X0))
| ~ pred_attacker(tuple_client_A_in_2(X2))
| pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X0,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))))) ),
inference(cnf_transformation,[],[f533]) ).
cnf(c_231,plain,
( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X0,constr_pkey(name_skS))))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB)))
| ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_attacker(tuple_client_B_in_2(X0))
| pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_xor(constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skB)),name_B),name_Nb(X2)),constr_tuple_2_get_1_bitstring(constr_checksign(X0,constr_pkey(name_skS)))))) ),
inference(cnf_transformation,[],[f535]) ).
cnf(c_232,plain,
( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X0,constr_pkey(name_skS))))
| ~ pred_eq_bitstring_bitstring(name_Nb(X1),constr_adec(X2,name_skB))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X3,name_skB)))
| ~ pred_attacker(tuple_client_B_in_5(X2))
| ~ pred_attacker(tuple_client_B_in_3(X3))
| ~ pred_attacker(tuple_client_B_in_2(X0))
| pred_attacker(tuple_client_B_out_6(name_objective)) ),
inference(cnf_transformation,[],[f536]) ).
cnf(c_233,plain,
( ~ pred_attacker(tuple_key_retrieval_server_in_1(X0,X1))
| ~ pred_table(tuple_keys(X1,X2))
| pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X1,X2),name_skS))) ),
inference(cnf_transformation,[],[f537]) ).
cnf(c_234,plain,
( ~ pred_attacker(tuple_key_register_server_in_1(X0,X1))
| X0 = name_A
| X0 = name_B
| pred_table(tuple_keys(X0,X1)) ),
inference(cnf_transformation,[],[f538]) ).
cnf(c_235,negated_conjecture,
~ pred_attacker(tuple_2(name_Nb(sK0),name_objective)),
inference(cnf_transformation,[],[f539]) ).
cnf(c_243,plain,
( ~ pred_attacker(name_A)
| pred_attacker(tuple_client_B_in_3(name_A)) ),
inference(instantiation,[status(thm)],[c_188]) ).
cnf(c_244,plain,
( ~ pred_attacker(name_A)
| pred_attacker(tuple_client_B_in_5(name_A)) ),
inference(instantiation,[status(thm)],[c_186]) ).
cnf(c_252,plain,
( ~ pred_attacker(name_A)
| pred_attacker(constr_pkey(name_A)) ),
inference(instantiation,[status(thm)],[c_160]) ).
cnf(c_288,plain,
( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X0,constr_pkey(name_skS))))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB)))
| ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_attacker(tuple_client_B_in_2(X0))
| pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_xor(name_B,constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skB))),name_Nb(X2)),constr_tuple_2_get_1_bitstring(constr_checksign(X0,constr_pkey(name_skS)))))) ),
inference(theory_normalisation,[status(thm)],[c_231,c_147,c_146]) ).
cnf(c_323,plain,
( ~ pred_attacker(X0)
| pred_attacker(tuple_client_B_in_2(X0)) ),
inference(prop_impl_just,[status(thm)],[c_190]) ).
cnf(c_335,plain,
( ~ pred_attacker(X0)
| pred_attacker(tuple_client_A_in_4(X0)) ),
inference(prop_impl_just,[status(thm)],[c_199]) ).
cnf(c_339,plain,
( ~ pred_attacker(X0)
| pred_attacker(tuple_client_A_in_2(X0)) ),
inference(prop_impl_just,[status(thm)],[c_201]) ).
cnf(c_631,plain,
( ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X0,constr_pkey(name_skS))))
| ~ pred_attacker(X0)
| pred_attacker(tuple_client_A_out_3(constr_aenc(tuple_2(name_Na(X1),name_A),constr_tuple_2_get_1_bitstring(constr_checksign(X0,constr_pkey(name_skS)))))) ),
inference(bin_hyper_res,[status(thm)],[c_228,c_339]) ).
cnf(c_632,plain,
( ~ pred_eq_bitstring_bitstring(name_I,constr_xor(constr_tuple_2_get_0x30_bitstring(constr_adec(X0,name_skA)),name_Na(X1)))
| ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_A_in_2(X2))
| ~ pred_attacker(X0)
| pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X0,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))))) ),
inference(bin_hyper_res,[status(thm)],[c_229,c_335]) ).
