TSTP Solution File: SWV014+1 by ePrincess---1.0
View Problem
- Process Solution
%------------------------------------------------------------------------------
% File : ePrincess---1.0
% Problem : SWV014+1 : TPTP v8.1.0. Released v2.4.0.
% Transfm : none
% Format : tptp:raw
% Command : ePrincess-casc -timeout=%d %s
% Computer : n024.cluster.edu
% Model : x86_64 x86_64
% CPU : Intel(R) Xeon(R) CPU E5-2620 v4 2.10GHz
% Memory : 8042.1875MB
% OS : Linux 3.10.0-693.el7.x86_64
% CPULimit : 300s
% WCLimit : 600s
% DateTime : Wed Jul 20 17:49:42 EDT 2022
% Result : Theorem 29.99s 9.19s
% Output : Proof 51.95s
% Verified :
% SZS Type : -
% Comments :
%------------------------------------------------------------------------------
%----WARNING: Could not form TPTP format derivation
%------------------------------------------------------------------------------
%----ORIGINAL SYSTEM OUTPUT
% 0.01/0.12 % Problem : SWV014+1 : TPTP v8.1.0. Released v2.4.0.
% 0.13/0.13 % Command : ePrincess-casc -timeout=%d %s
% 0.13/0.34 % Computer : n024.cluster.edu
% 0.13/0.34 % Model : x86_64 x86_64
% 0.13/0.34 % CPU : Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz
% 0.13/0.34 % Memory : 8042.1875MB
% 0.13/0.34 % OS : Linux 3.10.0-693.el7.x86_64
% 0.13/0.34 % CPULimit : 300
% 0.13/0.34 % WCLimit : 600
% 0.13/0.34 % DateTime : Wed Jun 15 09:19:33 EDT 2022
% 0.13/0.34 % CPUTime :
% 0.56/0.59 ____ _
% 0.56/0.59 ___ / __ \_____(_)___ ________ __________
% 0.56/0.59 / _ \/ /_/ / ___/ / __ \/ ___/ _ \/ ___/ ___/
% 0.56/0.59 / __/ ____/ / / / / / / /__/ __(__ |__ )
% 0.56/0.59 \___/_/ /_/ /_/_/ /_/\___/\___/____/____/
% 0.56/0.59
% 0.56/0.59 A Theorem Prover for First-Order Logic
% 0.62/0.59 (ePrincess v.1.0)
% 0.62/0.59
% 0.62/0.59 (c) Philipp Rümmer, 2009-2015
% 0.62/0.59 (c) Peter Backeman, 2014-2015
% 0.62/0.59 (contributions by Angelo Brillout, Peter Baumgartner)
% 0.62/0.59 Free software under GNU Lesser General Public License (LGPL).
% 0.62/0.59 Bug reports to peter@backeman.se
% 0.62/0.59
% 0.62/0.59 For more information, visit http://user.uu.se/~petba168/breu/
% 0.62/0.59
% 0.62/0.59 Loading /export/starexec/sandbox/benchmark/theBenchmark.p ...
% 0.79/0.64 Prover 0: Options: -triggersInConjecture -genTotalityAxioms -tightFunctionScopes -clausifier=simple -reverseFunctionalityPropagation +boolFunsAsPreds -triggerStrategy=allMaximal -resolutionMethod=nonUnifying +ignoreQuantifiers -generateTriggers=all
% 1.56/0.93 Prover 0: Preprocessing ...
% 2.43/1.20 Prover 0: Warning: ignoring some quantifiers
% 2.57/1.23 Prover 0: Constructing countermodel ...
% 16.16/5.93 Prover 1: Options: +triggersInConjecture -genTotalityAxioms -tightFunctionScopes -clausifier=simple +reverseFunctionalityPropagation -boolFunsAsPreds -triggerStrategy=maximal -resolutionMethod=normal +ignoreQuantifiers -generateTriggers=all
% 16.44/5.98 Prover 1: Preprocessing ...
% 16.74/6.11 Prover 1: Constructing countermodel ...
% 19.05/6.57 Prover 1: gave up
% 19.05/6.57 Prover 2: Options: +triggersInConjecture +genTotalityAxioms +tightFunctionScopes -clausifier=simple -reverseFunctionalityPropagation -boolFunsAsPreds -triggerStrategy=allUni -resolutionMethod=nonUnifying +ignoreQuantifiers -generateTriggers=all
% 19.05/6.59 Prover 2: Preprocessing ...
% 19.36/6.65 Prover 2: Warning: ignoring some quantifiers
% 19.36/6.66 Prover 2: Constructing countermodel ...
% 26.27/8.28 Prover 3: Options: -triggersInConjecture -genTotalityAxioms +tightFunctionScopes -clausifier=simple +reverseFunctionalityPropagation +boolFunsAsPreds -triggerStrategy=maximal -resolutionMethod=nonUnifying +ignoreQuantifiers -generateTriggers=all
% 26.39/8.32 Prover 3: Preprocessing ...
% 26.56/8.37 Prover 3: Warning: ignoring some quantifiers
% 26.56/8.37 Prover 3: Constructing countermodel ...
% 26.99/8.45 Prover 3: gave up
% 26.99/8.45 Prover 4: Options: +triggersInConjecture -genTotalityAxioms -tightFunctionScopes -clausifier=simple -reverseFunctionalityPropagation -boolFunsAsPreds -triggerStrategy=allUni -resolutionMethod=nonUnifying +ignoreQuantifiers -generateTriggers=complete
% 26.99/8.46 Prover 4: Preprocessing ...
% 27.29/8.54 Prover 4: Warning: ignoring some quantifiers
% 27.29/8.54 Prover 4: Constructing countermodel ...
% 29.99/9.19 Prover 4: proved (743ms)
% 29.99/9.19 Prover 0: stopped
% 29.99/9.19 Prover 2: stopped
% 29.99/9.19
% 29.99/9.19 No countermodel exists, formula is valid
% 29.99/9.19 % SZS status Theorem for theBenchmark
% 29.99/9.19
% 29.99/9.19 Generating proof ... Warning: ignoring some quantifiers
% 49.68/17.92 found it (size 1678)
% 49.68/17.92
% 49.68/17.92 % SZS output start Proof for theBenchmark
% 49.68/17.92 Assumed formulas after preprocessing and simplification:
% 49.68/17.92 | (0) ? [v0] : ? [v1] : ? [v2] : ? [v3] : ? [v4] : ? [v5] : ? [v6] : (party_of_protocol(b) = 0 & party_of_protocol(a) = 0 & party_of_protocol(t) = 0 & t_holds(v1) = 0 & t_holds(v0) = 0 & a_nonce(an_a_nonce) = 0 & b_holds(v2) = 0 & fresh_to_b(an_a_nonce) = 0 & a_stored(v3) = 0 & pair(b, an_a_nonce) = v3 & pair(a, an_a_nonce) = v4 & sent(a, b, v4) = v5 & message(v5) = 0 & key(bt, b) = v0 & key(bt, t) = v2 & key(at, a) = v1 & key(at, t) = v6 & a_holds(v6) = 0 & ! [v7] : ! [v8] : ! [v9] : ! [v10] : ! [v11] : ! [v12] : ! [v13] : ! [v14] : ! [v15] : ! [v16] : ! [v17] : ! [v18] : ! [v19] : ( ~ (generate_key(v10) = v14) | ~ (quadruple(v7, v10, v14, v11) = v15) | ~ (triple(v16, v18, v8) = v19) | ~ (triple(v9, v14, v11) = v17) | ~ (encrypt(v17, v12) = v18) | ~ (encrypt(v15, v13) = v16) | ? [v20] : ? [v21] : ? [v22] : ? [v23] : ? [v24] : ? [v25] : ? [v26] : ? [v27] : ? [v28] : ? [v29] : ? [v30] : ? [v31] : (t_holds(v27) = v28 & t_holds(v25) = v26 & a_nonce(v10) = v29 & triple(v9, v10, v11) = v20 & triple(v7, v8, v21) = v22 & encrypt(v20, v12) = v21 & sent(v7, t, v22) = v23 & sent(t, v9, v19) = v30 & message(v30) = v31 & message(v23) = v24 & key(v13, v9) = v27 & key(v12, v7) = v25 & ( ~ (v29 = 0) | ~ (v28 = 0) | ~ (v26 = 0) | ~ (v24 = 0) | v31 = 0))) & ! [v7] : ! [v8] : ! [v9] : ! [v10] : ! [v11] : ! [v12] : ! [v13] : ! [v14] : ! [v15] : ( ~ (quadruple(v11, v12, v9, v8) = v13) | ~ (triple(v14, v10, v7) = v15) | ~ (encrypt(v13, at) = v14) | ? [v16] : ? [v17] : ? [v18] : ? [v19] : ? [v20] : ? [v21] : ? [v22] : ? [v23] : ? [v24] : ? [v25] : (a_stored(v18) = v19 & encrypt(v7, v9) = v20 & pair(v11, v12) = v18 & pair(v10, v20) = v21 & sent(a, v11, v21) = v22 & sent(t, a, v15) = v16 & message(v22) = v23 & message(v16) = v17 & key(v9, v11) = v24 & a_holds(v24) = v25 & ( ~ (v19 = 0) | ~ (v17 = 0) | (v25 = 0 & v23 = 0)))) & ! [v7] : ! [v8] : ! [v9] : ! [v10] : ! [v11] : ! [v12] : (v12 = 0 | ~ (intruder_holds(v10) = 0) | ~ (intruder_message(v11) = v12) | ~ (encrypt(v7, v8) = v11) | ~ (key(v8, v9) = v10) | ? [v13] : ? [v14] : (party_of_protocol(v9) = v14 & intruder_message(v7) = v13 & ( ~ (v14 = 0) | ~ (v13 = 0)))) & ! [v7] : ! [v8] : ! [v9] : ! [v10] : ! [v11] : ! [v12] : (v8 = v7 | ~ (quadruple(v12, v11, v10, v9) = v8) | ~ (quadruple(v12, v11, v10, v9) = v7)) & ! [v7] : ! [v8] : ! [v9] : ! [v10] : ! [v11] : (v11 = 0 | ~ (party_of_protocol(v9) = 0) | ~ (intruder_message(v10) = v11) | ~ (encrypt(v7, v8) = v10) | ? [v12] : ? [v13] : ? [v14] : (intruder_holds(v13) = v14 & intruder_message(v7) = v12 & key(v8, v9) = v13 & ( ~ (v14 = 0) | ~ (v12 = 0)))) & ! [v7] : ! [v8] : ! [v9] : ! [v10] : ! [v11] : (v8 = v7 | ~ (triple(v11, v10, v9) = v8) | ~ (triple(v11, v10, v9) = v7)) & ! [v7] : ! [v8] : ! [v9] : ! [v10] : ! [v11] : (v8 = v7 | ~ (sent(v11, v10, v9) = v8) | ~ (sent(v11, v10, v9) = v7)) & ! [v7] : ! [v8] : ! [v9] : ! [v10] : ! [v11] : ( ~ (intruder_holds(v11) = 0) | ~ (intruder_message(v10) = 0) | ~ (encrypt(v7, v8) = v10) | ~ (key(v8, v9) = v11) | ? [v12] : ? [v13] : (party_of_protocol(v9) = v12 & intruder_message(v8) = v13 & ( ~ (v12 = 0) | v13 = 0))) & ! [v7] : ! [v8] : ! [v9] : ! [v10] : ! [v11] : ( ~ (generate_expiration_time(v9) = v10) | ~ (triple(v8, v7, v10) = v11) | ? [v12] : ? [v13] : ? [v14] : ? [v15] : ? [v16] : ? [v17] : ? [v18] : ? [v19] : ? [v20] : ? [v21] : (b_holds(v20) = v21 & generate_b_nonce(v9) = v13 & b_stored(v18) = v19 & encrypt(v13, v7) = v14 & encrypt(v11, bt) = v12 & pair(v12, v14) = v15 & pair(v8, v9) = v18 & sent(v8, b, v15) = v16 & message(v16) = v17 & key(v7, v8) = v20 & ( ~ (v19 = 0) | ~ (v17 = 0) | v21 = 0))) & ! [v7] : ! [v8] : ! [v9] : ! [v10] : ! [v11] : ( ~ (quadruple(v7, v8, v9, v10) = v11) | ? [v12] : ? [v13] : ? [v14] : ? [v15] : ? [v16] : (intruder_message(v11) = v16 & intruder_message(v10) = v15 & intruder_message(v9) = v14 & intruder_message(v8) = v13 & intruder_message(v7) = v12 & ( ~ (v15 = 0) | ~ (v14 = 0) | ~ (v13 = 0) | ~ (v12 = 0) | v16 = 0))) & ! [v7] : ! [v8] : ! [v9] : ! [v10] : ! [v11] : ( ~ (quadruple(v7, v8, v9, v10) = v11) | ? [v12] : ? [v13] : ? [v14] : ? [v15] : ? [v16] : (intruder_message(v11) = v12 & intruder_message(v10) = v16 & intruder_message(v9) = v15 & intruder_message(v8) = v14 & intruder_message(v7) = v13 & ( ~ (v12 = 0) | (v16 = 0 & v15 = 0 & v14 = 0 & v13 = 0)))) & ! [v7] : ! [v8] : ! [v9] : ! [v10] : (v8 = v7 | ~ (encrypt(v10, v9) = v8) | ~ (encrypt(v10, v9) = v7)) & ! [v7] : ! [v8] : ! [v9] : ! [v10] : (v8 = v7 | ~ (pair(v10, v9) = v8) | ~ (pair(v10, v9) = v7)) & ! [v7] : ! [v8] : ! [v9] : ! [v10] : (v8 = v7 | ~ (key(v10, v9) = v8) | ~ (key(v10, v9) = v7)) & ! [v7] : ! [v8] : ! [v9] : ! [v10] : ( ~ (intruder_holds(v10) = 0) | ~ (intruder_message(v7) = 0) | ~ (key(v8, v9) = v10) | ? [v11] : ? [v12] : ? [v13] : (party_of_protocol(v9) = v11 & intruder_message(v12) = v13 & encrypt(v7, v8) = v12 & ( ~ (v11 = 0) | v13 = 0))) & ! [v7] : ! [v8] : ! [v9] : ! [v10] : ( ~ (party_of_protocol(v9) = 0) | ~ (intruder_message(v10) = 0) | ~ (encrypt(v7, v8) = v10) | ? [v11] : ? [v12] : ? [v13] : (intruder_holds(v11) = v12 & intruder_message(v8) = v13 & key(v8, v9) = v11 & ( ~ (v12 = 0) | v13 = 0))) & ! [v7] : ! [v8] : ! [v9] : ! [v10] : ( ~ (generate_expiration_time(v8) = v9) | ~ (triple(v7, v8, v9) = v10) | ? [v11] : ? [v12] : ? [v13] : ? [v14] : ? [v15] : ? [v16] : ? [v17] : ? [v18] : ? [v19] : ? [v20] : (fresh_to_b(v8) = v14 & generate_b_nonce(v8) = v15 & b_stored(v11) = v20 & triple(b, v15, v16) = v17 & encrypt(v10, bt) = v16 & pair(v7, v8) = v11 & sent(v7, b, v11) = v12 & sent(b, t, v17) = v18 & message(v18) = v19 & message(v12) = v13 & ( ~ (v14 = 0) | ~ (v13 = 0) | (v20 = 0 & v19 = 0)))) & ! [v7] : ! [v8] : ! [v9] : ! [v10] : ( ~ (triple(v7, v8, v9) = v10) | ? [v11] : ? [v12] : ? [v13] : ? [v14] : (intruder_message(v10) = v14 & intruder_message(v9) = v13 & intruder_message(v8) = v12 & intruder_message(v7) = v11 & ( ~ (v13 = 0) | ~ (v12 = 0) | ~ (v11 = 0) | v14 = 0))) & ! [v7] : ! [v8] : ! [v9] : ! [v10] : ( ~ (triple(v7, v8, v9) = v10) | ? [v11] : ? [v12] : ? [v13] : ? [v14] : (intruder_message(v10) = v11 & intruder_message(v9) = v14 & intruder_message(v8) = v13 & intruder_message(v7) = v12 & ( ~ (v11 = 0) | (v14 = 0 & v13 = 0 & v12 = 0)))) & ! [v7] : ! [v8] : ! [v9] : ! [v10] : ( ~ (sent(v8, v9, v7) = v10) | ? [v11] : ? [v12] : ? [v13] : ? [v14] : (party_of_protocol(v9) = v13 & party_of_protocol(v8) = v12 & intruder_message(v7) = v11 & message(v10) = v14 & ( ~ (v13 = 0) | ~ (v12 = 0) | ~ (v11 = 0) | v14 = 0))) & ! [v7] : ! [v8] : ! [v9] : ! [v10] : ( ~ (sent(v7, v8, v9) = v10) | ? [v11] : ? [v12] : (intruder_message(v9) = v12 & message(v10) = v11 & ( ~ (v11 = 0) | v12 = 0))) & ! [v7] : ! [v8] : ! [v9] : (v8 = v7 | ~ (intruder_holds(v9) = v8) | ~ (intruder_holds(v9) = v7)) & ! [v7] : ! [v8] : ! [v9] : (v8 = v7 | ~ (party_of_protocol(v9) = v8) | ~ (party_of_protocol(v9) = v7)) & ! [v7] : ! [v8] : ! [v9] : (v8 = v7 | ~ (intruder_message(v9) = v8) | ~ (intruder_message(v9) = v7)) & ! [v7] : ! [v8] : ! [v9] : (v8 = v7 | ~ (t_holds(v9) = v8) | ~ (t_holds(v9) = v7)) & ! [v7] : ! [v8] : ! [v9] : (v8 = v7 | ~ (a_nonce(v9) = v8) | ~ (a_nonce(v9) = v7)) & ! [v7] : ! [v8] : ! [v9] : (v8 = v7 | ~ (generate_key(v9) = v8) | ~ (generate_key(v9) = v7)) & ! [v7] : ! [v8] : ! [v9] : (v8 = v7 | ~ (b_holds(v9) = v8) | ~ (b_holds(v9) = v7)) & ! [v7] : ! [v8] : ! [v9] : (v8 = v7 | ~ (fresh_to_b(v9) = v8) | ~ (fresh_to_b(v9) = v7)) & ! [v7] : ! [v8] : ! [v9] : (v8 = v7 | ~ (generate_b_nonce(v9) = v8) | ~ (generate_b_nonce(v9) = v7)) & ! [v7] : ! [v8] : ! [v9] : (v8 = v7 | ~ (generate_expiration_time(v9) = v8) | ~ (generate_expiration_time(v9) = v7)) & ! [v7] : ! [v8] : ! [v9] : (v8 = v7 | ~ (b_stored(v9) = v8) | ~ (b_stored(v9) = v7)) & ! [v7] : ! [v8] : ! [v9] : (v8 = v7 | ~ (a_stored(v9) = v8) | ~ (a_stored(v9) = v7)) & ! [v7] : ! [v8] : ! [v9] : (v8 = v7 | ~ (message(v9) = v8) | ~ (message(v9) = v7)) & ! [v7] : ! [v8] : ! [v9] : (v8 = v7 | ~ (a_holds(v9) = v8) | ~ (a_holds(v9) = v7)) & ! [v7] : ! [v8] : ! [v9] : ( ~ (pair(v7, v8) = v9) | ? [v10] : ? [v11] : ? [v12] : ? [v13] : ? [v14] : ? [v15] : ? [v16] : ? [v17] : ? [v18] : ? [v19] : ? [v20] : (fresh_to_b(v8) = v12 & generate_b_nonce(v8) = v13 & generate_expiration_time(v8) = v14 & b_stored(v9) = v20 & triple(v7, v8, v14) = v15 & triple(b, v13, v16) = v17 & encrypt(v15, bt) = v16 & sent(v7, b, v9) = v10 & sent(b, t, v17) = v18 & message(v18) = v19 & message(v10) = v11 & ( ~ (v12 = 0) | ~ (v11 = 0) | (v20 = 0 & v19 = 0)))) & ! [v7] : ! [v8] : ! [v9] : ( ~ (pair(v7, v8) = v9) | ? [v10] : ? [v11] : ? [v12] : (intruder_message(v9) = v12 & intruder_message(v8) = v11 & intruder_message(v7) = v10 & ( ~ (v11 = 0) | ~ (v10 = 0) | v12 = 0))) & ! [v7] : ! [v8] : ! [v9] : ( ~ (pair(v7, v8) = v9) | ? [v10] : ? [v11] : ? [v12] : (intruder_message(v9) = v10 & intruder_message(v8) = v12 & intruder_message(v7) = v11 & ( ~ (v10 = 0) | (v12 = 0 & v11 = 0)))) & ! [v7] : ! [v8] : ! [v9] : ( ~ (key(v7, v8) = v9) | ? [v10] : ? [v11] : ? [v12] : (intruder_holds(v9) = v12 & party_of_protocol(v8) = v11 & intruder_message(v7) = v10 & ( ~ (v11 = 0) | ~ (v10 = 0) | v12 = 0))) & ! [v7] : ! [v8] : ( ~ (generate_key(v7) = v8) | ? [v9] : ( ~ (v9 = 0) & a_nonce(v8) = v9)) & ! [v7] : ! [v8] : ( ~ (generate_b_nonce(v7) = v8) | a_nonce(v8) = 0) & ! [v7] : ! [v8] : ( ~ (generate_expiration_time(v7) = v8) | a_nonce(v8) = 0) & ! [v7] : ! [v8] : ( ~ (key(v7, b) = v8) | ? [v9] : ? [v10] : ? [v11] : (intruder_holds(v8) = v9 & b_holds(v10) = v11 & key(v7, a) = v10 & ( ~ (v11 = 0) | ~ (v9 = 0)))) & ! [v7] : ! [v8] : ( ~ (key(v7, a) = v8) | ? [v9] : ? [v10] : ? [v11] : (intruder_holds(v9) = v10 & b_holds(v8) = v11 & key(v7, b) = v9 & ( ~ (v11 = 0) | ~ (v10 = 0)))) & ? [v7] : ? [v8] : ? [v9] : ? [v10] : ? [v11] : ? [v12] : ? [v13] : ? [v14] : ? [v15] : ? [v16] : ? [v17] : ? [v18] : ? [v19] : ? [v20] : ? [v21] : ? [v22] : ? [v23] : ? [v24] : ? [v25] : ? [v26] : ? [v27] : ? [v28] : ? [v29] : ? [v30] : ? [v31] : (t_holds(v21) = v22 & t_holds(v19) = v20 & a_nonce(v10) = v23 & generate_key(v10) = v24 & quadruple(v7, v10, v24, v11) = v25 & triple(v26, v28, v8) = v29 & triple(v9, v24, v11) = v27 & triple(v9, v10, v11) = v14 & triple(v7, v8, v15) = v16 & encrypt(v27, v12) = v28 & encrypt(v25, v13) = v26 & encrypt(v14, v12) = v15 & sent(v7, t, v16) = v17 & sent(t, v9, v29) = v30 & message(v30) = v31 & message(v17) = v18 & key(v13, v9) = v21 & key(v12, v7) = v19 & ( ~ (v23 = 0) | ~ (v22 = 0) | ~ (v20 = 0) | ~ (v18 = 0) | v31 = 0)) & ? [v7] : ? [v8] : ? [v9] : ? [v10] : ? [v11] : ? [v12] : ? [v13] : ? [v14] : ? [v15] : ? [v16] : ? [v17] : ? [v18] : ? [v19] : ? [v20] : ? [v21] : ? [v22] : ? [v23] : ? [v24] : ? [v25] : (quadruple(v11, v12, v9, v8) = v13 & triple(v14, v10, v7) = v15 & a_stored(v18) = v19 & encrypt(v13, at) = v14 & encrypt(v7, v9) = v20 & pair(v11, v12) = v18 & pair(v10, v20) = v21 & sent(a, v11, v21) = v22 & sent(t, a, v15) = v16 & message(v22) = v23 & message(v16) = v17 & key(v9, v11) = v24 & a_holds(v24) = v25 & ( ~ (v19 = 0) | ~ (v17 = 0) | (v25 = 0 & v23 = 0))) & ? [v7] : ? [v8] : ? [v9] : ? [v10] : ? [v11] : ? [v12] : ? [v13] : ? [v14] : ? [v15] : ? [v16] : ? [v17] : ? [v18] : ? [v19] : ? [v20] : ? [v21] : (b_holds(v20) = v21 & generate_b_nonce(v9) = v13 & generate_expiration_time(v9) = v10 & b_stored(v18) = v19 & triple(v8, v7, v10) = v11 & encrypt(v13, v7) = v14 & encrypt(v11, bt) = v12 & pair(v12, v14) = v15 & pair(v8, v9) = v18 & sent(v8, b, v15) = v16 & message(v16) = v17 & key(v7, v8) = v20 & ( ~ (v19 = 0) | ~ (v17 = 0) | v21 = 0)) & ? [v7] : ? [v8] : ? [v9] : ? [v10] : ? [v11] : ? [v12] : ? [v13] : ? [v14] : ? [v15] : ? [v16] : ? [v17] : ? [v18] : ? [v19] : ? [v20] : (fresh_to_b(v8) = v12 & generate_b_nonce(v8) = v13 & generate_expiration_time(v8) = v14 & b_stored(v9) = v20 & triple(v7, v8, v14) = v15 & triple(b, v13, v16) = v17 & encrypt(v15, bt) = v16 & pair(v7, v8) = v9 & sent(v7, b, v9) = v10 & sent(b, t, v17) = v18 & message(v18) = v19 & message(v10) = v11 & ( ~ (v12 = 0) | ~ (v11 = 0) | (v20 = 0 & v19 = 0))) & ? [v7] : ? [v8] : ? [v9] : ? [v10] : ? [v11] : ? [v12] : ? [v13] : ? [v14] : ? [v15] : (intruder_holds(v12) = v13 & party_of_protocol(v9) = v14 & intruder_message(v10) = v11 & intruder_message(v8) = v15 & encrypt(v7, v8) = v10 & key(v8, v9) = v12 & ( ~ (v14 = 0) | ~ (v13 = 0) | ~ (v11 = 0) | v15 = 0)) & ? [v7] : ? [v8] : ? [v9] : ? [v10] : ? [v11] : ? [v12] : ? [v13] : ? [v14] : ? [v15] : (intruder_holds(v11) = v12 & party_of_protocol(v9) = v13 & intruder_message(v14) = v15 & intruder_message(v7) = v10 & encrypt(v7, v8) = v14 & key(v8, v9) = v11 & ( ~ (v13 = 0) | ~ (v12 = 0) | ~ (v10 = 0) | v15 = 0)) & ? [v7] : ? [v8] : ? [v9] : ? [v10] : ? [v11] : ? [v12] : ? [v13] : ? [v14] : (party_of_protocol(v9) = v12 & party_of_protocol(v8) = v11 & intruder_message(v7) = v10 & sent(v8, v9, v7) = v13 & message(v13) = v14 & ( ~ (v12 = 0) | ~ (v11 = 0) | ~ (v10 = 0) | v14 = 0)) & ? [v7] : ? [v8] : ? [v9] : ? [v10] : ? [v11] : ? [v12] : (intruder_holds(v11) = v12 & party_of_protocol(v8) = v10 & intruder_message(v7) = v9 & key(v7, v8) = v11 & ( ~ (v10 = 0) | ~ (v9 = 0) | v12 = 0)) & ? [v7] : ? [v8] : ? [v9] : ? [v10] : ? [v11] : ? [v12] : (intruder_message(v9) = v12 & sent(v7, v8, v9) = v10 & message(v10) = v11 & ( ~ (v11 = 0) | v12 = 0)) & ? [v7] : ? [v8] : ? [v9] : ? [v10] : ? [v11] : (intruder_holds(v8) = v9 & b_holds(v10) = v11 & key(v7, b) = v8 & key(v7, a) = v10 & ( ~ (v11 = 0) | ~ (v9 = 0))))
% 49.89/17.98 | Instantiating (0) with all_0_0_0, all_0_1_1, all_0_2_2, all_0_3_3, all_0_4_4, all_0_5_5, all_0_6_6 yields:
% 49.89/17.98 | (1) party_of_protocol(b) = 0 & party_of_protocol(a) = 0 & party_of_protocol(t) = 0 & t_holds(all_0_5_5) = 0 & t_holds(all_0_6_6) = 0 & a_nonce(an_a_nonce) = 0 & b_holds(all_0_4_4) = 0 & fresh_to_b(an_a_nonce) = 0 & a_stored(all_0_3_3) = 0 & pair(b, an_a_nonce) = all_0_3_3 & pair(a, an_a_nonce) = all_0_2_2 & sent(a, b, all_0_2_2) = all_0_1_1 & message(all_0_1_1) = 0 & key(bt, b) = all_0_6_6 & key(bt, t) = all_0_4_4 & key(at, a) = all_0_5_5 & key(at, t) = all_0_0_0 & a_holds(all_0_0_0) = 0 & ! [v0] : ! [v1] : ! [v2] : ! [v3] : ! [v4] : ! [v5] : ! [v6] : ! [v7] : ! [v8] : ! [v9] : ! [v10] : ! [v11] : ! [v12] : ( ~ (generate_key(v3) = v7) | ~ (quadruple(v0, v3, v7, v4) = v8) | ~ (triple(v9, v11, v1) = v12) | ~ (triple(v2, v7, v4) = v10) | ~ (encrypt(v10, v5) = v11) | ~ (encrypt(v8, v6) = v9) | ? [v13] : ? [v14] : ? [v15] : ? [v16] : ? [v17] : ? [v18] : ? [v19] : ? [v20] : ? [v21] : ? [v22] : ? [v23] : ? [v24] : (t_holds(v20) = v21 & t_holds(v18) = v19 & a_nonce(v3) = v22 & triple(v2, v3, v4) = v13 & triple(v0, v1, v14) = v15 & encrypt(v13, v5) = v14 & sent(v0, t, v15) = v16 & sent(t, v2, v12) = v23 & message(v23) = v24 & message(v16) = v17 & key(v6, v2) = v20 & key(v5, v0) = v18 & ( ~ (v22 = 0) | ~ (v21 = 0) | ~ (v19 = 0) | ~ (v17 = 0) | v24 = 0))) & ! [v0] : ! [v1] : ! [v2] : ! [v3] : ! [v4] : ! [v5] : ! [v6] : ! [v7] : ! [v8] : ( ~ (quadruple(v4, v5, v2, v1) = v6) | ~ (triple(v7, v3, v0) = v8) | ~ (encrypt(v6, at) = v7) | ? [v9] : ? [v10] : ? [v11] : ? [v12] : ? [v13] : ? [v14] : ? [v15] : ? [v16] : ? [v17] : ? [v18] : (a_stored(v11) = v12 & encrypt(v0, v2) = v13 & pair(v4, v5) = v11 & pair(v3, v13) = v14 & sent(a, v4, v14) = v15 & sent(t, a, v8) = v9 & message(v15) = v16 & message(v9) = v10 & key(v2, v4) = v17 & a_holds(v17) = v18 & ( ~ (v12 = 0) | ~ (v10 = 0) | (v18 = 0 & v16 = 0)))) & ! [v0] : ! [v1] : ! [v2] : ! [v3] : ! [v4] : ! [v5] : (v5 = 0 | ~ (intruder_holds(v3) = 0) | ~ (intruder_message(v4) = v5) | ~ (encrypt(v0, v1) = v4) | ~ (key(v1, v2) = v3) | ? [v6] : ? [v7] : (party_of_protocol(v2) = v7 & intruder_message(v0) = v6 & ( ~ (v7 = 0) | ~ (v6 = 0)))) & ! [v0] : ! [v1] : ! [v2] : ! [v3] : ! [v4] : ! [v5] : (v1 = v0 | ~ (quadruple(v5, v4, v3, v2) = v1) | ~ (quadruple(v5, v4, v3, v2) = v0)) & ! [v0] : ! [v1] : ! [v2] : ! [v3] : ! [v4] : (v4 = 0 | ~ (party_of_protocol(v2) = 0) | ~ (intruder_message(v3) = v4) | ~ (encrypt(v0, v1) = v3) | ? [v5] : ? [v6] : ? [v7] : (intruder_holds(v6) = v7 & intruder_message(v0) = v5 & key(v1, v2) = v6 & ( ~ (v7 = 0) | ~ (v5 = 0)))) & ! [v0] : ! [v1] : ! [v2] : ! [v3] : ! [v4] : (v1 = v0 | ~ (triple(v4, v3, v2) = v1) | ~ (triple(v4, v3, v2) = v0)) & ! [v0] : ! [v1] : ! [v2] : ! [v3] : ! [v4] : (v1 = v0 | ~ (sent(v4, v3, v2) = v1) | ~ (sent(v4, v3, v2) = v0)) & ! [v0] : ! [v1] : ! [v2] : ! [v3] : ! [v4] : ( ~ (intruder_holds(v4) = 0) | ~ (intruder_message(v3) = 0) | ~ (encrypt(v0, v1) = v3) | ~ (key(v1, v2) = v4) | ? [v5] : ? [v6] : (party_of_protocol(v2) = v5 & intruder_message(v1) = v6 & ( ~ (v5 = 0) | v6 = 0))) & ! [v0] : ! [v1] : ! [v2] : ! [v3] : ! [v4] : ( ~ (generate_expiration_time(v2) = v3) | ~ (triple(v1, v0, v3) = v4) | ? [v5] : ? [v6] : ? [v7] : ? [v8] : ? [v9] : ? [v10] : ? [v11] : ? [v12] : ? [v13] : ? [v14] : (b_holds(v13) = v14 & generate_b_nonce(v2) = v6 & b_stored(v11) = v12 & encrypt(v6, v0) = v7 & encrypt(v4, bt) = v5 & pair(v5, v7) = v8 & pair(v1, v2) = v11 & sent(v1, b, v8) = v9 & message(v9) = v10 & key(v0, v1) = v13 & ( ~ (v12 = 0) | ~ (v10 = 0) | v14 = 0))) & ! [v0] : ! [v1] : ! [v2] : ! [v3] : ! [v4] : ( ~ (quadruple(v0, v1, v2, v3) = v4) | ? [v5] : ? [v6] : ? [v7] : ? [v8] : ? [v9] : (intruder_message(v4) = v9 & intruder_message(v3) = v8 & intruder_message(v2) = v7 & intruder_message(v1) = v6 & intruder_message(v0) = v5 & ( ~ (v8 = 0) | ~ (v7 = 0) | ~ (v6 = 0) | ~ (v5 = 0) | v9 = 0))) & ! [v0] : ! [v1] : ! [v2] : ! [v3] : ! [v4] : ( ~ (quadruple(v0, v1, v2, v3) = v4) | ? [v5] : ? [v6] : ? [v7] : ? [v8] : ? [v9] : (intruder_message(v4) = v5 & intruder_message(v3) = v9 & intruder_message(v2) = v8 & intruder_message(v1) = v7 & intruder_message(v0) = v6 & ( ~ (v5 = 0) | (v9 = 0 & v8 = 0 & v7 = 0 & v6 = 0)))) & ! [v0] : ! [v1] : ! [v2] : ! [v3] : (v1 = v0 | ~ (encrypt(v3, v2) = v1) | ~ (encrypt(v3, v2) = v0)) & ! [v0] : ! [v1] : ! [v2] : ! [v3] : (v1 = v0 | ~ (pair(v3, v2) = v1) | ~ (pair(v3, v2) = v0)) & ! [v0] : ! [v1] : ! [v2] : ! [v3] : (v1 = v0 | ~ (key(v3, v2) = v1) | ~ (key(v3, v2) = v0)) & ! [v0] : ! [v1] : ! [v2] : ! [v3] : ( ~ (intruder_holds(v3) = 0) | ~ (intruder_message(v0) = 0) | ~ (key(v1, v2) = v3) | ? [v4] : ? [v5] : ? [v6] : (party_of_protocol(v2) = v4 & intruder_message(v5) = v6 & encrypt(v0, v1) = v5 & ( ~ (v4 = 0) | v6 = 0))) & ! [v0] : ! [v1] : ! [v2] : ! [v3] : ( ~ (party_of_protocol(v2) = 0) | ~ (intruder_message(v3) = 0) | ~ (encrypt(v0, v1) = v3) | ? [v4] : ? [v5] : ? [v6] : (intruder_holds(v4) = v5 & intruder_message(v1) = v6 & key(v1, v2) = v4 & ( ~ (v5 = 0) | v6 = 0))) & ! [v0] : ! [v1] : ! [v2] : ! [v3] : ( ~ (generate_expiration_time(v1) = v2) | ~ (triple(v0, v1, v2) = v3) | ? [v4] : ? [v5] : ? [v6] : ? [v7] : ? [v8] : ? [v9] : ? [v10] : ? [v11] : ? [v12] : ? [v13] : (fresh_to_b(v1) = v7 & generate_b_nonce(v1) = v8 & b_stored(v4) = v13 & triple(b, v8, v9) = v10 & encrypt(v3, bt) = v9 & pair(v0, v1) = v4 & sent(v0, b, v4) = v5 & sent(b, t, v10) = v11 & message(v11) = v12 & message(v5) = v6 & ( ~ (v7 = 0) | ~ (v6 = 0) | (v13 = 0 & v12 = 0)))) & ! [v0] : ! [v1] : ! [v2] : ! [v3] : ( ~ (triple(v0, v1, v2) = v3) | ? [v4] : ? [v5] : ? [v6] : ? [v7] : (intruder_message(v3) = v7 & intruder_message(v2) = v6 & intruder_message(v1) = v5 & intruder_message(v0) = v4 & ( ~ (v6 = 0) | ~ (v5 = 0) | ~ (v4 = 0) | v7 = 0))) & ! [v0] : ! [v1] : ! [v2] : ! [v3] : ( ~ (triple(v0, v1, v2) = v3) | ? [v4] : ? [v5] : ? [v6] : ? [v7] : (intruder_message(v3) = v4 & intruder_message(v2) = v7 & intruder_message(v1) = v6 & intruder_message(v0) = v5 & ( ~ (v4 = 0) | (v7 = 0 & v6 = 0 & v5 = 0)))) & ! [v0] : ! [v1] : ! [v2] : ! [v3] : ( ~ (sent(v1, v2, v0) = v3) | ? [v4] : ? [v5] : ? [v6] : ? [v7] : (party_of_protocol(v2) = v6 & party_of_protocol(v1) = v5 & intruder_message(v0) = v4 & message(v3) = v7 & ( ~ (v6 = 0) | ~ (v5 = 0) | ~ (v4 = 0) | v7 = 0))) & ! [v0] : ! [v1] : ! [v2] : ! [v3] : ( ~ (sent(v0, v1, v2) = v3) | ? [v4] : ? [v5] : (intruder_message(v2) = v5 & message(v3) = v4 & ( ~ (v4 = 0) | v5 = 0))) & ! [v0] : ! [v1] : ! [v2] : (v1 = v0 | ~ (intruder_holds(v2) = v1) | ~ (intruder_holds(v2) = v0)) & ! [v0] : ! [v1] : ! [v2] : (v1 = v0 | ~ (party_of_protocol(v2) = v1) | ~ (party_of_protocol(v2) = v0)) & ! [v0] : ! [v1] : ! [v2] : (v1 = v0 | ~ (intruder_message(v2) = v1) | ~ (intruder_message(v2) = v0)) & ! [v0] : ! [v1] : ! [v2] : (v1 = v0 | ~ (t_holds(v2) = v1) | ~ (t_holds(v2) = v0)) & ! [v0] : ! [v1] : ! [v2] : (v1 = v0 | ~ (a_nonce(v2) = v1) | ~ (a_nonce(v2) = v0)) & ! [v0] : ! [v1] : ! [v2] : (v1 = v0 | ~ (generate_key(v2) = v1) | ~ (generate_key(v2) = v0)) & ! [v0] : ! [v1] : ! [v2] : (v1 = v0 | ~ (b_holds(v2) = v1) | ~ (b_holds(v2) = v0)) & ! [v0] : ! [v1] : ! [v2] : (v1 = v0 | ~ (fresh_to_b(v2) = v1) | ~ (fresh_to_b(v2) = v0)) & ! [v0] : ! [v1] : ! [v2] : (v1 = v0 | ~ (generate_b_nonce(v2) = v1) | ~ (generate_b_nonce(v2) = v0)) & ! [v0] : ! [v1] : ! [v2] : (v1 = v0 | ~ (generate_expiration_time(v2) = v1) | ~ (generate_expiration_time(v2) = v0)) & ! [v0] : ! [v1] : ! [v2] : (v1 = v0 | ~ (b_stored(v2) = v1) | ~ (b_stored(v2) = v0)) & ! [v0] : ! [v1] : ! [v2] : (v1 = v0 | ~ (a_stored(v2) = v1) | ~ (a_stored(v2) = v0)) & ! [v0] : ! [v1] : ! [v2] : (v1 = v0 | ~ (message(v2) = v1) | ~ (message(v2) = v0)) & ! [v0] : ! [v1] : ! [v2] : (v1 = v0 | ~ (a_holds(v2) = v1) | ~ (a_holds(v2) = v0)) & ! [v0] : ! [v1] : ! [v2] : ( ~ (pair(v0, v1) = v2) | ? [v3] : ? [v4] : ? [v5] : ? [v6] : ? [v7] : ? [v8] : ? [v9] : ? [v10] : ? [v11] : ? [v12] : ? [v13] : (fresh_to_b(v1) = v5 & generate_b_nonce(v1) = v6 & generate_expiration_time(v1) = v7 & b_stored(v2) = v13 & triple(v0, v1, v7) = v8 & triple(b, v6, v9) = v10 & encrypt(v8, bt) = v9 & sent(v0, b, v2) = v3 & sent(b, t, v10) = v11 & message(v11) = v12 & message(v3) = v4 & ( ~ (v5 = 0) | ~ (v4 = 0) | (v13 = 0 & v12 = 0)))) & ! [v0] : ! [v1] : ! [v2] : ( ~ (pair(v0, v1) = v2) | ? [v3] : ? [v4] : ? [v5] : (intruder_message(v2) = v5 & intruder_message(v1) = v4 & intruder_message(v0) = v3 & ( ~ (v4 = 0) | ~ (v3 = 0) | v5 = 0))) & ! [v0] : ! [v1] : ! [v2] : ( ~ (pair(v0, v1) = v2) | ? [v3] : ? [v4] : ? [v5] : (intruder_message(v2) = v3 & intruder_message(v1) = v5 & intruder_message(v0) = v4 & ( ~ (v3 = 0) | (v5 = 0 & v4 = 0)))) & ! [v0] : ! [v1] : ! [v2] : ( ~ (key(v0, v1) = v2) | ? [v3] : ? [v4] : ? [v5] : (intruder_holds(v2) = v5 & party_of_protocol(v1) = v4 & intruder_message(v0) = v3 & ( ~ (v4 = 0) | ~ (v3 = 0) | v5 = 0))) & ! [v0] : ! [v1] : ( ~ (generate_key(v0) = v1) | ? [v2] : ( ~ (v2 = 0) & a_nonce(v1) = v2)) & ! [v0] : ! [v1] : ( ~ (generate_b_nonce(v0) = v1) | a_nonce(v1) = 0) & ! [v0] : ! [v1] : ( ~ (generate_expiration_time(v0) = v1) | a_nonce(v1) = 0) & ! [v0] : ! [v1] : ( ~ (key(v0, b) = v1) | ? [v2] : ? [v3] : ? [v4] : (intruder_holds(v1) = v2 & b_holds(v3) = v4 & key(v0, a) = v3 & ( ~ (v4 = 0) | ~ (v2 = 0)))) & ! [v0] : ! [v1] : ( ~ (key(v0, a) = v1) | ? [v2] : ? [v3] : ? [v4] : (intruder_holds(v2) = v3 & b_holds(v1) = v4 & key(v0, b) = v2 & ( ~ (v4 = 0) | ~ (v3 = 0)))) & ? [v0] : ? [v1] : ? [v2] : ? [v3] : ? [v4] : ? [v5] : ? [v6] : ? [v7] : ? [v8] : ? [v9] : ? [v10] : ? [v11] : ? [v12] : ? [v13] : ? [v14] : ? [v15] : ? [v16] : ? [v17] : ? [v18] : ? [v19] : ? [v20] : ? [v21] : ? [v22] : ? [v23] : ? [v24] : (t_holds(v14) = v15 & t_holds(v12) = v13 & a_nonce(v3) = v16 & generate_key(v3) = v17 & quadruple(v0, v3, v17, v4) = v18 & triple(v19, v21, v1) = v22 & triple(v2, v17, v4) = v20 & triple(v2, v3, v4) = v7 & triple(v0, v1, v8) = v9 & encrypt(v20, v5) = v21 & encrypt(v18, v6) = v19 & encrypt(v7, v5) = v8 & sent(v0, t, v9) = v10 & sent(t, v2, v22) = v23 & message(v23) = v24 & message(v10) = v11 & key(v6, v2) = v14 & key(v5, v0) = v12 & ( ~ (v16 = 0) | ~ (v15 = 0) | ~ (v13 = 0) | ~ (v11 = 0) | v24 = 0)) & ? [v0] : ? [v1] : ? [v2] : ? [v3] : ? [v4] : ? [v5] : ? [v6] : ? [v7] : ? [v8] : ? [v9] : ? [v10] : ? [v11] : ? [v12] : ? [v13] : ? [v14] : ? [v15] : ? [v16] : ? [v17] : ? [v18] : (quadruple(v4, v5, v2, v1) = v6 & triple(v7, v3, v0) = v8 & a_stored(v11) = v12 & encrypt(v6, at) = v7 & encrypt(v0, v2) = v13 & pair(v4, v5) = v11 & pair(v3, v13) = v14 & sent(a, v4, v14) = v15 & sent(t, a, v8) = v9 & message(v15) = v16 & message(v9) = v10 & key(v2, v4) = v17 & a_holds(v17) = v18 & ( ~ (v12 = 0) | ~ (v10 = 0) | (v18 = 0 & v16 = 0))) & ? [v0] : ? [v1] : ? [v2] : ? [v3] : ? [v4] : ? [v5] : ? [v6] : ? [v7] : ? [v8] : ? [v9] : ? [v10] : ? [v11] : ? [v12] : ? [v13] : ? [v14] : (b_holds(v13) = v14 & generate_b_nonce(v2) = v6 & generate_expiration_time(v2) = v3 & b_stored(v11) = v12 & triple(v1, v0, v3) = v4 & encrypt(v6, v0) = v7 & encrypt(v4, bt) = v5 & pair(v5, v7) = v8 & pair(v1, v2) = v11 & sent(v1, b, v8) = v9 & message(v9) = v10 & key(v0, v1) = v13 & ( ~ (v12 = 0) | ~ (v10 = 0) | v14 = 0)) & ? [v0] : ? [v1] : ? [v2] : ? [v3] : ? [v4] : ? [v5] : ? [v6] : ? [v7] : ? [v8] : ? [v9] : ? [v10] : ? [v11] : ? [v12] : ? [v13] : (fresh_to_b(v1) = v5 & generate_b_nonce(v1) = v6 & generate_expiration_time(v1) = v7 & b_stored(v2) = v13 & triple(v0, v1, v7) = v8 & triple(b, v6, v9) = v10 & encrypt(v8, bt) = v9 & pair(v0, v1) = v2 & sent(v0, b, v2) = v3 & sent(b, t, v10) = v11 & message(v11) = v12 & message(v3) = v4 & ( ~ (v5 = 0) | ~ (v4 = 0) | (v13 = 0 & v12 = 0))) & ? [v0] : ? [v1] : ? [v2] : ? [v3] : ? [v4] : ? [v5] : ? [v6] : ? [v7] : ? [v8] : (intruder_holds(v5) = v6 & party_of_protocol(v2) = v7 & intruder_message(v3) = v4 & intruder_message(v1) = v8 & encrypt(v0, v1) = v3 & key(v1, v2) = v5 & ( ~ (v7 = 0) | ~ (v6 = 0) | ~ (v4 = 0) | v8 = 0)) & ? [v0] : ? [v1] : ? [v2] : ? [v3] : ? [v4] : ? [v5] : ? [v6] : ? [v7] : ? [v8] : (intruder_holds(v4) = v5 & party_of_protocol(v2) = v6 & intruder_message(v7) = v8 & intruder_message(v0) = v3 & encrypt(v0, v1) = v7 & key(v1, v2) = v4 & ( ~ (v6 = 0) | ~ (v5 = 0) | ~ (v3 = 0) | v8 = 0)) & ? [v0] : ? [v1] : ? [v2] : ? [v3] : ? [v4] : ? [v5] : ? [v6] : ? [v7] : (party_of_protocol(v2) = v5 & party_of_protocol(v1) = v4 & intruder_message(v0) = v3 & sent(v1, v2, v0) = v6 & message(v6) = v7 & ( ~ (v5 = 0) | ~ (v4 = 0) | ~ (v3 = 0) | v7 = 0)) & ? [v0] : ? [v1] : ? [v2] : ? [v3] : ? [v4] : ? [v5] : (intruder_holds(v4) = v5 & party_of_protocol(v1) = v3 & intruder_message(v0) = v2 & key(v0, v1) = v4 & ( ~ (v3 = 0) | ~ (v2 = 0) | v5 = 0)) & ? [v0] : ? [v1] : ? [v2] : ? [v3] : ? [v4] : ? [v5] : (intruder_message(v2) = v5 & sent(v0, v1, v2) = v3 & message(v3) = v4 & ( ~ (v4 = 0) | v5 = 0)) & ? [v0] : ? [v1] : ? [v2] : ? [v3] : ? [v4] : (intruder_holds(v1) = v2 & b_holds(v3) = v4 & key(v0, b) = v1 & key(v0, a) = v3 & ( ~ (v4 = 0) | ~ (v2 = 0)))
% 50.08/18.00 |
% 50.08/18.00 | Applying alpha-rule on (1) yields:
% 50.08/18.00 | (2) ! [v0] : ! [v1] : ( ~ (generate_key(v0) = v1) | ? [v2] : ( ~ (v2 = 0) & a_nonce(v1) = v2))
% 50.08/18.01 | (3) key(at, t) = all_0_0_0
% 50.08/18.01 | (4) ! [v0] : ! [v1] : ! [v2] : ! [v3] : ( ~ (sent(v0, v1, v2) = v3) | ? [v4] : ? [v5] : (intruder_message(v2) = v5 & message(v3) = v4 & ( ~ (v4 = 0) | v5 = 0)))
% 50.08/18.01 | (5) ! [v0] : ! [v1] : ! [v2] : (v1 = v0 | ~ (a_nonce(v2) = v1) | ~ (a_nonce(v2) = v0))
% 50.08/18.01 | (6) t_holds(all_0_5_5) = 0
% 50.08/18.01 | (7) ! [v0] : ! [v1] : ! [v2] : ! [v3] : ! [v4] : (v4 = 0 | ~ (party_of_protocol(v2) = 0) | ~ (intruder_message(v3) = v4) | ~ (encrypt(v0, v1) = v3) | ? [v5] : ? [v6] : ? [v7] : (intruder_holds(v6) = v7 & intruder_message(v0) = v5 & key(v1, v2) = v6 & ( ~ (v7 = 0) | ~ (v5 = 0))))
% 50.08/18.01 | (8) ! [v0] : ! [v1] : ! [v2] : ! [v3] : (v1 = v0 | ~ (encrypt(v3, v2) = v1) | ~ (encrypt(v3, v2) = v0))
% 50.08/18.01 | (9) ! [v0] : ! [v1] : ! [v2] : (v1 = v0 | ~ (generate_key(v2) = v1) | ~ (generate_key(v2) = v0))
% 50.08/18.01 | (10) party_of_protocol(b) = 0
% 50.08/18.01 | (11) pair(b, an_a_nonce) = all_0_3_3
% 50.08/18.01 | (12) ! [v0] : ! [v1] : ! [v2] : ( ~ (pair(v0, v1) = v2) | ? [v3] : ? [v4] : ? [v5] : (intruder_message(v2) = v5 & intruder_message(v1) = v4 & intruder_message(v0) = v3 & ( ~ (v4 = 0) | ~ (v3 = 0) | v5 = 0)))
% 50.08/18.01 | (13) ? [v0] : ? [v1] : ? [v2] : ? [v3] : ? [v4] : ? [v5] : (intruder_holds(v4) = v5 & party_of_protocol(v1) = v3 & intruder_message(v0) = v2 & key(v0, v1) = v4 & ( ~ (v3 = 0) | ~ (v2 = 0) | v5 = 0))
% 50.08/18.01 | (14) ! [v0] : ! [v1] : ! [v2] : ! [v3] : ! [v4] : ! [v5] : (v1 = v0 | ~ (quadruple(v5, v4, v3, v2) = v1) | ~ (quadruple(v5, v4, v3, v2) = v0))
% 50.08/18.01 | (15) ! [v0] : ! [v1] : ! [v2] : (v1 = v0 | ~ (message(v2) = v1) | ~ (message(v2) = v0))
% 50.08/18.01 | (16) fresh_to_b(an_a_nonce) = 0
% 50.08/18.01 | (17) ! [v0] : ! [v1] : ! [v2] : ! [v3] : ! [v4] : ( ~ (quadruple(v0, v1, v2, v3) = v4) | ? [v5] : ? [v6] : ? [v7] : ? [v8] : ? [v9] : (intruder_message(v4) = v5 & intruder_message(v3) = v9 & intruder_message(v2) = v8 & intruder_message(v1) = v7 & intruder_message(v0) = v6 & ( ~ (v5 = 0) | (v9 = 0 & v8 = 0 & v7 = 0 & v6 = 0))))
% 50.08/18.01 | (18) ! [v0] : ! [v1] : ! [v2] : (v1 = v0 | ~ (generate_expiration_time(v2) = v1) | ~ (generate_expiration_time(v2) = v0))
% 50.08/18.01 | (19) ! [v0] : ! [v1] : ! [v2] : ! [v3] : ( ~ (party_of_protocol(v2) = 0) | ~ (intruder_message(v3) = 0) | ~ (encrypt(v0, v1) = v3) | ? [v4] : ? [v5] : ? [v6] : (intruder_holds(v4) = v5 & intruder_message(v1) = v6 & key(v1, v2) = v4 & ( ~ (v5 = 0) | v6 = 0)))
% 50.08/18.01 | (20) t_holds(all_0_6_6) = 0
% 50.08/18.01 | (21) a_nonce(an_a_nonce) = 0
% 50.08/18.01 | (22) ! [v0] : ! [v1] : ! [v2] : ! [v3] : ! [v4] : ( ~ (generate_expiration_time(v2) = v3) | ~ (triple(v1, v0, v3) = v4) | ? [v5] : ? [v6] : ? [v7] : ? [v8] : ? [v9] : ? [v10] : ? [v11] : ? [v12] : ? [v13] : ? [v14] : (b_holds(v13) = v14 & generate_b_nonce(v2) = v6 & b_stored(v11) = v12 & encrypt(v6, v0) = v7 & encrypt(v4, bt) = v5 & pair(v5, v7) = v8 & pair(v1, v2) = v11 & sent(v1, b, v8) = v9 & message(v9) = v10 & key(v0, v1) = v13 & ( ~ (v12 = 0) | ~ (v10 = 0) | v14 = 0)))
% 50.08/18.01 | (23) ! [v0] : ! [v1] : ! [v2] : (v1 = v0 | ~ (a_holds(v2) = v1) | ~ (a_holds(v2) = v0))
% 50.08/18.01 | (24) key(bt, b) = all_0_6_6
% 50.08/18.01 | (25) b_holds(all_0_4_4) = 0
% 50.08/18.01 | (26) ! [v0] : ! [v1] : ! [v2] : (v1 = v0 | ~ (b_holds(v2) = v1) | ~ (b_holds(v2) = v0))
% 50.08/18.01 | (27) ? [v0] : ? [v1] : ? [v2] : ? [v3] : ? [v4] : ? [v5] : ? [v6] : ? [v7] : ? [v8] : ? [v9] : ? [v10] : ? [v11] : ? [v12] : ? [v13] : (fresh_to_b(v1) = v5 & generate_b_nonce(v1) = v6 & generate_expiration_time(v1) = v7 & b_stored(v2) = v13 & triple(v0, v1, v7) = v8 & triple(b, v6, v9) = v10 & encrypt(v8, bt) = v9 & pair(v0, v1) = v2 & sent(v0, b, v2) = v3 & sent(b, t, v10) = v11 & message(v11) = v12 & message(v3) = v4 & ( ~ (v5 = 0) | ~ (v4 = 0) | (v13 = 0 & v12 = 0)))
