TSTP Solution File: SWV013-1 by Otter---3.3
View Problem
- Process Solution
%------------------------------------------------------------------------------
% File : Otter---3.3
% Problem : SWV013-1 : TPTP v8.1.0. Released v2.4.0.
% Transfm : none
% Format : tptp:raw
% Command : otter-tptp-script %s
% Computer : n014.cluster.edu
% Model : x86_64 x86_64
% CPU : Intel(R) Xeon(R) CPU E5-2620 v4 2.10GHz
% Memory : 8042.1875MB
% OS : Linux 3.10.0-693.el7.x86_64
% CPULimit : 300s
% WCLimit : 300s
% DateTime : Wed Jul 27 13:19:40 EDT 2022
% Result : Timeout 299.86s 300.03s
% Output : None
% Verified :
% SZS Type : -
% Comments :
%------------------------------------------------------------------------------
%----No solution output by system
%------------------------------------------------------------------------------
%----ORIGINAL SYSTEM OUTPUT
% 0.06/0.12 % Problem : SWV013-1 : TPTP v8.1.0. Released v2.4.0.
% 0.06/0.12 % Command : otter-tptp-script %s
% 0.12/0.33 % Computer : n014.cluster.edu
% 0.12/0.33 % Model : x86_64 x86_64
% 0.12/0.33 % CPU : Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz
% 0.12/0.33 % Memory : 8042.1875MB
% 0.12/0.33 % OS : Linux 3.10.0-693.el7.x86_64
% 0.12/0.33 % CPULimit : 300
% 0.12/0.33 % WCLimit : 300
% 0.12/0.33 % DateTime : Wed Jul 27 06:03:39 EDT 2022
% 0.12/0.33 % CPUTime :
% 1.79/1.98 ----- Otter 3.3f, August 2004 -----
% 1.79/1.98 The process was started by sandbox2 on n014.cluster.edu,
% 1.79/1.98 Wed Jul 27 06:03:39 2022
% 1.79/1.98 The command was "./otter". The process ID is 14669.
% 1.79/1.98
% 1.79/1.98 set(prolog_style_variables).
% 1.79/1.98 set(auto).
% 1.79/1.98 dependent: set(auto1).
% 1.79/1.98 dependent: set(process_input).
% 1.79/1.98 dependent: clear(print_kept).
% 1.79/1.98 dependent: clear(print_new_demod).
% 1.79/1.98 dependent: clear(print_back_demod).
% 1.79/1.98 dependent: clear(print_back_sub).
% 1.79/1.98 dependent: set(control_memory).
% 1.79/1.98 dependent: assign(max_mem, 12000).
% 1.79/1.98 dependent: assign(pick_given_ratio, 4).
% 1.79/1.98 dependent: assign(stats_level, 1).
% 1.79/1.98 dependent: assign(max_seconds, 10800).
% 1.79/1.98 clear(print_given).
% 1.79/1.98
% 1.79/1.98 list(usable).
% 1.79/1.98 0 [] party_of_protocol(a).
% 1.79/1.98 0 [] message(sent(a,b,pair(a,an_a_nonce))).
% 1.79/1.98 0 [] a_stored(pair(b,an_a_nonce)).
% 1.79/1.98 0 [] message(sent(a,A,pair(E,encrypt(F,C))))| -a_stored(pair(A,B))| -message(sent(t,a,triple(encrypt(quadruple(A,B,C,D),at),E,F))).
% 1.79/1.98 0 [] party_of_protocol(b).
% 1.79/1.98 0 [] fresh_to_b(an_a_nonce).
% 1.79/1.98 0 [] message(sent(b,t,triple(b,generate_b_nonce(B),encrypt(triple(A,B,generate_expiration_time(B)),bt))))| -fresh_to_b(B)| -message(sent(A,b,pair(A,B))).
% 1.79/1.98 0 [] t_holds(key(at,a)).
% 1.79/1.98 0 [] t_holds(key(bt,b)).
% 1.79/1.98 0 [] party_of_protocol(t).
% 1.79/1.98 0 [] message(sent(t,C,triple(encrypt(quadruple(A,D,generate_key(D),E),G),encrypt(triple(C,generate_key(D),E),F),B)))| -a_nonce(D)| -message(sent(A,t,triple(A,B,encrypt(triple(C,D,E),F))))| -t_holds(key(G,C))| -t_holds(key(F,A)).
% 1.79/1.98 0 [] intruder_message(C)| -message(sent(A,B,C)).
% 1.79/1.98 0 [] intruder_message(A)| -intruder_message(pair(A,B)).
% 1.79/1.98 0 [] intruder_message(B)| -intruder_message(pair(A,B)).