cnf(c_633,plain,
( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X0,constr_pkey(name_skS))))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB)))
| ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_attacker(X0)
| pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_xor(name_B,constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skB))),name_Nb(X2)),constr_tuple_2_get_1_bitstring(constr_checksign(X0,constr_pkey(name_skS)))))) ),
inference(bin_hyper_res,[status(thm)],[c_288,c_323]) ).
cnf(c_634,plain,
( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X0,constr_pkey(name_skS))))
| ~ pred_eq_bitstring_bitstring(name_Nb(X1),constr_adec(X2,name_skB))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X3,name_skB)))
| ~ pred_attacker(tuple_client_B_in_5(X2))
| ~ pred_attacker(tuple_client_B_in_3(X3))
| ~ pred_attacker(X0)
| pred_attacker(tuple_client_B_out_6(name_objective)) ),
inference(bin_hyper_res,[status(thm)],[c_232,c_323]) ).
cnf(c_665,plain,
( ~ pred_attacker(X0)
| pred_attacker(tuple_client_A_out_3(constr_aenc(tuple_2(name_Na(X1),name_A),constr_tuple_2_get_1_bitstring(constr_checksign(X0,constr_pkey(name_skS)))))) ),
inference(backward_subsumption_resolution,[status(thm)],[c_631,c_152]) ).
cnf(c_666,plain,
( ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X0,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_A_in_2(X0))
| ~ pred_attacker(X1)
| pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X1,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X0,constr_pkey(name_skS)))))) ),
inference(backward_subsumption_resolution,[status(thm)],[c_632,c_152]) ).
cnf(c_667,plain,
( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X0,name_skB)))
| ~ pred_attacker(tuple_client_B_in_3(X0))
| ~ pred_attacker(X1)
| pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_xor(name_B,constr_tuple_2_get_0x30_bitstring(constr_adec(X0,name_skB))),name_Nb(X2)),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS)))))) ),
inference(backward_subsumption_resolution,[status(thm)],[c_633,c_152]) ).
cnf(c_668,plain,
( ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_adec(X1,name_skB))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X2,name_skB)))
| ~ pred_attacker(tuple_client_B_in_5(X1))
| ~ pred_attacker(tuple_client_B_in_3(X2))
| ~ pred_attacker(X3)
| pred_attacker(tuple_client_B_out_6(name_objective)) ),
inference(backward_subsumption_resolution,[status(thm)],[c_634,c_152]) ).
cnf(c_1171,plain,
( ~ pred_attacker(tuple_client_A_in_2(X0))
| ~ pred_attacker(X1)
| pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X1,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X0,constr_pkey(name_skS)))))) ),
inference(forward_subsumption_resolution,[status(thm)],[c_666,c_152]) ).
cnf(c_1186,plain,
( ~ pred_attacker(tuple_client_B_in_3(X0))
| ~ pred_attacker(X1)
| pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_xor(name_B,constr_tuple_2_get_0x30_bitstring(constr_adec(X0,name_skB))),name_Nb(X2)),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS)))))) ),
inference(forward_subsumption_resolution,[status(thm)],[c_667,c_152]) ).
cnf(c_1203,plain,
( ~ pred_attacker(tuple_client_B_in_5(X0))
| ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_attacker(X2)
| pred_attacker(tuple_client_B_out_6(name_objective)) ),
inference(forward_subsumption_resolution,[status(thm)],[c_668,c_152,c_152]) ).
cnf(c_1204,plain,
( ~ pred_attacker(tuple_client_B_in_5(name_A))
| ~ pred_attacker(tuple_client_B_in_3(name_A))
| ~ pred_attacker(name_A)
| pred_attacker(tuple_client_B_out_6(name_objective)) ),
inference(instantiation,[status(thm)],[c_1203]) ).
cnf(c_1205,plain,
pred_attacker(tuple_client_B_out_6(name_objective)),
inference(global_subsumption_just,[status(thm)],[c_1203,c_220,c_243,c_244,c_1204]) ).
cnf(c_1607,plain,
( ~ pred_attacker(X0)
| pred_attacker(tuple_client_B_in_3(X0)) ),
inference(prop_impl_just,[status(thm)],[c_188]) ).
cnf(c_1627,plain,
( ~ pred_attacker(X0)
| pred_attacker(tuple_client_A_in_2(X0)) ),
inference(prop_impl_just,[status(thm)],[c_201]) ).