% 50.08/18.01 | (28) pair(a, an_a_nonce) = all_0_2_2
% 50.08/18.01 | (29) ! [v0] : ! [v1] : ! [v2] : (v1 = v0 | ~ (generate_b_nonce(v2) = v1) | ~ (generate_b_nonce(v2) = v0))
% 50.08/18.01 | (30) ! [v0] : ! [v1] : ! [v2] : (v1 = v0 | ~ (t_holds(v2) = v1) | ~ (t_holds(v2) = v0))
% 50.08/18.01 | (31) ! [v0] : ! [v1] : ! [v2] : (v1 = v0 | ~ (intruder_message(v2) = v1) | ~ (intruder_message(v2) = v0))
% 50.08/18.01 | (32) a_stored(all_0_3_3) = 0
% 50.08/18.01 | (33) ! [v0] : ! [v1] : ! [v2] : (v1 = v0 | ~ (a_stored(v2) = v1) | ~ (a_stored(v2) = v0))
% 50.08/18.01 | (34) party_of_protocol(t) = 0
% 50.08/18.01 | (35) ! [v0] : ! [v1] : ! [v2] : ! [v3] : ! [v4] : ! [v5] : ! [v6] : ! [v7] : ! [v8] : ( ~ (quadruple(v4, v5, v2, v1) = v6) | ~ (triple(v7, v3, v0) = v8) | ~ (encrypt(v6, at) = v7) | ? [v9] : ? [v10] : ? [v11] : ? [v12] : ? [v13] : ? [v14] : ? [v15] : ? [v16] : ? [v17] : ? [v18] : (a_stored(v11) = v12 & encrypt(v0, v2) = v13 & pair(v4, v5) = v11 & pair(v3, v13) = v14 & sent(a, v4, v14) = v15 & sent(t, a, v8) = v9 & message(v15) = v16 & message(v9) = v10 & key(v2, v4) = v17 & a_holds(v17) = v18 & ( ~ (v12 = 0) | ~ (v10 = 0) | (v18 = 0 & v16 = 0))))
% 50.08/18.02 | (36) ? [v0] : ? [v1] : ? [v2] : ? [v3] : ? [v4] : (intruder_holds(v1) = v2 & b_holds(v3) = v4 & key(v0, b) = v1 & key(v0, a) = v3 & ( ~ (v4 = 0) | ~ (v2 = 0)))
% 50.08/18.02 | (37) ! [v0] : ! [v1] : ! [v2] : (v1 = v0 | ~ (intruder_holds(v2) = v1) | ~ (intruder_holds(v2) = v0))
% 50.08/18.02 | (38) ! [v0] : ! [v1] : ( ~ (generate_b_nonce(v0) = v1) | a_nonce(v1) = 0)
% 50.08/18.02 | (39) ! [v0] : ! [v1] : ( ~ (key(v0, b) = v1) | ? [v2] : ? [v3] : ? [v4] : (intruder_holds(v1) = v2 & b_holds(v3) = v4 & key(v0, a) = v3 & ( ~ (v4 = 0) | ~ (v2 = 0))))
% 50.08/18.02 | (40) ! [v0] : ! [v1] : ! [v2] : ! [v3] : ( ~ (triple(v0, v1, v2) = v3) | ? [v4] : ? [v5] : ? [v6] : ? [v7] : (intruder_message(v3) = v7 & intruder_message(v2) = v6 & intruder_message(v1) = v5 & intruder_message(v0) = v4 & ( ~ (v6 = 0) | ~ (v5 = 0) | ~ (v4 = 0) | v7 = 0)))
% 50.08/18.02 | (41) sent(a, b, all_0_2_2) = all_0_1_1
% 50.08/18.02 | (42) ! [v0] : ! [v1] : ! [v2] : ! [v3] : ! [v4] : ! [v5] : ! [v6] : ! [v7] : ! [v8] : ! [v9] : ! [v10] : ! [v11] : ! [v12] : ( ~ (generate_key(v3) = v7) | ~ (quadruple(v0, v3, v7, v4) = v8) | ~ (triple(v9, v11, v1) = v12) | ~ (triple(v2, v7, v4) = v10) | ~ (encrypt(v10, v5) = v11) | ~ (encrypt(v8, v6) = v9) | ? [v13] : ? [v14] : ? [v15] : ? [v16] : ? [v17] : ? [v18] : ? [v19] : ? [v20] : ? [v21] : ? [v22] : ? [v23] : ? [v24] : (t_holds(v20) = v21 & t_holds(v18) = v19 & a_nonce(v3) = v22 & triple(v2, v3, v4) = v13 & triple(v0, v1, v14) = v15 & encrypt(v13, v5) = v14 & sent(v0, t, v15) = v16 & sent(t, v2, v12) = v23 & message(v23) = v24 & message(v16) = v17 & key(v6, v2) = v20 & key(v5, v0) = v18 & ( ~ (v22 = 0) | ~ (v21 = 0) | ~ (v19 = 0) | ~ (v17 = 0) | v24 = 0)))
% 50.08/18.02 | (43) party_of_protocol(a) = 0
% 50.08/18.02 | (44) ? [v0] : ? [v1] : ? [v2] : ? [v3] : ? [v4] : ? [v5] : ? [v6] : ? [v7] : ? [v8] : (intruder_holds(v4) = v5 & party_of_protocol(v2) = v6 & intruder_message(v7) = v8 & intruder_message(v0) = v3 & encrypt(v0, v1) = v7 & key(v1, v2) = v4 & ( ~ (v6 = 0) | ~ (v5 = 0) | ~ (v3 = 0) | v8 = 0))
% 50.08/18.02 | (45) ! [v0] : ! [v1] : ! [v2] : ! [v3] : ! [v4] : ! [v5] : (v5 = 0 | ~ (intruder_holds(v3) = 0) | ~ (intruder_message(v4) = v5) | ~ (encrypt(v0, v1) = v4) | ~ (key(v1, v2) = v3) | ? [v6] : ? [v7] : (party_of_protocol(v2) = v7 & intruder_message(v0) = v6 & ( ~ (v7 = 0) | ~ (v6 = 0))))
% 50.08/18.02 | (46) ? [v0] : ? [v1] : ? [v2] : ? [v3] : ? [v4] : ? [v5] : ? [v6] : ? [v7] : ? [v8] : ? [v9] : ? [v10] : ? [v11] : ? [v12] : ? [v13] : ? [v14] : ? [v15] : ? [v16] : ? [v17] : ? [v18] : (quadruple(v4, v5, v2, v1) = v6 & triple(v7, v3, v0) = v8 & a_stored(v11) = v12 & encrypt(v6, at) = v7 & encrypt(v0, v2) = v13 & pair(v4, v5) = v11 & pair(v3, v13) = v14 & sent(a, v4, v14) = v15 & sent(t, a, v8) = v9 & message(v15) = v16 & message(v9) = v10 & key(v2, v4) = v17 & a_holds(v17) = v18 & ( ~ (v12 = 0) | ~ (v10 = 0) | (v18 = 0 & v16 = 0)))
% 50.08/18.02 | (47) ? [v0] : ? [v1] : ? [v2] : ? [v3] : ? [v4] : ? [v5] : ? [v6] : ? [v7] : (party_of_protocol(v2) = v5 & party_of_protocol(v1) = v4 & intruder_message(v0) = v3 & sent(v1, v2, v0) = v6 & message(v6) = v7 & ( ~ (v5 = 0) | ~ (v4 = 0) | ~ (v3 = 0) | v7 = 0))
% 50.08/18.02 | (48) ! [v0] : ! [v1] : ! [v2] : (v1 = v0 | ~ (fresh_to_b(v2) = v1) | ~ (fresh_to_b(v2) = v0))
% 50.08/18.02 | (49) message(all_0_1_1) = 0
% 50.08/18.02 | (50) ? [v0] : ? [v1] : ? [v2] : ? [v3] : ? [v4] : ? [v5] : ? [v6] : ? [v7] : ? [v8] : ? [v9] : ? [v10] : ? [v11] : ? [v12] : ? [v13] : ? [v14] : (b_holds(v13) = v14 & generate_b_nonce(v2) = v6 & generate_expiration_time(v2) = v3 & b_stored(v11) = v12 & triple(v1, v0, v3) = v4 & encrypt(v6, v0) = v7 & encrypt(v4, bt) = v5 & pair(v5, v7) = v8 & pair(v1, v2) = v11 & sent(v1, b, v8) = v9 & message(v9) = v10 & key(v0, v1) = v13 & ( ~ (v12 = 0) | ~ (v10 = 0) | v14 = 0))
% 50.08/18.02 | (51) ! [v0] : ! [v1] : ! [v2] : ! [v3] : ! [v4] : ( ~ (quadruple(v0, v1, v2, v3) = v4) | ? [v5] : ? [v6] : ? [v7] : ? [v8] : ? [v9] : (intruder_message(v4) = v9 & intruder_message(v3) = v8 & intruder_message(v2) = v7 & intruder_message(v1) = v6 & intruder_message(v0) = v5 & ( ~ (v8 = 0) | ~ (v7 = 0) | ~ (v6 = 0) | ~ (v5 = 0) | v9 = 0)))
% 50.08/18.02 | (52) a_holds(all_0_0_0) = 0
% 50.08/18.02 | (53) key(at, a) = all_0_5_5
% 50.08/18.02 | (54) ! [v0] : ! [v1] : ( ~ (generate_expiration_time(v0) = v1) | a_nonce(v1) = 0)
% 50.08/18.02 | (55) ! [v0] : ! [v1] : ! [v2] : ! [v3] : (v1 = v0 | ~ (key(v3, v2) = v1) | ~ (key(v3, v2) = v0))
% 50.08/18.02 | (56) ! [v0] : ! [v1] : ! [v2] : ( ~ (pair(v0, v1) = v2) | ? [v3] : ? [v4] : ? [v5] : (intruder_message(v2) = v3 & intruder_message(v1) = v5 & intruder_message(v0) = v4 & ( ~ (v3 = 0) | (v5 = 0 & v4 = 0))))
% 50.08/18.02 | (57) ! [v0] : ! [v1] : ! [v2] : ( ~ (key(v0, v1) = v2) | ? [v3] : ? [v4] : ? [v5] : (intruder_holds(v2) = v5 & party_of_protocol(v1) = v4 & intruder_message(v0) = v3 & ( ~ (v4 = 0) | ~ (v3 = 0) | v5 = 0)))
% 50.08/18.02 | (58) ! [v0] : ! [v1] : ! [v2] : ! [v3] : ( ~ (generate_expiration_time(v1) = v2) | ~ (triple(v0, v1, v2) = v3) | ? [v4] : ? [v5] : ? [v6] : ? [v7] : ? [v8] : ? [v9] : ? [v10] : ? [v11] : ? [v12] : ? [v13] : (fresh_to_b(v1) = v7 & generate_b_nonce(v1) = v8 & b_stored(v4) = v13 & triple(b, v8, v9) = v10 & encrypt(v3, bt) = v9 & pair(v0, v1) = v4 & sent(v0, b, v4) = v5 & sent(b, t, v10) = v11 & message(v11) = v12 & message(v5) = v6 & ( ~ (v7 = 0) | ~ (v6 = 0) | (v13 = 0 & v12 = 0))))
% 50.08/18.03 | (59) key(bt, t) = all_0_4_4
% 50.08/18.03 | (60) ? [v0] : ? [v1] : ? [v2] : ? [v3] : ? [v4] : ? [v5] : ? [v6] : ? [v7] : ? [v8] : (intruder_holds(v5) = v6 & party_of_protocol(v2) = v7 & intruder_message(v3) = v4 & intruder_message(v1) = v8 & encrypt(v0, v1) = v3 & key(v1, v2) = v5 & ( ~ (v7 = 0) | ~ (v6 = 0) | ~ (v4 = 0) | v8 = 0))
% 50.08/18.03 | (61) ! [v0] : ! [v1] : ! [v2] : ! [v3] : ! [v4] : (v1 = v0 | ~ (triple(v4, v3, v2) = v1) | ~ (triple(v4, v3, v2) = v0))
% 50.08/18.03 | (62) ! [v0] : ! [v1] : ( ~ (key(v0, a) = v1) | ? [v2] : ? [v3] : ? [v4] : (intruder_holds(v2) = v3 & b_holds(v1) = v4 & key(v0, b) = v2 & ( ~ (v4 = 0) | ~ (v3 = 0))))
% 50.08/18.03 | (63) ! [v0] : ! [v1] : ! [v2] : ! [v3] : ( ~ (intruder_holds(v3) = 0) | ~ (intruder_message(v0) = 0) | ~ (key(v1, v2) = v3) | ? [v4] : ? [v5] : ? [v6] : (party_of_protocol(v2) = v4 & intruder_message(v5) = v6 & encrypt(v0, v1) = v5 & ( ~ (v4 = 0) | v6 = 0)))
% 50.08/18.03 | (64) ! [v0] : ! [v1] : ! [v2] : (v1 = v0 | ~ (b_stored(v2) = v1) | ~ (b_stored(v2) = v0))
% 50.08/18.03 | (65) ! [v0] : ! [v1] : ! [v2] : ! [v3] : ! [v4] : (v1 = v0 | ~ (sent(v4, v3, v2) = v1) | ~ (sent(v4, v3, v2) = v0))
% 50.08/18.03 | (66) ! [v0] : ! [v1] : ! [v2] : (v1 = v0 | ~ (party_of_protocol(v2) = v1) | ~ (party_of_protocol(v2) = v0))
% 50.08/18.03 | (67) ! [v0] : ! [v1] : ! [v2] : ! [v3] : ! [v4] : ( ~ (intruder_holds(v4) = 0) | ~ (intruder_message(v3) = 0) | ~ (encrypt(v0, v1) = v3) | ~ (key(v1, v2) = v4) | ? [v5] : ? [v6] : (party_of_protocol(v2) = v5 & intruder_message(v1) = v6 & ( ~ (v5 = 0) | v6 = 0)))
% 50.08/18.03 | (68) ! [v0] : ! [v1] : ! [v2] : ! [v3] : ( ~ (triple(v0, v1, v2) = v3) | ? [v4] : ? [v5] : ? [v6] : ? [v7] : (intruder_message(v3) = v4 & intruder_message(v2) = v7 & intruder_message(v1) = v6 & intruder_message(v0) = v5 & ( ~ (v4 = 0) | (v7 = 0 & v6 = 0 & v5 = 0))))
% 50.08/18.03 | (69) ? [v0] : ? [v1] : ? [v2] : ? [v3] : ? [v4] : ? [v5] : ? [v6] : ? [v7] : ? [v8] : ? [v9] : ? [v10] : ? [v11] : ? [v12] : ? [v13] : ? [v14] : ? [v15] : ? [v16] : ? [v17] : ? [v18] : ? [v19] : ? [v20] : ? [v21] : ? [v22] : ? [v23] : ? [v24] : (t_holds(v14) = v15 & t_holds(v12) = v13 & a_nonce(v3) = v16 & generate_key(v3) = v17 & quadruple(v0, v3, v17, v4) = v18 & triple(v19, v21, v1) = v22 & triple(v2, v17, v4) = v20 & triple(v2, v3, v4) = v7 & triple(v0, v1, v8) = v9 & encrypt(v20, v5) = v21 & encrypt(v18, v6) = v19 & encrypt(v7, v5) = v8 & sent(v0, t, v9) = v10 & sent(t, v2, v22) = v23 & message(v23) = v24 & message(v10) = v11 & key(v6, v2) = v14 & key(v5, v0) = v12 & ( ~ (v16 = 0) | ~ (v15 = 0) | ~ (v13 = 0) | ~ (v11 = 0) | v24 = 0))
% 50.08/18.03 | (70) ! [v0] : ! [v1] : ! [v2] : ( ~ (pair(v0, v1) = v2) | ? [v3] : ? [v4] : ? [v5] : ? [v6] : ? [v7] : ? [v8] : ? [v9] : ? [v10] : ? [v11] : ? [v12] : ? [v13] : (fresh_to_b(v1) = v5 & generate_b_nonce(v1) = v6 & generate_expiration_time(v1) = v7 & b_stored(v2) = v13 & triple(v0, v1, v7) = v8 & triple(b, v6, v9) = v10 & encrypt(v8, bt) = v9 & sent(v0, b, v2) = v3 & sent(b, t, v10) = v11 & message(v11) = v12 & message(v3) = v4 & ( ~ (v5 = 0) | ~ (v4 = 0) | (v13 = 0 & v12 = 0))))
% 50.08/18.03 | (71) ? [v0] : ? [v1] : ? [v2] : ? [v3] : ? [v4] : ? [v5] : (intruder_message(v2) = v5 & sent(v0, v1, v2) = v3 & message(v3) = v4 & ( ~ (v4 = 0) | v5 = 0))
% 50.08/18.03 | (72) ! [v0] : ! [v1] : ! [v2] : ! [v3] : (v1 = v0 | ~ (pair(v3, v2) = v1) | ~ (pair(v3, v2) = v0))
% 50.08/18.03 | (73) ! [v0] : ! [v1] : ! [v2] : ! [v3] : ( ~ (sent(v1, v2, v0) = v3) | ? [v4] : ? [v5] : ? [v6] : ? [v7] : (party_of_protocol(v2) = v6 & party_of_protocol(v1) = v5 & intruder_message(v0) = v4 & message(v3) = v7 & ( ~ (v6 = 0) | ~ (v5 = 0) | ~ (v4 = 0) | v7 = 0)))
% 50.08/18.03 |
% 50.08/18.03 | Instantiating (36) with all_3_0_7, all_3_1_8, all_3_2_9, all_3_3_10, all_3_4_11 yields:
% 50.08/18.03 | (74) intruder_holds(all_3_3_10) = all_3_2_9 & b_holds(all_3_1_8) = all_3_0_7 & key(all_3_4_11, b) = all_3_3_10 & key(all_3_4_11, a) = all_3_1_8 & ( ~ (all_3_0_7 = 0) | ~ (all_3_2_9 = 0))
% 50.08/18.03 |
% 50.08/18.03 | Applying alpha-rule on (74) yields:
% 50.08/18.03 | (75) ~ (all_3_0_7 = 0) | ~ (all_3_2_9 = 0)
% 50.08/18.03 | (76) b_holds(all_3_1_8) = all_3_0_7
% 50.08/18.03 | (77) key(all_3_4_11, a) = all_3_1_8
% 50.08/18.03 | (78) key(all_3_4_11, b) = all_3_3_10
% 50.08/18.03 | (79) intruder_holds(all_3_3_10) = all_3_2_9
% 50.08/18.03 |
% 50.08/18.03 | Instantiating (27) with all_11_0_32, all_11_1_33, all_11_2_34, all_11_3_35, all_11_4_36, all_11_5_37, all_11_6_38, all_11_7_39, all_11_8_40, all_11_9_41, all_11_10_42, all_11_11_43, all_11_12_44, all_11_13_45 yields:
% 50.08/18.03 | (80) fresh_to_b(all_11_12_44) = all_11_8_40 & generate_b_nonce(all_11_12_44) = all_11_7_39 & generate_expiration_time(all_11_12_44) = all_11_6_38 & b_stored(all_11_11_43) = all_11_0_32 & triple(all_11_13_45, all_11_12_44, all_11_6_38) = all_11_5_37 & triple(b, all_11_7_39, all_11_4_36) = all_11_3_35 & encrypt(all_11_5_37, bt) = all_11_4_36 & pair(all_11_13_45, all_11_12_44) = all_11_11_43 & sent(all_11_13_45, b, all_11_11_43) = all_11_10_42 & sent(b, t, all_11_3_35) = all_11_2_34 & message(all_11_2_34) = all_11_1_33 & message(all_11_10_42) = all_11_9_41 & ( ~ (all_11_8_40 = 0) | ~ (all_11_9_41 = 0) | (all_11_0_32 = 0 & all_11_1_33 = 0))
% 50.08/18.03 |
% 50.08/18.03 | Applying alpha-rule on (80) yields:
% 50.08/18.03 | (81) sent(b, t, all_11_3_35) = all_11_2_34
% 50.08/18.03 | (82) message(all_11_10_42) = all_11_9_41
% 50.08/18.04 | (83) triple(all_11_13_45, all_11_12_44, all_11_6_38) = all_11_5_37
% 50.08/18.04 | (84) fresh_to_b(all_11_12_44) = all_11_8_40
% 50.08/18.04 | (85) encrypt(all_11_5_37, bt) = all_11_4_36
% 50.08/18.04 | (86) pair(all_11_13_45, all_11_12_44) = all_11_11_43
% 50.08/18.04 | (87) sent(all_11_13_45, b, all_11_11_43) = all_11_10_42
% 50.08/18.04 | (88) triple(b, all_11_7_39, all_11_4_36) = all_11_3_35
% 50.08/18.04 | (89) generate_b_nonce(all_11_12_44) = all_11_7_39
% 50.08/18.04 | (90) generate_expiration_time(all_11_12_44) = all_11_6_38
% 50.08/18.04 | (91) ~ (all_11_8_40 = 0) | ~ (all_11_9_41 = 0) | (all_11_0_32 = 0 & all_11_1_33 = 0)
% 50.08/18.04 | (92) b_stored(all_11_11_43) = all_11_0_32
% 50.08/18.04 | (93) message(all_11_2_34) = all_11_1_33
% 50.08/18.04 |
% 50.08/18.04 | Instantiating (50) with all_13_0_46, all_13_1_47, all_13_2_48, all_13_3_49, all_13_4_50, all_13_5_51, all_13_6_52, all_13_7_53, all_13_8_54, all_13_9_55, all_13_10_56, all_13_11_57, all_13_12_58, all_13_13_59, all_13_14_60 yields:
% 50.08/18.04 | (94) b_holds(all_13_1_47) = all_13_0_46 & generate_b_nonce(all_13_12_58) = all_13_8_54 & generate_expiration_time(all_13_12_58) = all_13_11_57 & b_stored(all_13_3_49) = all_13_2_48 & triple(all_13_13_59, all_13_14_60, all_13_11_57) = all_13_10_56 & encrypt(all_13_8_54, all_13_14_60) = all_13_7_53 & encrypt(all_13_10_56, bt) = all_13_9_55 & pair(all_13_9_55, all_13_7_53) = all_13_6_52 & pair(all_13_13_59, all_13_12_58) = all_13_3_49 & sent(all_13_13_59, b, all_13_6_52) = all_13_5_51 & message(all_13_5_51) = all_13_4_50 & key(all_13_14_60, all_13_13_59) = all_13_1_47 & ( ~ (all_13_2_48 = 0) | ~ (all_13_4_50 = 0) | all_13_0_46 = 0)
% 50.08/18.04 |
% 50.08/18.04 | Applying alpha-rule on (94) yields:
% 50.08/18.04 | (95) b_holds(all_13_1_47) = all_13_0_46
% 50.08/18.04 | (96) b_stored(all_13_3_49) = all_13_2_48
% 50.08/18.04 | (97) ~ (all_13_2_48 = 0) | ~ (all_13_4_50 = 0) | all_13_0_46 = 0
% 50.08/18.04 | (98) generate_expiration_time(all_13_12_58) = all_13_11_57
% 50.08/18.04 | (99) pair(all_13_13_59, all_13_12_58) = all_13_3_49
% 50.08/18.04 | (100) encrypt(all_13_10_56, bt) = all_13_9_55
% 50.08/18.04 | (101) sent(all_13_13_59, b, all_13_6_52) = all_13_5_51
% 50.08/18.04 | (102) key(all_13_14_60, all_13_13_59) = all_13_1_47
% 50.08/18.04 | (103) message(all_13_5_51) = all_13_4_50
% 50.08/18.04 | (104) generate_b_nonce(all_13_12_58) = all_13_8_54
% 50.08/18.04 | (105) triple(all_13_13_59, all_13_14_60, all_13_11_57) = all_13_10_56
% 50.08/18.04 | (106) pair(all_13_9_55, all_13_7_53) = all_13_6_52
% 50.08/18.04 | (107) encrypt(all_13_8_54, all_13_14_60) = all_13_7_53
% 50.08/18.04 |
% 50.08/18.04 | Instantiating (46) with all_15_0_61, all_15_1_62, all_15_2_63, all_15_3_64, all_15_4_65, all_15_5_66, all_15_6_67, all_15_7_68, all_15_8_69, all_15_9_70, all_15_10_71, all_15_11_72, all_15_12_73, all_15_13_74, all_15_14_75, all_15_15_76, all_15_16_77, all_15_17_78, all_15_18_79 yields:
% 50.08/18.04 | (108) quadruple(all_15_14_75, all_15_13_74, all_15_16_77, all_15_17_78) = all_15_12_73 & triple(all_15_11_72, all_15_15_76, all_15_18_79) = all_15_10_71 & a_stored(all_15_7_68) = all_15_6_67 & encrypt(all_15_12_73, at) = all_15_11_72 & encrypt(all_15_18_79, all_15_16_77) = all_15_5_66 & pair(all_15_14_75, all_15_13_74) = all_15_7_68 & pair(all_15_15_76, all_15_5_66) = all_15_4_65 & sent(a, all_15_14_75, all_15_4_65) = all_15_3_64 & sent(t, a, all_15_10_71) = all_15_9_70 & message(all_15_3_64) = all_15_2_63 & message(all_15_9_70) = all_15_8_69 & key(all_15_16_77, all_15_14_75) = all_15_1_62 & a_holds(all_15_1_62) = all_15_0_61 & ( ~ (all_15_6_67 = 0) | ~ (all_15_8_69 = 0) | (all_15_0_61 = 0 & all_15_2_63 = 0))
% 50.08/18.04 |
% 50.08/18.04 | Applying alpha-rule on (108) yields:
% 50.08/18.04 | (109) message(all_15_3_64) = all_15_2_63
% 50.08/18.04 | (110) ~ (all_15_6_67 = 0) | ~ (all_15_8_69 = 0) | (all_15_0_61 = 0 & all_15_2_63 = 0)
% 50.08/18.04 | (111) triple(all_15_11_72, all_15_15_76, all_15_18_79) = all_15_10_71
% 50.08/18.04 | (112) quadruple(all_15_14_75, all_15_13_74, all_15_16_77, all_15_17_78) = all_15_12_73
% 50.08/18.04 | (113) encrypt(all_15_12_73, at) = all_15_11_72
% 50.08/18.04 | (114) pair(all_15_15_76, all_15_5_66) = all_15_4_65
% 50.08/18.04 | (115) encrypt(all_15_18_79, all_15_16_77) = all_15_5_66
% 50.08/18.04 | (116) message(all_15_9_70) = all_15_8_69
% 50.08/18.04 | (117) sent(t, a, all_15_10_71) = all_15_9_70
% 50.08/18.04 | (118) a_holds(all_15_1_62) = all_15_0_61
% 50.08/18.04 | (119) sent(a, all_15_14_75, all_15_4_65) = all_15_3_64
% 50.08/18.04 | (120) pair(all_15_14_75, all_15_13_74) = all_15_7_68
% 50.08/18.04 | (121) key(all_15_16_77, all_15_14_75) = all_15_1_62
% 50.08/18.04 | (122) a_stored(all_15_7_68) = all_15_6_67
% 50.08/18.04 |
% 50.08/18.04 | Instantiating (44) with all_17_0_80, all_17_1_81, all_17_2_82, all_17_3_83, all_17_4_84, all_17_5_85, all_17_6_86, all_17_7_87, all_17_8_88 yields:
% 50.08/18.04 | (123) intruder_holds(all_17_4_84) = all_17_3_83 & party_of_protocol(all_17_6_86) = all_17_2_82 & intruder_message(all_17_1_81) = all_17_0_80 & intruder_message(all_17_8_88) = all_17_5_85 & encrypt(all_17_8_88, all_17_7_87) = all_17_1_81 & key(all_17_7_87, all_17_6_86) = all_17_4_84 & ( ~ (all_17_2_82 = 0) | ~ (all_17_3_83 = 0) | ~ (all_17_5_85 = 0) | all_17_0_80 = 0)
% 50.08/18.04 |
% 50.08/18.04 | Applying alpha-rule on (123) yields:
% 50.08/18.04 | (124) party_of_protocol(all_17_6_86) = all_17_2_82
% 50.08/18.04 | (125) intruder_message(all_17_8_88) = all_17_5_85
% 50.08/18.04 | (126) encrypt(all_17_8_88, all_17_7_87) = all_17_1_81
% 50.08/18.04 | (127) key(all_17_7_87, all_17_6_86) = all_17_4_84
% 50.08/18.04 | (128) intruder_message(all_17_1_81) = all_17_0_80
% 50.08/18.04 | (129) ~ (all_17_2_82 = 0) | ~ (all_17_3_83 = 0) | ~ (all_17_5_85 = 0) | all_17_0_80 = 0
% 50.08/18.04 | (130) intruder_holds(all_17_4_84) = all_17_3_83
% 50.08/18.04 |
% 50.08/18.04 | Instantiating (60) with all_19_0_89, all_19_1_90, all_19_2_91, all_19_3_92, all_19_4_93, all_19_5_94, all_19_6_95, all_19_7_96, all_19_8_97 yields:
% 50.08/18.04 | (131) intruder_holds(all_19_3_92) = all_19_2_91 & party_of_protocol(all_19_6_95) = all_19_1_90 & intruder_message(all_19_5_94) = all_19_4_93 & intruder_message(all_19_7_96) = all_19_0_89 & encrypt(all_19_8_97, all_19_7_96) = all_19_5_94 & key(all_19_7_96, all_19_6_95) = all_19_3_92 & ( ~ (all_19_1_90 = 0) | ~ (all_19_2_91 = 0) | ~ (all_19_4_93 = 0) | all_19_0_89 = 0)
% 50.08/18.04 |
% 50.08/18.04 | Applying alpha-rule on (131) yields:
% 50.08/18.04 | (132) ~ (all_19_1_90 = 0) | ~ (all_19_2_91 = 0) | ~ (all_19_4_93 = 0) | all_19_0_89 = 0
% 50.08/18.04 | (133) key(all_19_7_96, all_19_6_95) = all_19_3_92
% 50.08/18.04 | (134) intruder_message(all_19_5_94) = all_19_4_93
% 50.08/18.04 | (135) intruder_message(all_19_7_96) = all_19_0_89
% 50.08/18.04 | (136) intruder_holds(all_19_3_92) = all_19_2_91
% 50.08/18.04 | (137) party_of_protocol(all_19_6_95) = all_19_1_90
% 50.08/18.05 | (138) encrypt(all_19_8_97, all_19_7_96) = all_19_5_94
% 50.08/18.05 |
% 50.08/18.05 | Instantiating (69) with all_21_0_98, all_21_1_99, all_21_2_100, all_21_3_101, all_21_4_102, all_21_5_103, all_21_6_104, all_21_7_105, all_21_8_106, all_21_9_107, all_21_10_108, all_21_11_109, all_21_12_110, all_21_13_111, all_21_14_112, all_21_15_113, all_21_16_114, all_21_17_115, all_21_18_116, all_21_19_117, all_21_20_118, all_21_21_119, all_21_22_120, all_21_23_121, all_21_24_122 yields:
% 50.08/18.05 | (139) t_holds(all_21_10_108) = all_21_9_107 & t_holds(all_21_12_110) = all_21_11_109 & a_nonce(all_21_21_119) = all_21_8_106 & generate_key(all_21_21_119) = all_21_7_105 & quadruple(all_21_24_122, all_21_21_119, all_21_7_105, all_21_20_118) = all_21_6_104 & triple(all_21_5_103, all_21_3_101, all_21_23_121) = all_21_2_100 & triple(all_21_22_120, all_21_7_105, all_21_20_118) = all_21_4_102 & triple(all_21_22_120, all_21_21_119, all_21_20_118) = all_21_17_115 & triple(all_21_24_122, all_21_23_121, all_21_16_114) = all_21_15_113 & encrypt(all_21_4_102, all_21_19_117) = all_21_3_101 & encrypt(all_21_6_104, all_21_18_116) = all_21_5_103 & encrypt(all_21_17_115, all_21_19_117) = all_21_16_114 & sent(all_21_24_122, t, all_21_15_113) = all_21_14_112 & sent(t, all_21_22_120, all_21_2_100) = all_21_1_99 & message(all_21_1_99) = all_21_0_98 & message(all_21_14_112) = all_21_13_111 & key(all_21_18_116, all_21_22_120) = all_21_10_108 & key(all_21_19_117, all_21_24_122) = all_21_12_110 & ( ~ (all_21_8_106 = 0) | ~ (all_21_9_107 = 0) | ~ (all_21_11_109 = 0) | ~ (all_21_13_111 = 0) | all_21_0_98 = 0)
% 50.08/18.05 |
% 50.08/18.05 | Applying alpha-rule on (139) yields:
% 50.08/18.05 | (140) triple(all_21_22_120, all_21_7_105, all_21_20_118) = all_21_4_102
% 50.08/18.05 | (141) sent(all_21_24_122, t, all_21_15_113) = all_21_14_112
% 50.08/18.05 | (142) message(all_21_1_99) = all_21_0_98
% 50.08/18.05 | (143) key(all_21_18_116, all_21_22_120) = all_21_10_108
% 50.08/18.05 | (144) generate_key(all_21_21_119) = all_21_7_105
% 50.08/18.05 | (145) a_nonce(all_21_21_119) = all_21_8_106
% 50.08/18.05 | (146) key(all_21_19_117, all_21_24_122) = all_21_12_110
% 50.08/18.05 | (147) quadruple(all_21_24_122, all_21_21_119, all_21_7_105, all_21_20_118) = all_21_6_104
% 50.08/18.05 | (148) message(all_21_14_112) = all_21_13_111
% 50.08/18.05 | (149) sent(t, all_21_22_120, all_21_2_100) = all_21_1_99
% 50.08/18.05 | (150) t_holds(all_21_12_110) = all_21_11_109
% 50.08/18.05 | (151) encrypt(all_21_17_115, all_21_19_117) = all_21_16_114
% 50.08/18.05 | (152) triple(all_21_5_103, all_21_3_101, all_21_23_121) = all_21_2_100
% 50.08/18.05 | (153) t_holds(all_21_10_108) = all_21_9_107
% 50.08/18.05 | (154) ~ (all_21_8_106 = 0) | ~ (all_21_9_107 = 0) | ~ (all_21_11_109 = 0) | ~ (all_21_13_111 = 0) | all_21_0_98 = 0
% 50.08/18.05 | (155) encrypt(all_21_4_102, all_21_19_117) = all_21_3_101
% 50.08/18.05 | (156) encrypt(all_21_6_104, all_21_18_116) = all_21_5_103
% 50.08/18.05 | (157) triple(all_21_22_120, all_21_21_119, all_21_20_118) = all_21_17_115
% 50.08/18.05 | (158) triple(all_21_24_122, all_21_23_121, all_21_16_114) = all_21_15_113
% 50.08/18.05 |
% 50.08/18.05 | Instantiating formula (22) with all_13_10_56, all_13_11_57, all_13_12_58, all_13_13_59, all_13_14_60 and discharging atoms generate_expiration_time(all_13_12_58) = all_13_11_57, triple(all_13_13_59, all_13_14_60, all_13_11_57) = all_13_10_56, yields:
% 50.08/18.05 | (159) ? [v0] : ? [v1] : ? [v2] : ? [v3] : ? [v4] : ? [v5] : ? [v6] : ? [v7] : ? [v8] : ? [v9] : (b_holds(v8) = v9 & generate_b_nonce(all_13_12_58) = v1 & b_stored(v6) = v7 & encrypt(v1, all_13_14_60) = v2 & encrypt(all_13_10_56, bt) = v0 & pair(v0, v2) = v3 & pair(all_13_13_59, all_13_12_58) = v6 & sent(all_13_13_59, b, v3) = v4 & message(v4) = v5 & key(all_13_14_60, all_13_13_59) = v8 & ( ~ (v7 = 0) | ~ (v5 = 0) | v9 = 0))
% 50.08/18.05 |
% 50.08/18.05 | Instantiating formula (58) with all_11_5_37, all_11_6_38, all_11_12_44, all_11_13_45 and discharging atoms generate_expiration_time(all_11_12_44) = all_11_6_38, triple(all_11_13_45, all_11_12_44, all_11_6_38) = all_11_5_37, yields:
% 50.08/18.05 | (160) ? [v0] : ? [v1] : ? [v2] : ? [v3] : ? [v4] : ? [v5] : ? [v6] : ? [v7] : ? [v8] : ? [v9] : (fresh_to_b(all_11_12_44) = v3 & generate_b_nonce(all_11_12_44) = v4 & b_stored(v0) = v9 & triple(b, v4, v5) = v6 & encrypt(all_11_5_37, bt) = v5 & pair(all_11_13_45, all_11_12_44) = v0 & sent(all_11_13_45, b, v0) = v1 & sent(b, t, v6) = v7 & message(v7) = v8 & message(v1) = v2 & ( ~ (v3 = 0) | ~ (v2 = 0) | (v9 = 0 & v8 = 0)))
% 50.08/18.05 |
% 50.08/18.05 | Instantiating formula (22) with all_11_5_37, all_11_6_38, all_11_12_44, all_11_13_45, all_11_12_44 and discharging atoms generate_expiration_time(all_11_12_44) = all_11_6_38, triple(all_11_13_45, all_11_12_44, all_11_6_38) = all_11_5_37, yields:
% 50.08/18.05 | (161) ? [v0] : ? [v1] : ? [v2] : ? [v3] : ? [v4] : ? [v5] : ? [v6] : ? [v7] : ? [v8] : ? [v9] : (b_holds(v8) = v9 & generate_b_nonce(all_11_12_44) = v1 & b_stored(v6) = v7 & encrypt(v1, all_11_12_44) = v2 & encrypt(all_11_5_37, bt) = v0 & pair(v0, v2) = v3 & pair(all_11_13_45, all_11_12_44) = v6 & sent(all_11_13_45, b, v3) = v4 & message(v4) = v5 & key(all_11_12_44, all_11_13_45) = v8 & ( ~ (v7 = 0) | ~ (v5 = 0) | v9 = 0))
% 50.08/18.05 |
% 50.08/18.05 | Instantiating formula (40) with all_11_3_35, all_11_4_36, all_11_7_39, b and discharging atoms triple(b, all_11_7_39, all_11_4_36) = all_11_3_35, yields:
% 50.08/18.05 | (162) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (intruder_message(all_11_3_35) = v3 & intruder_message(all_11_4_36) = v2 & intruder_message(all_11_7_39) = v1 & intruder_message(b) = v0 & ( ~ (v2 = 0) | ~ (v1 = 0) | ~ (v0 = 0) | v3 = 0))
% 50.08/18.05 |
% 50.08/18.05 | Instantiating formula (68) with all_11_3_35, all_11_4_36, all_11_7_39, b and discharging atoms triple(b, all_11_7_39, all_11_4_36) = all_11_3_35, yields:
% 50.08/18.05 | (163) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (intruder_message(all_11_3_35) = v0 & intruder_message(all_11_4_36) = v3 & intruder_message(all_11_7_39) = v2 & intruder_message(b) = v1 & ( ~ (v0 = 0) | (v3 = 0 & v2 = 0 & v1 = 0)))
% 50.08/18.05 |
% 50.08/18.05 | Instantiating formula (7) with all_19_4_93, all_19_5_94, b, all_19_7_96, all_19_8_97 and discharging atoms party_of_protocol(b) = 0, intruder_message(all_19_5_94) = all_19_4_93, encrypt(all_19_8_97, all_19_7_96) = all_19_5_94, yields:
% 50.08/18.05 | (164) all_19_4_93 = 0 | ? [v0] : ? [v1] : ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_19_8_97) = v0 & key(all_19_7_96, b) = v1 & ( ~ (v2 = 0) | ~ (v0 = 0)))
% 50.08/18.06 |
% 50.08/18.06 | Instantiating formula (7) with all_19_4_93, all_19_5_94, a, all_19_7_96, all_19_8_97 and discharging atoms party_of_protocol(a) = 0, intruder_message(all_19_5_94) = all_19_4_93, encrypt(all_19_8_97, all_19_7_96) = all_19_5_94, yields:
% 50.08/18.06 | (165) all_19_4_93 = 0 | ? [v0] : ? [v1] : ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_19_8_97) = v0 & key(all_19_7_96, a) = v1 & ( ~ (v2 = 0) | ~ (v0 = 0)))
% 50.08/18.06 |
% 50.08/18.06 | Instantiating formula (7) with all_19_4_93, all_19_5_94, t, all_19_7_96, all_19_8_97 and discharging atoms party_of_protocol(t) = 0, intruder_message(all_19_5_94) = all_19_4_93, encrypt(all_19_8_97, all_19_7_96) = all_19_5_94, yields:
% 50.08/18.06 | (166) all_19_4_93 = 0 | ? [v0] : ? [v1] : ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_19_8_97) = v0 & key(all_19_7_96, t) = v1 & ( ~ (v2 = 0) | ~ (v0 = 0)))
% 50.08/18.06 |
% 50.08/18.06 | Instantiating formula (7) with all_17_0_80, all_17_1_81, b, all_17_7_87, all_17_8_88 and discharging atoms party_of_protocol(b) = 0, intruder_message(all_17_1_81) = all_17_0_80, encrypt(all_17_8_88, all_17_7_87) = all_17_1_81, yields:
% 50.08/18.06 | (167) all_17_0_80 = 0 | ? [v0] : ? [v1] : ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_17_8_88) = v0 & key(all_17_7_87, b) = v1 & ( ~ (v2 = 0) | ~ (v0 = 0)))
% 50.08/18.06 |
% 50.08/18.06 | Instantiating formula (7) with all_17_0_80, all_17_1_81, a, all_17_7_87, all_17_8_88 and discharging atoms party_of_protocol(a) = 0, intruder_message(all_17_1_81) = all_17_0_80, encrypt(all_17_8_88, all_17_7_87) = all_17_1_81, yields:
% 50.08/18.06 | (168) all_17_0_80 = 0 | ? [v0] : ? [v1] : ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_17_8_88) = v0 & key(all_17_7_87, a) = v1 & ( ~ (v2 = 0) | ~ (v0 = 0)))
% 50.08/18.06 |
% 50.08/18.06 | Instantiating formula (7) with all_17_0_80, all_17_1_81, t, all_17_7_87, all_17_8_88 and discharging atoms party_of_protocol(t) = 0, intruder_message(all_17_1_81) = all_17_0_80, encrypt(all_17_8_88, all_17_7_87) = all_17_1_81, yields:
% 50.08/18.06 | (169) all_17_0_80 = 0 | ? [v0] : ? [v1] : ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_17_8_88) = v0 & key(all_17_7_87, t) = v1 & ( ~ (v2 = 0) | ~ (v0 = 0)))
% 50.08/18.06 |
% 50.08/18.06 | Instantiating formula (70) with all_15_7_68, all_15_13_74, all_15_14_75 and discharging atoms pair(all_15_14_75, all_15_13_74) = all_15_7_68, yields:
% 50.08/18.06 | (170) ? [v0] : ? [v1] : ? [v2] : ? [v3] : ? [v4] : ? [v5] : ? [v6] : ? [v7] : ? [v8] : ? [v9] : ? [v10] : (fresh_to_b(all_15_13_74) = v2 & generate_b_nonce(all_15_13_74) = v3 & generate_expiration_time(all_15_13_74) = v4 & b_stored(all_15_7_68) = v10 & triple(all_15_14_75, all_15_13_74, v4) = v5 & triple(b, v3, v6) = v7 & encrypt(v5, bt) = v6 & sent(all_15_14_75, b, all_15_7_68) = v0 & sent(b, t, v7) = v8 & message(v8) = v9 & message(v0) = v1 & ( ~ (v2 = 0) | ~ (v1 = 0) | (v10 = 0 & v9 = 0)))
% 50.08/18.06 |
% 50.08/18.06 | Instantiating formula (70) with all_15_4_65, all_15_5_66, all_15_15_76 and discharging atoms pair(all_15_15_76, all_15_5_66) = all_15_4_65, yields:
% 50.08/18.06 | (171) ? [v0] : ? [v1] : ? [v2] : ? [v3] : ? [v4] : ? [v5] : ? [v6] : ? [v7] : ? [v8] : ? [v9] : ? [v10] : (fresh_to_b(all_15_5_66) = v2 & generate_b_nonce(all_15_5_66) = v3 & generate_expiration_time(all_15_5_66) = v4 & b_stored(all_15_4_65) = v10 & triple(all_15_15_76, all_15_5_66, v4) = v5 & triple(b, v3, v6) = v7 & encrypt(v5, bt) = v6 & sent(all_15_15_76, b, all_15_4_65) = v0 & sent(b, t, v7) = v8 & message(v8) = v9 & message(v0) = v1 & ( ~ (v2 = 0) | ~ (v1 = 0) | (v10 = 0 & v9 = 0)))
% 50.08/18.06 |
% 50.08/18.06 | Instantiating formula (70) with all_13_6_52, all_13_7_53, all_13_9_55 and discharging atoms pair(all_13_9_55, all_13_7_53) = all_13_6_52, yields:
% 50.08/18.06 | (172) ? [v0] : ? [v1] : ? [v2] : ? [v3] : ? [v4] : ? [v5] : ? [v6] : ? [v7] : ? [v8] : ? [v9] : ? [v10] : (fresh_to_b(all_13_7_53) = v2 & generate_b_nonce(all_13_7_53) = v3 & generate_expiration_time(all_13_7_53) = v4 & b_stored(all_13_6_52) = v10 & triple(all_13_9_55, all_13_7_53, v4) = v5 & triple(b, v3, v6) = v7 & encrypt(v5, bt) = v6 & sent(all_13_9_55, b, all_13_6_52) = v0 & sent(b, t, v7) = v8 & message(v8) = v9 & message(v0) = v1 & ( ~ (v2 = 0) | ~ (v1 = 0) | (v10 = 0 & v9 = 0)))
% 50.08/18.06 |
% 50.08/18.06 | Instantiating formula (12) with all_13_6_52, all_13_7_53, all_13_9_55 and discharging atoms pair(all_13_9_55, all_13_7_53) = all_13_6_52, yields:
% 50.08/18.06 | (173) ? [v0] : ? [v1] : ? [v2] : (intruder_message(all_13_6_52) = v2 & intruder_message(all_13_7_53) = v1 & intruder_message(all_13_9_55) = v0 & ( ~ (v1 = 0) | ~ (v0 = 0) | v2 = 0))
% 50.08/18.06 |
% 50.08/18.06 | Instantiating formula (56) with all_13_6_52, all_13_7_53, all_13_9_55 and discharging atoms pair(all_13_9_55, all_13_7_53) = all_13_6_52, yields:
% 50.08/18.06 | (174) ? [v0] : ? [v1] : ? [v2] : (intruder_message(all_13_6_52) = v0 & intruder_message(all_13_7_53) = v2 & intruder_message(all_13_9_55) = v1 & ( ~ (v0 = 0) | (v2 = 0 & v1 = 0)))
% 50.08/18.06 |
% 50.08/18.06 | Instantiating formula (70) with all_13_3_49, all_13_12_58, all_13_13_59 and discharging atoms pair(all_13_13_59, all_13_12_58) = all_13_3_49, yields:
% 50.08/18.06 | (175) ? [v0] : ? [v1] : ? [v2] : ? [v3] : ? [v4] : ? [v5] : ? [v6] : ? [v7] : ? [v8] : ? [v9] : ? [v10] : (fresh_to_b(all_13_12_58) = v2 & generate_b_nonce(all_13_12_58) = v3 & generate_expiration_time(all_13_12_58) = v4 & b_stored(all_13_3_49) = v10 & triple(all_13_13_59, all_13_12_58, v4) = v5 & triple(b, v3, v6) = v7 & encrypt(v5, bt) = v6 & sent(all_13_13_59, b, all_13_3_49) = v0 & sent(b, t, v7) = v8 & message(v8) = v9 & message(v0) = v1 & ( ~ (v2 = 0) | ~ (v1 = 0) | (v10 = 0 & v9 = 0)))
% 50.43/18.06 |
% 50.43/18.06 | Instantiating formula (70) with all_0_3_3, an_a_nonce, b and discharging atoms pair(b, an_a_nonce) = all_0_3_3, yields:
% 50.43/18.06 | (176) ? [v0] : ? [v1] : ? [v2] : ? [v3] : ? [v4] : ? [v5] : ? [v6] : ? [v7] : ? [v8] : ? [v9] : ? [v10] : (fresh_to_b(an_a_nonce) = v2 & generate_b_nonce(an_a_nonce) = v3 & generate_expiration_time(an_a_nonce) = v4 & b_stored(all_0_3_3) = v10 & triple(b, v3, v6) = v7 & triple(b, an_a_nonce, v4) = v5 & encrypt(v5, bt) = v6 & sent(b, b, all_0_3_3) = v0 & sent(b, t, v7) = v8 & message(v8) = v9 & message(v0) = v1 & ( ~ (v2 = 0) | ~ (v1 = 0) | (v10 = 0 & v9 = 0)))
% 50.43/18.06 |
% 50.43/18.06 | Instantiating formula (12) with all_0_3_3, an_a_nonce, b and discharging atoms pair(b, an_a_nonce) = all_0_3_3, yields:
% 50.43/18.06 | (177) ? [v0] : ? [v1] : ? [v2] : (intruder_message(all_0_3_3) = v2 & intruder_message(an_a_nonce) = v1 & intruder_message(b) = v0 & ( ~ (v1 = 0) | ~ (v0 = 0) | v2 = 0))
% 50.43/18.07 |
% 50.43/18.07 | Instantiating formula (56) with all_0_3_3, an_a_nonce, b and discharging atoms pair(b, an_a_nonce) = all_0_3_3, yields:
% 50.43/18.07 | (178) ? [v0] : ? [v1] : ? [v2] : (intruder_message(all_0_3_3) = v0 & intruder_message(an_a_nonce) = v2 & intruder_message(b) = v1 & ( ~ (v0 = 0) | (v2 = 0 & v1 = 0)))
% 50.43/18.07 |
% 50.43/18.07 | Instantiating formula (70) with all_0_2_2, an_a_nonce, a and discharging atoms pair(a, an_a_nonce) = all_0_2_2, yields:
% 50.43/18.07 | (179) ? [v0] : ? [v1] : ? [v2] : ? [v3] : ? [v4] : ? [v5] : ? [v6] : ? [v7] : ? [v8] : ? [v9] : ? [v10] : (fresh_to_b(an_a_nonce) = v2 & generate_b_nonce(an_a_nonce) = v3 & generate_expiration_time(an_a_nonce) = v4 & b_stored(all_0_2_2) = v10 & triple(b, v3, v6) = v7 & triple(a, an_a_nonce, v4) = v5 & encrypt(v5, bt) = v6 & sent(b, t, v7) = v8 & sent(a, b, all_0_2_2) = v0 & message(v8) = v9 & message(v0) = v1 & ( ~ (v2 = 0) | ~ (v1 = 0) | (v10 = 0 & v9 = 0)))
% 50.43/18.07 |
% 50.43/18.07 | Instantiating formula (12) with all_0_2_2, an_a_nonce, a and discharging atoms pair(a, an_a_nonce) = all_0_2_2, yields:
% 50.43/18.07 | (180) ? [v0] : ? [v1] : ? [v2] : (intruder_message(all_0_2_2) = v2 & intruder_message(an_a_nonce) = v1 & intruder_message(a) = v0 & ( ~ (v1 = 0) | ~ (v0 = 0) | v2 = 0))
% 50.45/18.07 |
% 50.45/18.07 | Instantiating formula (56) with all_0_2_2, an_a_nonce, a and discharging atoms pair(a, an_a_nonce) = all_0_2_2, yields:
% 50.45/18.07 | (181) ? [v0] : ? [v1] : ? [v2] : (intruder_message(all_0_2_2) = v0 & intruder_message(an_a_nonce) = v2 & intruder_message(a) = v1 & ( ~ (v0 = 0) | (v2 = 0 & v1 = 0)))
% 50.45/18.07 |
% 50.45/18.07 | Instantiating formula (73) with all_21_14_112, t, all_21_24_122, all_21_15_113 and discharging atoms sent(all_21_24_122, t, all_21_15_113) = all_21_14_112, yields:
% 50.45/18.07 | (182) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (party_of_protocol(all_21_24_122) = v1 & party_of_protocol(t) = v2 & intruder_message(all_21_15_113) = v0 & message(all_21_14_112) = v3 & ( ~ (v2 = 0) | ~ (v1 = 0) | ~ (v0 = 0) | v3 = 0))
% 50.45/18.07 |
% 50.45/18.07 | Instantiating formula (73) with all_13_5_51, b, all_13_13_59, all_13_6_52 and discharging atoms sent(all_13_13_59, b, all_13_6_52) = all_13_5_51, yields:
% 50.45/18.07 | (183) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (party_of_protocol(all_13_13_59) = v1 & party_of_protocol(b) = v2 & intruder_message(all_13_6_52) = v0 & message(all_13_5_51) = v3 & ( ~ (v2 = 0) | ~ (v1 = 0) | ~ (v0 = 0) | v3 = 0))
% 50.45/18.07 |
% 50.45/18.07 | Instantiating formula (73) with all_11_10_42, b, all_11_13_45, all_11_11_43 and discharging atoms sent(all_11_13_45, b, all_11_11_43) = all_11_10_42, yields:
% 50.45/18.07 | (184) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (party_of_protocol(all_11_13_45) = v1 & party_of_protocol(b) = v2 & intruder_message(all_11_11_43) = v0 & message(all_11_10_42) = v3 & ( ~ (v2 = 0) | ~ (v1 = 0) | ~ (v0 = 0) | v3 = 0))
% 50.45/18.07 |
% 50.45/18.07 | Instantiating formula (73) with all_11_2_34, t, b, all_11_3_35 and discharging atoms sent(b, t, all_11_3_35) = all_11_2_34, yields:
% 50.45/18.07 | (185) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (party_of_protocol(b) = v1 & party_of_protocol(t) = v2 & intruder_message(all_11_3_35) = v0 & message(all_11_2_34) = v3 & ( ~ (v2 = 0) | ~ (v1 = 0) | ~ (v0 = 0) | v3 = 0))
% 50.45/18.07 |
% 50.45/18.07 | Instantiating formula (73) with all_15_3_64, all_15_14_75, a, all_15_4_65 and discharging atoms sent(a, all_15_14_75, all_15_4_65) = all_15_3_64, yields:
% 50.45/18.07 | (186) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (party_of_protocol(all_15_14_75) = v2 & party_of_protocol(a) = v1 & intruder_message(all_15_4_65) = v0 & message(all_15_3_64) = v3 & ( ~ (v2 = 0) | ~ (v1 = 0) | ~ (v0 = 0) | v3 = 0))
% 50.45/18.07 |
% 50.45/18.07 | Instantiating formula (73) with all_0_1_1, b, a, all_0_2_2 and discharging atoms sent(a, b, all_0_2_2) = all_0_1_1, yields:
% 50.45/18.07 | (187) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (party_of_protocol(b) = v2 & party_of_protocol(a) = v1 & intruder_message(all_0_2_2) = v0 & message(all_0_1_1) = v3 & ( ~ (v2 = 0) | ~ (v1 = 0) | ~ (v0 = 0) | v3 = 0))
% 50.45/18.07 |
% 50.45/18.07 | Instantiating formula (4) with all_0_1_1, all_0_2_2, b, a and discharging atoms sent(a, b, all_0_2_2) = all_0_1_1, yields:
% 50.45/18.07 | (188) ? [v0] : ? [v1] : (intruder_message(all_0_2_2) = v1 & message(all_0_1_1) = v0 & ( ~ (v0 = 0) | v1 = 0))
% 50.45/18.08 |
% 50.45/18.08 | Instantiating formula (73) with all_21_1_99, all_21_22_120, t, all_21_2_100 and discharging atoms sent(t, all_21_22_120, all_21_2_100) = all_21_1_99, yields:
% 50.45/18.08 | (189) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (party_of_protocol(all_21_22_120) = v2 & party_of_protocol(t) = v1 & intruder_message(all_21_2_100) = v0 & message(all_21_1_99) = v3 & ( ~ (v2 = 0) | ~ (v1 = 0) | ~ (v0 = 0) | v3 = 0))
% 50.45/18.08 |
% 50.45/18.08 | Instantiating formula (73) with all_15_9_70, a, t, all_15_10_71 and discharging atoms sent(t, a, all_15_10_71) = all_15_9_70, yields:
% 50.45/18.08 | (190) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (party_of_protocol(a) = v2 & party_of_protocol(t) = v1 & intruder_message(all_15_10_71) = v0 & message(all_15_9_70) = v3 & ( ~ (v2 = 0) | ~ (v1 = 0) | ~ (v0 = 0) | v3 = 0))
% 50.45/18.08 |
% 50.45/18.08 | Instantiating formula (57) with all_3_3_10, b, all_3_4_11 and discharging atoms key(all_3_4_11, b) = all_3_3_10, yields:
% 50.45/18.08 | (191) ? [v0] : ? [v1] : ? [v2] : (intruder_holds(all_3_3_10) = v2 & party_of_protocol(b) = v1 & intruder_message(all_3_4_11) = v0 & ( ~ (v1 = 0) | ~ (v0 = 0) | v2 = 0))
% 50.45/18.08 |
% 50.45/18.08 | Instantiating formula (57) with all_3_1_8, a, all_3_4_11 and discharging atoms key(all_3_4_11, a) = all_3_1_8, yields:
% 50.45/18.08 | (192) ? [v0] : ? [v1] : ? [v2] : (intruder_holds(all_3_1_8) = v2 & party_of_protocol(a) = v1 & intruder_message(all_3_4_11) = v0 & ( ~ (v1 = 0) | ~ (v0 = 0) | v2 = 0))
% 50.45/18.08 |
% 50.45/18.08 | Instantiating formula (39) with all_0_6_6, bt and discharging atoms key(bt, b) = all_0_6_6, yields:
% 50.45/18.08 | (193) ? [v0] : ? [v1] : ? [v2] : (intruder_holds(all_0_6_6) = v0 & b_holds(v1) = v2 & key(bt, a) = v1 & ( ~ (v2 = 0) | ~ (v0 = 0)))
% 50.45/18.08 |
% 50.45/18.08 | Instantiating formula (57) with all_0_6_6, b, bt and discharging atoms key(bt, b) = all_0_6_6, yields:
% 50.45/18.08 | (194) ? [v0] : ? [v1] : ? [v2] : (intruder_holds(all_0_6_6) = v2 & party_of_protocol(b) = v1 & intruder_message(bt) = v0 & ( ~ (v1 = 0) | ~ (v0 = 0) | v2 = 0))
% 50.45/18.08 |
% 50.45/18.08 | Instantiating formula (57) with all_0_4_4, t, bt and discharging atoms key(bt, t) = all_0_4_4, yields:
% 50.45/18.08 | (195) ? [v0] : ? [v1] : ? [v2] : (intruder_holds(all_0_4_4) = v2 & party_of_protocol(t) = v1 & intruder_message(bt) = v0 & ( ~ (v1 = 0) | ~ (v0 = 0) | v2 = 0))
% 50.45/18.08 |
% 50.45/18.08 | Instantiating formula (62) with all_0_5_5, at and discharging atoms key(at, a) = all_0_5_5, yields:
% 50.45/18.08 | (196) ? [v0] : ? [v1] : ? [v2] : (intruder_holds(v0) = v1 & b_holds(all_0_5_5) = v2 & key(at, b) = v0 & ( ~ (v2 = 0) | ~ (v1 = 0)))
% 50.45/18.08 |
% 50.45/18.08 | Instantiating formula (57) with all_0_5_5, a, at and discharging atoms key(at, a) = all_0_5_5, yields:
% 50.45/18.08 | (197) ? [v0] : ? [v1] : ? [v2] : (intruder_holds(all_0_5_5) = v2 & party_of_protocol(a) = v1 & intruder_message(at) = v0 & ( ~ (v1 = 0) | ~ (v0 = 0) | v2 = 0))
% 50.45/18.08 |
% 50.45/18.08 | Instantiating formula (57) with all_0_0_0, t, at and discharging atoms key(at, t) = all_0_0_0, yields:
% 50.45/18.08 | (198) ? [v0] : ? [v1] : ? [v2] : (intruder_holds(all_0_0_0) = v2 & party_of_protocol(t) = v1 & intruder_message(at) = v0 & ( ~ (v1 = 0) | ~ (v0 = 0) | v2 = 0))
% 50.45/18.08 |
% 50.45/18.08 | Instantiating (198) with all_29_0_123, all_29_1_124, all_29_2_125 yields:
% 50.45/18.08 | (199) intruder_holds(all_0_0_0) = all_29_0_123 & party_of_protocol(t) = all_29_1_124 & intruder_message(at) = all_29_2_125 & ( ~ (all_29_1_124 = 0) | ~ (all_29_2_125 = 0) | all_29_0_123 = 0)
% 50.45/18.08 |
% 50.45/18.08 | Applying alpha-rule on (199) yields:
% 50.45/18.08 | (200) intruder_holds(all_0_0_0) = all_29_0_123
% 50.45/18.08 | (201) party_of_protocol(t) = all_29_1_124
% 50.45/18.08 | (202) intruder_message(at) = all_29_2_125
% 50.45/18.08 | (203) ~ (all_29_1_124 = 0) | ~ (all_29_2_125 = 0) | all_29_0_123 = 0
% 50.45/18.08 |
% 50.45/18.08 | Instantiating (197) with all_31_0_126, all_31_1_127, all_31_2_128 yields:
% 50.45/18.08 | (204) intruder_holds(all_0_5_5) = all_31_0_126 & party_of_protocol(a) = all_31_1_127 & intruder_message(at) = all_31_2_128 & ( ~ (all_31_1_127 = 0) | ~ (all_31_2_128 = 0) | all_31_0_126 = 0)
% 50.45/18.08 |
% 50.45/18.08 | Applying alpha-rule on (204) yields:
% 50.45/18.08 | (205) intruder_holds(all_0_5_5) = all_31_0_126
% 50.45/18.08 | (206) party_of_protocol(a) = all_31_1_127
% 50.45/18.08 | (207) intruder_message(at) = all_31_2_128
% 50.45/18.08 | (208) ~ (all_31_1_127 = 0) | ~ (all_31_2_128 = 0) | all_31_0_126 = 0
% 50.45/18.08 |
% 50.45/18.08 | Instantiating (192) with all_33_0_129, all_33_1_130, all_33_2_131 yields:
% 50.45/18.08 | (209) intruder_holds(all_3_1_8) = all_33_0_129 & party_of_protocol(a) = all_33_1_130 & intruder_message(all_3_4_11) = all_33_2_131 & ( ~ (all_33_1_130 = 0) | ~ (all_33_2_131 = 0) | all_33_0_129 = 0)
% 50.45/18.08 |
% 50.45/18.08 | Applying alpha-rule on (209) yields:
% 50.45/18.08 | (210) intruder_holds(all_3_1_8) = all_33_0_129
% 50.45/18.08 | (211) party_of_protocol(a) = all_33_1_130
% 50.45/18.08 | (212) intruder_message(all_3_4_11) = all_33_2_131
% 50.45/18.08 | (213) ~ (all_33_1_130 = 0) | ~ (all_33_2_131 = 0) | all_33_0_129 = 0
% 50.45/18.08 |
% 50.45/18.08 | Instantiating (191) with all_37_0_135, all_37_1_136, all_37_2_137 yields:
% 50.45/18.08 | (214) intruder_holds(all_3_3_10) = all_37_0_135 & party_of_protocol(b) = all_37_1_136 & intruder_message(all_3_4_11) = all_37_2_137 & ( ~ (all_37_1_136 = 0) | ~ (all_37_2_137 = 0) | all_37_0_135 = 0)
% 50.45/18.08 |
% 50.45/18.08 | Applying alpha-rule on (214) yields:
% 50.45/18.08 | (215) intruder_holds(all_3_3_10) = all_37_0_135
% 50.45/18.08 | (216) party_of_protocol(b) = all_37_1_136
% 50.45/18.08 | (217) intruder_message(all_3_4_11) = all_37_2_137
% 50.45/18.08 | (218) ~ (all_37_1_136 = 0) | ~ (all_37_2_137 = 0) | all_37_0_135 = 0
% 50.45/18.08 |
% 50.45/18.08 | Instantiating (184) with all_47_0_151, all_47_1_152, all_47_2_153, all_47_3_154 yields:
% 50.45/18.08 | (219) party_of_protocol(all_11_13_45) = all_47_2_153 & party_of_protocol(b) = all_47_1_152 & intruder_message(all_11_11_43) = all_47_3_154 & message(all_11_10_42) = all_47_0_151 & ( ~ (all_47_1_152 = 0) | ~ (all_47_2_153 = 0) | ~ (all_47_3_154 = 0) | all_47_0_151 = 0)
% 50.45/18.08 |
% 50.45/18.08 | Applying alpha-rule on (219) yields:
% 50.45/18.08 | (220) party_of_protocol(all_11_13_45) = all_47_2_153
% 50.45/18.08 | (221) ~ (all_47_1_152 = 0) | ~ (all_47_2_153 = 0) | ~ (all_47_3_154 = 0) | all_47_0_151 = 0
% 50.45/18.08 | (222) intruder_message(all_11_11_43) = all_47_3_154
% 50.45/18.08 | (223) message(all_11_10_42) = all_47_0_151
% 50.45/18.08 | (224) party_of_protocol(b) = all_47_1_152
% 50.45/18.08 |
% 50.45/18.08 | Instantiating (190) with all_51_0_157, all_51_1_158, all_51_2_159, all_51_3_160 yields:
% 50.45/18.08 | (225) party_of_protocol(a) = all_51_1_158 & party_of_protocol(t) = all_51_2_159 & intruder_message(all_15_10_71) = all_51_3_160 & message(all_15_9_70) = all_51_0_157 & ( ~ (all_51_1_158 = 0) | ~ (all_51_2_159 = 0) | ~ (all_51_3_160 = 0) | all_51_0_157 = 0)
% 50.45/18.09 |
% 50.45/18.09 | Applying alpha-rule on (225) yields:
% 50.45/18.09 | (226) intruder_message(all_15_10_71) = all_51_3_160
% 50.45/18.09 | (227) message(all_15_9_70) = all_51_0_157
% 50.45/18.09 | (228) party_of_protocol(t) = all_51_2_159
% 50.45/18.09 | (229) ~ (all_51_1_158 = 0) | ~ (all_51_2_159 = 0) | ~ (all_51_3_160 = 0) | all_51_0_157 = 0
% 50.45/18.09 | (230) party_of_protocol(a) = all_51_1_158
% 50.45/18.09 |
% 50.45/18.09 | Instantiating (189) with all_55_0_163, all_55_1_164, all_55_2_165, all_55_3_166 yields:
% 50.45/18.09 | (231) party_of_protocol(all_21_22_120) = all_55_1_164 & party_of_protocol(t) = all_55_2_165 & intruder_message(all_21_2_100) = all_55_3_166 & message(all_21_1_99) = all_55_0_163 & ( ~ (all_55_1_164 = 0) | ~ (all_55_2_165 = 0) | ~ (all_55_3_166 = 0) | all_55_0_163 = 0)
% 50.45/18.09 |
% 50.45/18.09 | Applying alpha-rule on (231) yields:
% 50.45/18.09 | (232) intruder_message(all_21_2_100) = all_55_3_166
% 50.45/18.09 | (233) party_of_protocol(all_21_22_120) = all_55_1_164
% 50.45/18.09 | (234) message(all_21_1_99) = all_55_0_163
% 50.45/18.09 | (235) party_of_protocol(t) = all_55_2_165
% 50.45/18.09 | (236) ~ (all_55_1_164 = 0) | ~ (all_55_2_165 = 0) | ~ (all_55_3_166 = 0) | all_55_0_163 = 0
% 50.45/18.09 |
% 50.45/18.09 | Instantiating (188) with all_57_0_167, all_57_1_168 yields:
% 50.45/18.09 | (237) intruder_message(all_0_2_2) = all_57_0_167 & message(all_0_1_1) = all_57_1_168 & ( ~ (all_57_1_168 = 0) | all_57_0_167 = 0)
% 50.45/18.09 |
% 50.45/18.09 | Applying alpha-rule on (237) yields:
% 50.45/18.09 | (238) intruder_message(all_0_2_2) = all_57_0_167
% 50.45/18.09 | (239) message(all_0_1_1) = all_57_1_168
% 50.45/18.09 | (240) ~ (all_57_1_168 = 0) | all_57_0_167 = 0
% 50.45/18.09 |
% 50.45/18.09 | Instantiating (180) with all_59_0_169, all_59_1_170, all_59_2_171 yields:
% 50.45/18.09 | (241) intruder_message(all_0_2_2) = all_59_0_169 & intruder_message(an_a_nonce) = all_59_1_170 & intruder_message(a) = all_59_2_171 & ( ~ (all_59_1_170 = 0) | ~ (all_59_2_171 = 0) | all_59_0_169 = 0)
% 50.45/18.09 |
% 50.45/18.09 | Applying alpha-rule on (241) yields:
% 50.45/18.09 | (242) intruder_message(all_0_2_2) = all_59_0_169
% 50.45/18.09 | (243) intruder_message(an_a_nonce) = all_59_1_170