% 1.79/1.98 0 [] intruder_message(A)| -intruder_message(triple(A,B,C)).
% 1.79/1.98 0 [] intruder_message(B)| -intruder_message(triple(A,B,C)).
% 1.79/1.98 0 [] intruder_message(C)| -intruder_message(triple(A,B,C)).
% 1.79/1.98 0 [] intruder_message(A)| -intruder_message(quadruple(A,B,C,D)).
% 1.79/1.98 0 [] intruder_message(B)| -intruder_message(quadruple(A,B,C,D)).
% 1.79/1.98 0 [] intruder_message(C)| -intruder_message(quadruple(A,B,C,D)).
% 1.79/1.98 0 [] intruder_message(D)| -intruder_message(quadruple(A,B,C,D)).
% 1.79/1.98 0 [] intruder_message(pair(A,B))| -intruder_message(B)| -intruder_message(A).
% 1.79/1.98 0 [] intruder_message(triple(A,B,C))| -intruder_message(C)| -intruder_message(B)| -intruder_message(A).
% 1.79/1.98 0 [] intruder_message(quadruple(A,B,C,D))| -intruder_message(D)| -intruder_message(C)| -intruder_message(B)| -intruder_message(A).
% 1.79/1.98 0 [] intruder_message(B)| -intruder_holds(key(B,C))| -intruder_message(encrypt(A,B))| -party_of_protocol(C).
% 1.79/1.98 0 [] message(sent(B,C,A))| -intruder_message(A)| -party_of_protocol(C)| -party_of_protocol(B).
% 1.79/1.98 0 [] intruder_holds(key(A,B))| -intruder_message(A)| -party_of_protocol(B).
% 1.79/1.98 0 [] intruder_message(encrypt(A,B))| -intruder_holds(key(B,C))| -intruder_message(A)| -party_of_protocol(C).
% 1.79/1.98 0 [] a_nonce(an_a_nonce).
% 1.79/1.98 0 [] a_nonce(generate_expiration_time(A)).
% 1.79/1.98 0 [] a_nonce(generate_b_nonce(A)).
% 1.79/1.98 end_of_list.
% 1.79/1.98
% 1.79/1.98 SCAN INPUT: prop=0, horn=1, equality=0, symmetry=0, max_lits=5.
% 1.79/1.98
% 1.79/1.98 This is a Horn set without equality. The strategy will
% 1.79/1.98 be hyperresolution, with satellites in sos and nuclei
% 1.79/1.98 in usable.
% 1.79/1.98
% 1.79/1.98 dependent: set(hyper_res).
% 1.79/1.98 dependent: clear(order_hyper).
% 1.79/1.98
% 1.79/1.98 ------------> process usable:
% 1.79/1.98 ** KEPT (pick-wt=27): 1 [] message(sent(a,A,pair(B,encrypt(C,D))))| -a_stored(pair(A,E))| -message(sent(t,a,triple(encrypt(quadruple(A,E,D,F),at),B,C))).
% 1.79/1.98 ** KEPT (pick-wt=24): 2 [] message(sent(b,t,triple(b,generate_b_nonce(A),encrypt(triple(B,A,generate_expiration_time(A)),bt))))| -fresh_to_b(A)| -message(sent(B,b,pair(B,A))).
% 1.79/1.98 ** KEPT (pick-wt=44): 3 [] message(sent(t,A,triple(encrypt(quadruple(B,C,generate_key(C),D),E),encrypt(triple(A,generate_key(C),D),F),G)))| -a_nonce(C)| -message(sent(B,t,triple(B,G,encrypt(triple(A,C,D),F))))| -t_holds(key(E,A))| -t_holds(key(F,B)).
% 1.79/1.98 ** KEPT (pick-wt=7): 4 [] intruder_message(A)| -message(sent(B,C,A)).
% 1.79/1.98 ** KEPT (pick-wt=6): 5 [] intruder_message(A)| -intruder_message(pair(A,B)).
% 1.79/1.98 ** KEPT (pick-wt=6): 6 [] intruder_message(A)| -intruder_message(pair(B,A)).
% 1.79/1.98 ** KEPT (pick-wt=7): 7 [] intruder_message(A)| -intruder_message(triple(A,B,C)).
% 1.79/1.98 ** KEPT (pick-wt=7): 8 [] intruder_message(A)| -intruder_message(triple(B,A,C)).
% 1.79/1.98 ** KEPT (pick-wt=7): 9Alarm clock
% 299.86/300.03 Otter interrupted
% 299.86/300.03 PROOF NOT FOUND
%------------------------------------------------------------------------------