cnf(c_1641,plain,
( ~ pred_attacker(X0)
| pred_attacker(tuple_client_A_out_3(constr_aenc(tuple_2(name_Na(X1),name_A),constr_tuple_2_get_1_bitstring(constr_checksign(X0,constr_pkey(name_skS)))))) ),
inference(prop_impl_just,[status(thm)],[c_665]) ).
cnf(c_1909,plain,
( ~ pred_attacker(X0)
| ~ pred_attacker(X1)
| pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X1,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X0,constr_pkey(name_skS)))))) ),
inference(bin_hyper_res,[status(thm)],[c_1171,c_1627]) ).
cnf(c_1910,plain,
( ~ pred_attacker(X0)
| ~ pred_attacker(X1)
| pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_xor(name_B,constr_tuple_2_get_0x30_bitstring(constr_adec(X0,name_skB))),name_Nb(X2)),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS)))))) ),
inference(bin_hyper_res,[status(thm)],[c_1186,c_1607]) ).
cnf(c_2782,plain,
name_Nb(sK0) = sP0_iProver_def,
definition ).
cnf(c_2783,plain,
tuple_2(sP0_iProver_def,name_objective) = sP1_iProver_def,
definition ).
cnf(c_2784,negated_conjecture,
~ pred_attacker(sP1_iProver_def),
inference(demodulation,[status(thm)],[c_235,c_2782,c_2783]) ).
cnf(c_5300,plain,
constr_xor(constr_ZERO,X0) = X0,
inference(superposition,[status(thm)],[c_145,c_146]) ).
cnf(c_5494,plain,
( ~ pred_attacker(constr_xor(X0,X1))
| ~ pred_attacker(X2)
| pred_attacker(constr_xor(X0,constr_xor(X1,X2))) ),
inference(superposition,[status(thm)],[c_147,c_153]) ).
cnf(c_5509,plain,
( ~ pred_table(tuple_keys(X0,X1))
| ~ pred_attacker(X0)
| ~ pred_attacker(X2)
| pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS))) ),
inference(superposition,[status(thm)],[c_169,c_233]) ).
cnf(c_5710,plain,
( ~ pred_attacker(constr_xor(X0,X1))
| ~ pred_attacker(X2)
| pred_attacker(constr_xor(constr_xor(X1,X2),X0)) ),
inference(superposition,[status(thm)],[c_146,c_5494]) ).
cnf(c_5737,plain,
( ~ pred_attacker(constr_xor(X0,X1))
| ~ pred_attacker(X2)
| pred_attacker(constr_xor(X1,constr_xor(X2,X0))) ),
inference(theory_normalisation,[status(thm)],[c_5710,c_147,c_146]) ).
cnf(c_5981,plain,
( ~ pred_attacker(constr_xor(X0,X1))
| ~ pred_attacker(constr_ZERO)
| pred_attacker(constr_xor(X1,X0)) ),
inference(superposition,[status(thm)],[c_5300,c_5737]) ).
cnf(c_5987,plain,
( ~ pred_attacker(constr_xor(X0,X1))
| pred_attacker(constr_xor(X1,X0)) ),
inference(forward_subsumption_resolution,[status(thm)],[c_5981,c_206]) ).
cnf(c_6076,plain,
( ~ pred_attacker(constr_xor(X0,constr_xor(X1,X2)))
| pred_attacker(constr_xor(X2,constr_xor(X0,X1))) ),
inference(superposition,[status(thm)],[c_147,c_5987]) ).
cnf(c_6114,plain,
( ~ pred_attacker(constr_xor(X0,constr_xor(X1,constr_xor(X2,X3))))
| pred_attacker(constr_xor(X3,constr_xor(X0,constr_xor(X1,X2)))) ),
inference(superposition,[status(thm)],[c_147,c_6076]) ).
cnf(c_8299,plain,
( ~ pred_attacker(constr_ZERO)
| pred_attacker(constr_xor(X0,constr_xor(constr_xor(X1,constr_xor(X2,X0)),constr_xor(X1,X2)))) ),
inference(superposition,[status(thm)],[c_144,c_6114]) ).
cnf(c_8337,plain,
( ~ pred_attacker(constr_ZERO)
| pred_attacker(constr_xor(X0,constr_xor(X1,constr_xor(X2,constr_xor(X0,constr_xor(X1,X2)))))) ),
inference(theory_normalisation,[status(thm)],[c_8299,c_147,c_146]) ).
cnf(c_8338,plain,
pred_attacker(constr_xor(X0,constr_xor(X1,constr_xor(X2,constr_xor(X0,constr_xor(X1,X2)))))),
inference(forward_subsumption_resolution,[status(thm)],[c_8337,c_206]) ).
cnf(c_8399,plain,
pred_attacker(constr_xor(X0,constr_xor(constr_xor(X1,X2),constr_xor(X3,constr_xor(X0,constr_xor(X1,constr_xor(X2,X3))))))),
inference(superposition,[status(thm)],[c_147,c_8338]) ).
cnf(c_8475,plain,
pred_attacker(constr_xor(X0,constr_xor(X1,constr_xor(X2,constr_xor(X3,constr_xor(X0,constr_xor(X1,constr_xor(X2,X3)))))))),
inference(theory_normalisation,[status(thm)],[c_8399,c_147,c_146]) ).
cnf(c_8654,plain,
pred_attacker(constr_xor(X0,constr_xor(X1,constr_xor(X2,constr_xor(X3,constr_xor(X0,constr_xor(constr_xor(X2,X3),X1))))))),
inference(superposition,[status(thm)],[c_146,c_8475]) ).
cnf(c_8714,plain,
pred_attacker(constr_xor(X0,constr_xor(X1,constr_xor(X2,constr_xor(X3,constr_xor(X0,constr_xor(X2,constr_xor(X3,X1)))))))),
inference(theory_normalisation,[status(thm)],[c_8654,c_147,c_146]) ).
cnf(c_25034,plain,
( ~ pred_table(tuple_keys(X0,X1))
| ~ pred_attacker(X0)
| pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS))) ),
inference(superposition,[status(thm)],[c_8714,c_5509]) ).
cnf(c_278903,plain,
( ~ pred_attacker(X0)
| ~ pred_attacker(X1)
| pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_xor(name_B,constr_tuple_2_get_0x30_bitstring(constr_adec(X0,name_skB))),sP0_iProver_def),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS)))))) ),
inference(superposition,[status(thm)],[c_2782,c_1910]) ).
cnf(c_278985,plain,
pred_attacker(name_objective),
inference(superposition,[status(thm)],[c_1205,c_180]) ).
cnf(c_278996,plain,
( ~ pred_attacker(X0)
| ~ pred_attacker(X1)
| pred_attacker(constr_aenc(tuple_2(constr_xor(name_B,constr_tuple_2_get_0x30_bitstring(constr_adec(X0,name_skB))),sP0_iProver_def),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS))))) ),
inference(superposition,[status(thm)],[c_278903,c_182]) ).
cnf(c_279046,plain,
( ~ pred_attacker(X0)
| ~ pred_attacker(X1)
| pred_attacker(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X1,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X0,constr_pkey(name_skS))))) ),
inference(superposition,[status(thm)],[c_1909,c_193]) ).
cnf(c_279059,plain,
( ~ pred_attacker(X0)
| pred_attacker(constr_aenc(tuple_2(name_Na(X1),name_A),constr_tuple_2_get_1_bitstring(constr_checksign(X0,constr_pkey(name_skS))))) ),
inference(superposition,[status(thm)],[c_1641,c_195]) ).
cnf(c_279157,plain,
( ~ pred_attacker(constr_aenc(X0,constr_pkey(name_skB)))
| ~ pred_attacker(X1)
| pred_attacker(constr_aenc(tuple_2(constr_xor(name_B,constr_tuple_2_get_0x30_bitstring(X0)),sP0_iProver_def),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS))))) ),
inference(superposition,[status(thm)],[c_140,c_278996]) ).
cnf(c_279161,plain,
( ~ pred_attacker(constr_aenc(X0,constr_pkey(name_skA)))
| ~ pred_attacker(X1)
| pred_attacker(constr_aenc(constr_tuple_2_get_1_bitstring(X0),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS))))) ),
inference(superposition,[status(thm)],[c_140,c_279046]) ).
cnf(c_279305,plain,
( ~ pred_attacker(constr_sign(X0,name_skS))
| pred_attacker(constr_aenc(tuple_2(name_Na(X1),name_A),constr_tuple_2_get_1_bitstring(X0))) ),
inference(superposition,[status(thm)],[c_143,c_279059]) ).
cnf(c_279338,plain,
( ~ pred_attacker(constr_aenc(X0,constr_pkey(X1)))
| ~ pred_attacker(X1)
| pred_attacker(X0) ),
inference(superposition,[status(thm)],[c_140,c_205]) ).
cnf(c_279348,plain,
( ~ pred_attacker(name_objective)
| ~ pred_attacker(sP0_iProver_def)
| pred_attacker(sP1_iProver_def) ),
inference(superposition,[status(thm)],[c_2783,c_212]) ).
cnf(c_279351,plain,
~ pred_attacker(sP0_iProver_def),
inference(forward_subsumption_resolution,[status(thm)],[c_279348,c_2784,c_278985]) ).
cnf(c_279438,plain,
( ~ pred_attacker(constr_aenc(tuple_2(X0,X1),constr_pkey(name_skB)))
| ~ pred_attacker(X2)
| pred_attacker(constr_aenc(tuple_2(constr_xor(name_B,X0),sP0_iProver_def),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))) ),
inference(superposition,[status(thm)],[c_149,c_279157]) ).
cnf(c_279457,plain,
( ~ pred_table(tuple_keys(X0,X1))
| ~ pred_attacker(X0)
| ~ pred_attacker(X2)
| pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS))) ),
inference(superposition,[status(thm)],[c_169,c_233]) ).
cnf(c_279470,plain,
( ~ pred_attacker(X0)
| ~ pred_attacker(X1)
| X1 = name_A
| X1 = name_B
| pred_table(tuple_keys(X1,X0)) ),
inference(superposition,[status(thm)],[c_172,c_234]) ).
cnf(c_279534,plain,
( ~ pred_attacker(constr_sign(tuple_2(X0,X1),name_skS))
| pred_attacker(constr_aenc(tuple_2(name_Na(X2),name_A),X1)) ),
inference(superposition,[status(thm)],[c_148,c_279305]) ).
cnf(c_280950,plain,
( ~ pred_attacker(constr_aenc(X0,constr_pkey(name_skA)))
| ~ pred_attacker(constr_sign(X1,name_skS))
| pred_attacker(constr_aenc(constr_tuple_2_get_1_bitstring(X0),constr_tuple_2_get_1_bitstring(X1))) ),
inference(superposition,[status(thm)],[c_143,c_279161]) ).
cnf(c_283396,plain,
( ~ pred_attacker(constr_aenc(tuple_2(X0,X1),constr_pkey(name_skA)))
| ~ pred_attacker(constr_sign(X2,name_skS))
| pred_attacker(constr_aenc(X1,constr_tuple_2_get_1_bitstring(X2))) ),
inference(superposition,[status(thm)],[c_148,c_280950]) ).
cnf(c_284093,plain,
( ~ pred_attacker(X0)
| ~ pred_table(tuple_keys(X0,X1))
| pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS))) ),
inference(global_subsumption_just,[status(thm)],[c_279457,c_25034]) ).
cnf(c_284094,plain,
( ~ pred_table(tuple_keys(X0,X1))
| ~ pred_attacker(X0)
| pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS))) ),
inference(renaming,[status(thm)],[c_284093]) ).
cnf(c_284102,plain,
( ~ pred_table(tuple_keys(X0,X1))
| ~ pred_attacker(X0)
| pred_attacker(constr_sign(tuple_2(X0,X1),name_skS)) ),
inference(superposition,[status(thm)],[c_284094,c_168]) ).
cnf(c_284117,plain,
( ~ pred_table(tuple_keys(X0,X1))
| ~ pred_attacker(X0)
| pred_attacker(constr_aenc(tuple_2(name_Na(X2),name_A),X1)) ),
inference(superposition,[status(thm)],[c_284102,c_279534]) ).
cnf(c_284167,plain,
( ~ pred_attacker(name_B)
| pred_attacker(constr_aenc(tuple_2(name_Na(X0),name_A),constr_pkey(name_skB))) ),
inference(superposition,[status(thm)],[c_223,c_284117]) ).
cnf(c_284168,plain,
pred_attacker(constr_aenc(tuple_2(name_Na(X0),name_A),constr_pkey(name_skB))),
inference(forward_subsumption_resolution,[status(thm)],[c_284167,c_219]) ).
cnf(c_284171,plain,
( ~ pred_attacker(X0)
| pred_attacker(constr_aenc(tuple_2(constr_xor(name_B,name_Na(X1)),sP0_iProver_def),constr_tuple_2_get_1_bitstring(constr_checksign(X0,constr_pkey(name_skS))))) ),
inference(superposition,[status(thm)],[c_284168,c_279438]) ).
cnf(c_284620,plain,
( ~ pred_attacker(constr_sign(X0,name_skS))
| pred_attacker(constr_aenc(tuple_2(constr_xor(name_B,name_Na(X1)),sP0_iProver_def),constr_tuple_2_get_1_bitstring(X0))) ),
inference(superposition,[status(thm)],[c_143,c_284171]) ).
cnf(c_284627,plain,
( ~ pred_attacker(constr_sign(tuple_2(X0,X1),name_skS))
| pred_attacker(constr_aenc(tuple_2(constr_xor(name_B,name_Na(X2)),sP0_iProver_def),X1)) ),
inference(superposition,[status(thm)],[c_148,c_284620]) ).
cnf(c_284649,plain,
( ~ pred_table(tuple_keys(X0,X1))
| ~ pred_attacker(X0)
| pred_attacker(constr_aenc(tuple_2(constr_xor(name_B,name_Na(X2)),sP0_iProver_def),X1)) ),
inference(superposition,[status(thm)],[c_284102,c_284627]) ).
cnf(c_293954,plain,
( ~ pred_attacker(name_A)
| pred_attacker(constr_aenc(tuple_2(constr_xor(name_B,name_Na(X0)),sP0_iProver_def),constr_pkey(name_skA))) ),
inference(superposition,[status(thm)],[c_222,c_284649]) ).
cnf(c_293958,plain,
pred_attacker(constr_aenc(tuple_2(constr_xor(name_B,name_Na(X0)),sP0_iProver_def),constr_pkey(name_skA))),
inference(forward_subsumption_resolution,[status(thm)],[c_293954,c_220]) ).
cnf(c_296487,plain,
( ~ pred_attacker(constr_sign(X0,name_skS))
| pred_attacker(constr_aenc(sP0_iProver_def,constr_tuple_2_get_1_bitstring(X0))) ),
inference(superposition,[status(thm)],[c_293958,c_283396]) ).
cnf(c_296596,plain,
( ~ pred_attacker(constr_sign(tuple_2(X0,X1),name_skS))
| pred_attacker(constr_aenc(sP0_iProver_def,X1)) ),
inference(superposition,[status(thm)],[c_148,c_296487]) ).
cnf(c_296615,plain,
( ~ pred_table(tuple_keys(X0,X1))
| ~ pred_attacker(X0)
| pred_attacker(constr_aenc(sP0_iProver_def,X1)) ),
inference(superposition,[status(thm)],[c_284102,c_296596]) ).
cnf(c_296665,plain,
( ~ pred_attacker(X0)
| ~ pred_attacker(X1)
| X1 = name_A
| X1 = name_B
| pred_attacker(constr_aenc(sP0_iProver_def,X0)) ),
inference(superposition,[status(thm)],[c_279470,c_296615]) ).
cnf(c_469173,plain,
( ~ pred_attacker(X0)
| name_A = name_objective
| name_B = name_objective
| pred_attacker(constr_aenc(sP0_iProver_def,X0)) ),
inference(superposition,[status(thm)],[c_278985,c_296665]) ).
cnf(c_469479,plain,
( ~ pred_attacker(X0)
| pred_attacker(constr_aenc(sP0_iProver_def,X0)) ),
inference(forward_subsumption_resolution,[status(thm)],[c_469173,c_121,c_115]) ).
cnf(c_469490,plain,
( ~ pred_attacker(constr_pkey(X0))
| ~ pred_attacker(X0)
| pred_attacker(sP0_iProver_def) ),
inference(superposition,[status(thm)],[c_469479,c_279338]) ).
cnf(c_469491,plain,
( ~ pred_attacker(constr_pkey(X0))
| ~ pred_attacker(X0) ),
inference(forward_subsumption_resolution,[status(thm)],[c_469490,c_279351]) ).
cnf(c_469495,plain,
( ~ pred_attacker(constr_pkey(name_A))
| ~ pred_attacker(name_A) ),
inference(instantiation,[status(thm)],[c_469491]) ).
cnf(c_469496,plain,
$false,
inference(prop_impl_just,[status(thm)],[c_469495,c_252,c_220]) ).
%------------------------------------------------------------------------------
%----ORIGINAL SYSTEM OUTPUT
% 0.03/0.10 % Problem : SWW966+1 : TPTP v8.1.2. Released v7.4.0.
% 0.03/0.11 % Command : run_iprover %s %d THM
% 0.11/0.31 % Computer : n029.cluster.edu
% 0.11/0.31 % Model : x86_64 x86_64
% 0.11/0.31 % CPU : Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz
% 0.11/0.31 % Memory : 8042.1875MB
% 0.11/0.31 % OS : Linux 3.10.0-693.el7.x86_64
% 0.11/0.32 % CPULimit : 300
% 0.11/0.32 % WCLimit : 300
% 0.11/0.32 % DateTime : Thu May 2 22:37:37 EDT 2024
% 0.11/0.32 % CPUTime :
% 0.16/0.42 Running first-order theorem proving
% 0.16/0.42 Running: /export/starexec/sandbox/solver/bin/run_problem --schedule fof_schedule --heuristic_context casc_unsat --no_cores 8 /export/starexec/sandbox/benchmark/theBenchmark.p 300
% 111.09/15.69 % SZS status Started for theBenchmark.p
% 111.09/15.69 % SZS status Theorem for theBenchmark.p
% 111.09/15.69
% 111.09/15.69 %---------------- iProver v3.9 (pre CASC 2024/SMT-COMP 2024) ----------------%
% 111.09/15.69
% 111.09/15.69 ------ iProver source info
% 111.09/15.69
% 111.09/15.69 git: date: 2024-05-02 19:28:25 +0000
% 111.09/15.69 git: sha1: a33b5eb135c74074ba803943bb12f2ebd971352f
% 111.09/15.69 git: non_committed_changes: false
% 111.09/15.69
% 111.09/15.69 ------ Parsing...
% 111.09/15.69 ------ Clausification by vclausify_rel & Parsing by iProver...
% 111.09/15.69
% 111.09/15.69 ------ Preprocessing... sup_sim: 0 sf_s rm: 2 0s sf_e pe_s pe:1:0s pe_e sup_sim: 0 sf_s rm: 1 0s sf_e pe_s pe_e
% 111.09/15.69
% 111.09/15.69 ------ Preprocessing... gs_s sp: 0 0s gs_e snvd_s sp: 0 0s snvd_e
% 111.09/15.69
% 111.09/15.69 ------ Preprocessing... sf_s rm: 1 0s sf_e sf_s rm: 0 0s sf_e
% 111.09/15.69 ------ Proving...
% 111.09/15.69 ------ Problem Properties
% 111.09/15.69
% 111.09/15.69
% 111.09/15.69 clauses 186
% 111.09/15.69 conjectures 1
% 111.09/15.69 EPR 104
% 111.09/15.69 Horn 185
% 111.09/15.69 unary 127
% 111.09/15.69 binary 43
% 111.09/15.69 lits 262
% 111.09/15.69 lits eq 107
% 111.09/15.69 fd_pure 0
% 111.09/15.69 fd_pseudo 0
% 111.09/15.69 fd_cond 1
% 111.09/15.69 fd_pseudo_cond 0
% 111.09/15.69 AC symbols 1
% 111.09/15.69
% 111.09/15.69 ------ Schedule dynamic 5 is on
% 111.09/15.69
% 111.09/15.69 ------ Input Options "--resolution_flag false --inst_lit_sel_side none" Time Limit: 10.
% 111.09/15.69
% 111.09/15.69
% 111.09/15.69 ------
% 111.09/15.69 Current options:
% 111.09/15.69 ------
% 111.09/15.69
% 111.09/15.69
% 111.09/15.69
% 111.09/15.69
% 111.09/15.69 ------ Proving...
% 111.09/15.69 Proof_search_loop: time out after: 2815 full_loop iterations
% 111.09/15.69
% 111.09/15.69 ------ Input Options"1. --res_lit_sel adaptive --res_lit_sel_side num_symb" Time Limit: 15.
% 111.09/15.69
% 111.09/15.69
% 111.09/15.69 ------
% 111.09/15.69 Current options:
% 111.09/15.69 ------
% 111.09/15.69
% 111.09/15.69
% 111.09/15.69
% 111.09/15.69
% 111.09/15.69 ------ Proving...
% 111.09/15.69
% 111.09/15.69
% 111.09/15.69 % SZS status Theorem for theBenchmark.p
% 111.09/15.69
% 111.09/15.69 % SZS output start CNFRefutation for theBenchmark.p
% See solution above
% 111.09/15.70
% 111.09/15.70
%------------------------------------------------------------------------------