% 50.45/18.09 | (244) intruder_message(a) = all_59_2_171
% 50.45/18.09 | (245) ~ (all_59_1_170 = 0) | ~ (all_59_2_171 = 0) | all_59_0_169 = 0
% 50.45/18.09 |
% 50.45/18.09 | Instantiating (179) with all_61_0_172, all_61_1_173, all_61_2_174, all_61_3_175, all_61_4_176, all_61_5_177, all_61_6_178, all_61_7_179, all_61_8_180, all_61_9_181, all_61_10_182 yields:
% 50.45/18.09 | (246) fresh_to_b(an_a_nonce) = all_61_8_180 & generate_b_nonce(an_a_nonce) = all_61_7_179 & generate_expiration_time(an_a_nonce) = all_61_6_178 & b_stored(all_0_2_2) = all_61_0_172 & triple(b, all_61_7_179, all_61_4_176) = all_61_3_175 & triple(a, an_a_nonce, all_61_6_178) = all_61_5_177 & encrypt(all_61_5_177, bt) = all_61_4_176 & sent(b, t, all_61_3_175) = all_61_2_174 & sent(a, b, all_0_2_2) = all_61_10_182 & message(all_61_2_174) = all_61_1_173 & message(all_61_10_182) = all_61_9_181 & ( ~ (all_61_8_180 = 0) | ~ (all_61_9_181 = 0) | (all_61_0_172 = 0 & all_61_1_173 = 0))
% 50.45/18.09 |
% 50.45/18.09 | Applying alpha-rule on (246) yields:
% 50.45/18.09 | (247) fresh_to_b(an_a_nonce) = all_61_8_180
% 50.45/18.09 | (248) triple(b, all_61_7_179, all_61_4_176) = all_61_3_175
% 50.45/18.09 | (249) sent(a, b, all_0_2_2) = all_61_10_182
% 50.45/18.09 | (250) b_stored(all_0_2_2) = all_61_0_172
% 50.45/18.09 | (251) ~ (all_61_8_180 = 0) | ~ (all_61_9_181 = 0) | (all_61_0_172 = 0 & all_61_1_173 = 0)
% 50.45/18.09 | (252) message(all_61_10_182) = all_61_9_181
% 50.45/18.09 | (253) generate_expiration_time(an_a_nonce) = all_61_6_178
% 50.45/18.09 | (254) message(all_61_2_174) = all_61_1_173
% 50.45/18.09 | (255) triple(a, an_a_nonce, all_61_6_178) = all_61_5_177
% 50.45/18.09 | (256) encrypt(all_61_5_177, bt) = all_61_4_176
% 50.45/18.09 | (257) sent(b, t, all_61_3_175) = all_61_2_174
% 50.45/18.09 | (258) generate_b_nonce(an_a_nonce) = all_61_7_179
% 50.45/18.09 |
% 50.45/18.09 | Instantiating (176) with all_63_0_183, all_63_1_184, all_63_2_185, all_63_3_186, all_63_4_187, all_63_5_188, all_63_6_189, all_63_7_190, all_63_8_191, all_63_9_192, all_63_10_193 yields:
% 50.45/18.09 | (259) fresh_to_b(an_a_nonce) = all_63_8_191 & generate_b_nonce(an_a_nonce) = all_63_7_190 & generate_expiration_time(an_a_nonce) = all_63_6_189 & b_stored(all_0_3_3) = all_63_0_183 & triple(b, all_63_7_190, all_63_4_187) = all_63_3_186 & triple(b, an_a_nonce, all_63_6_189) = all_63_5_188 & encrypt(all_63_5_188, bt) = all_63_4_187 & sent(b, b, all_0_3_3) = all_63_10_193 & sent(b, t, all_63_3_186) = all_63_2_185 & message(all_63_2_185) = all_63_1_184 & message(all_63_10_193) = all_63_9_192 & ( ~ (all_63_8_191 = 0) | ~ (all_63_9_192 = 0) | (all_63_0_183 = 0 & all_63_1_184 = 0))
% 50.45/18.09 |
% 50.45/18.09 | Applying alpha-rule on (259) yields:
% 50.45/18.09 | (260) sent(b, b, all_0_3_3) = all_63_10_193
% 50.45/18.09 | (261) fresh_to_b(an_a_nonce) = all_63_8_191
% 50.45/18.09 | (262) generate_expiration_time(an_a_nonce) = all_63_6_189
% 50.45/18.09 | (263) generate_b_nonce(an_a_nonce) = all_63_7_190
% 50.45/18.09 | (264) message(all_63_10_193) = all_63_9_192
% 50.45/18.09 | (265) triple(b, all_63_7_190, all_63_4_187) = all_63_3_186
% 50.45/18.09 | (266) ~ (all_63_8_191 = 0) | ~ (all_63_9_192 = 0) | (all_63_0_183 = 0 & all_63_1_184 = 0)
% 50.45/18.09 | (267) message(all_63_2_185) = all_63_1_184
% 50.45/18.09 | (268) sent(b, t, all_63_3_186) = all_63_2_185
% 50.45/18.09 | (269) triple(b, an_a_nonce, all_63_6_189) = all_63_5_188
% 50.45/18.09 | (270) encrypt(all_63_5_188, bt) = all_63_4_187
% 50.45/18.09 | (271) b_stored(all_0_3_3) = all_63_0_183
% 50.45/18.09 |
% 50.45/18.09 | Instantiating (178) with all_67_0_197, all_67_1_198, all_67_2_199 yields:
% 50.45/18.09 | (272) intruder_message(all_0_3_3) = all_67_2_199 & intruder_message(an_a_nonce) = all_67_0_197 & intruder_message(b) = all_67_1_198 & ( ~ (all_67_2_199 = 0) | (all_67_0_197 = 0 & all_67_1_198 = 0))
% 50.45/18.09 |
% 50.45/18.09 | Applying alpha-rule on (272) yields:
% 50.45/18.09 | (273) intruder_message(all_0_3_3) = all_67_2_199
% 50.45/18.09 | (274) intruder_message(an_a_nonce) = all_67_0_197
% 50.45/18.09 | (275) intruder_message(b) = all_67_1_198
% 50.45/18.09 | (276) ~ (all_67_2_199 = 0) | (all_67_0_197 = 0 & all_67_1_198 = 0)
% 50.45/18.09 |
% 50.45/18.09 | Instantiating (183) with all_71_0_202, all_71_1_203, all_71_2_204, all_71_3_205 yields:
% 50.45/18.09 | (277) party_of_protocol(all_13_13_59) = all_71_2_204 & party_of_protocol(b) = all_71_1_203 & intruder_message(all_13_6_52) = all_71_3_205 & message(all_13_5_51) = all_71_0_202 & ( ~ (all_71_1_203 = 0) | ~ (all_71_2_204 = 0) | ~ (all_71_3_205 = 0) | all_71_0_202 = 0)
% 50.45/18.09 |
% 50.45/18.09 | Applying alpha-rule on (277) yields:
% 50.45/18.09 | (278) party_of_protocol(all_13_13_59) = all_71_2_204
% 50.45/18.09 | (279) message(all_13_5_51) = all_71_0_202
% 50.45/18.09 | (280) party_of_protocol(b) = all_71_1_203
% 50.45/18.09 | (281) ~ (all_71_1_203 = 0) | ~ (all_71_2_204 = 0) | ~ (all_71_3_205 = 0) | all_71_0_202 = 0
% 50.45/18.09 | (282) intruder_message(all_13_6_52) = all_71_3_205
% 50.45/18.09 |
% 50.45/18.09 | Instantiating (182) with all_75_0_208, all_75_1_209, all_75_2_210, all_75_3_211 yields:
% 50.45/18.09 | (283) party_of_protocol(all_21_24_122) = all_75_2_210 & party_of_protocol(t) = all_75_1_209 & intruder_message(all_21_15_113) = all_75_3_211 & message(all_21_14_112) = all_75_0_208 & ( ~ (all_75_1_209 = 0) | ~ (all_75_2_210 = 0) | ~ (all_75_3_211 = 0) | all_75_0_208 = 0)
% 50.45/18.09 |
% 50.45/18.09 | Applying alpha-rule on (283) yields:
% 50.45/18.09 | (284) party_of_protocol(t) = all_75_1_209
% 50.45/18.09 | (285) party_of_protocol(all_21_24_122) = all_75_2_210
% 50.45/18.09 | (286) ~ (all_75_1_209 = 0) | ~ (all_75_2_210 = 0) | ~ (all_75_3_211 = 0) | all_75_0_208 = 0
% 50.45/18.09 | (287) message(all_21_14_112) = all_75_0_208
% 50.45/18.09 | (288) intruder_message(all_21_15_113) = all_75_3_211
% 50.45/18.09 |
% 50.45/18.09 | Instantiating (177) with all_77_0_212, all_77_1_213, all_77_2_214 yields:
% 50.45/18.09 | (289) intruder_message(all_0_3_3) = all_77_0_212 & intruder_message(an_a_nonce) = all_77_1_213 & intruder_message(b) = all_77_2_214 & ( ~ (all_77_1_213 = 0) | ~ (all_77_2_214 = 0) | all_77_0_212 = 0)
% 50.45/18.09 |
% 50.45/18.09 | Applying alpha-rule on (289) yields:
% 50.45/18.09 | (290) intruder_message(all_0_3_3) = all_77_0_212
% 50.45/18.09 | (291) intruder_message(an_a_nonce) = all_77_1_213
% 50.45/18.10 | (292) intruder_message(b) = all_77_2_214
% 50.45/18.10 | (293) ~ (all_77_1_213 = 0) | ~ (all_77_2_214 = 0) | all_77_0_212 = 0
% 50.45/18.10 |
% 50.45/18.10 | Instantiating (181) with all_81_0_218, all_81_1_219, all_81_2_220 yields:
% 50.45/18.10 | (294) intruder_message(all_0_2_2) = all_81_2_220 & intruder_message(an_a_nonce) = all_81_0_218 & intruder_message(a) = all_81_1_219 & ( ~ (all_81_2_220 = 0) | (all_81_0_218 = 0 & all_81_1_219 = 0))
% 50.45/18.10 |
% 50.45/18.10 | Applying alpha-rule on (294) yields:
% 50.45/18.10 | (295) intruder_message(all_0_2_2) = all_81_2_220
% 50.45/18.10 | (296) intruder_message(an_a_nonce) = all_81_0_218
% 50.45/18.10 | (297) intruder_message(a) = all_81_1_219
% 50.45/18.10 | (298) ~ (all_81_2_220 = 0) | (all_81_0_218 = 0 & all_81_1_219 = 0)
% 50.45/18.10 |
% 50.45/18.10 | Instantiating (187) with all_85_0_224, all_85_1_225, all_85_2_226, all_85_3_227 yields:
% 50.45/18.10 | (299) party_of_protocol(b) = all_85_1_225 & party_of_protocol(a) = all_85_2_226 & intruder_message(all_0_2_2) = all_85_3_227 & message(all_0_1_1) = all_85_0_224 & ( ~ (all_85_1_225 = 0) | ~ (all_85_2_226 = 0) | ~ (all_85_3_227 = 0) | all_85_0_224 = 0)
% 50.45/18.10 |
% 50.45/18.10 | Applying alpha-rule on (299) yields:
% 50.45/18.10 | (300) party_of_protocol(b) = all_85_1_225
% 50.45/18.10 | (301) message(all_0_1_1) = all_85_0_224
% 50.45/18.10 | (302) ~ (all_85_1_225 = 0) | ~ (all_85_2_226 = 0) | ~ (all_85_3_227 = 0) | all_85_0_224 = 0
% 50.45/18.10 | (303) intruder_message(all_0_2_2) = all_85_3_227
% 50.45/18.10 | (304) party_of_protocol(a) = all_85_2_226
% 50.45/18.10 |
% 50.45/18.10 | Instantiating (185) with all_89_0_230, all_89_1_231, all_89_2_232, all_89_3_233 yields:
% 50.45/18.10 | (305) party_of_protocol(b) = all_89_2_232 & party_of_protocol(t) = all_89_1_231 & intruder_message(all_11_3_35) = all_89_3_233 & message(all_11_2_34) = all_89_0_230 & ( ~ (all_89_1_231 = 0) | ~ (all_89_2_232 = 0) | ~ (all_89_3_233 = 0) | all_89_0_230 = 0)
% 50.45/18.10 |
% 50.45/18.10 | Applying alpha-rule on (305) yields:
% 50.45/18.10 | (306) ~ (all_89_1_231 = 0) | ~ (all_89_2_232 = 0) | ~ (all_89_3_233 = 0) | all_89_0_230 = 0
% 50.45/18.10 | (307) message(all_11_2_34) = all_89_0_230
% 50.45/18.10 | (308) party_of_protocol(t) = all_89_1_231
% 50.45/18.10 | (309) party_of_protocol(b) = all_89_2_232
% 50.45/18.10 | (310) intruder_message(all_11_3_35) = all_89_3_233
% 50.45/18.10 |
% 50.45/18.10 | Instantiating (186) with all_95_0_240, all_95_1_241, all_95_2_242, all_95_3_243 yields:
% 50.45/18.10 | (311) party_of_protocol(all_15_14_75) = all_95_1_241 & party_of_protocol(a) = all_95_2_242 & intruder_message(all_15_4_65) = all_95_3_243 & message(all_15_3_64) = all_95_0_240 & ( ~ (all_95_1_241 = 0) | ~ (all_95_2_242 = 0) | ~ (all_95_3_243 = 0) | all_95_0_240 = 0)
% 50.45/18.10 |
% 50.45/18.10 | Applying alpha-rule on (311) yields:
% 50.45/18.10 | (312) party_of_protocol(a) = all_95_2_242
% 50.45/18.10 | (313) ~ (all_95_1_241 = 0) | ~ (all_95_2_242 = 0) | ~ (all_95_3_243 = 0) | all_95_0_240 = 0
% 50.45/18.10 | (314) party_of_protocol(all_15_14_75) = all_95_1_241
% 50.45/18.10 | (315) intruder_message(all_15_4_65) = all_95_3_243
% 50.45/18.10 | (316) message(all_15_3_64) = all_95_0_240
% 50.45/18.10 |
% 50.45/18.10 | Instantiating (196) with all_103_0_259, all_103_1_260, all_103_2_261 yields:
% 50.45/18.10 | (317) intruder_holds(all_103_2_261) = all_103_1_260 & b_holds(all_0_5_5) = all_103_0_259 & key(at, b) = all_103_2_261 & ( ~ (all_103_0_259 = 0) | ~ (all_103_1_260 = 0))
% 50.45/18.10 |
% 50.45/18.10 | Applying alpha-rule on (317) yields:
% 50.45/18.10 | (318) intruder_holds(all_103_2_261) = all_103_1_260
% 50.45/18.10 | (319) b_holds(all_0_5_5) = all_103_0_259
% 50.45/18.10 | (320) key(at, b) = all_103_2_261
% 50.45/18.10 | (321) ~ (all_103_0_259 = 0) | ~ (all_103_1_260 = 0)
% 50.45/18.10 |
% 50.45/18.10 | Instantiating (194) with all_105_0_262, all_105_1_263, all_105_2_264 yields:
% 50.45/18.10 | (322) intruder_holds(all_0_6_6) = all_105_0_262 & party_of_protocol(b) = all_105_1_263 & intruder_message(bt) = all_105_2_264 & ( ~ (all_105_1_263 = 0) | ~ (all_105_2_264 = 0) | all_105_0_262 = 0)
% 50.45/18.10 |
% 50.45/18.10 | Applying alpha-rule on (322) yields:
% 50.45/18.10 | (323) intruder_holds(all_0_6_6) = all_105_0_262
% 50.45/18.10 | (324) party_of_protocol(b) = all_105_1_263
% 50.45/18.10 | (325) intruder_message(bt) = all_105_2_264
% 50.45/18.10 | (326) ~ (all_105_1_263 = 0) | ~ (all_105_2_264 = 0) | all_105_0_262 = 0
% 50.45/18.10 |
% 50.45/18.10 | Instantiating (193) with all_109_0_267, all_109_1_268, all_109_2_269 yields:
% 50.45/18.10 | (327) intruder_holds(all_0_6_6) = all_109_2_269 & b_holds(all_109_1_268) = all_109_0_267 & key(bt, a) = all_109_1_268 & ( ~ (all_109_0_267 = 0) | ~ (all_109_2_269 = 0))
% 50.45/18.10 |
% 50.45/18.10 | Applying alpha-rule on (327) yields:
% 50.45/18.10 | (328) intruder_holds(all_0_6_6) = all_109_2_269
% 50.45/18.10 | (329) b_holds(all_109_1_268) = all_109_0_267
% 50.45/18.10 | (330) key(bt, a) = all_109_1_268
% 50.45/18.10 | (331) ~ (all_109_0_267 = 0) | ~ (all_109_2_269 = 0)
% 50.45/18.10 |
% 50.45/18.10 | Instantiating (195) with all_111_0_270, all_111_1_271, all_111_2_272 yields:
% 50.45/18.10 | (332) intruder_holds(all_0_4_4) = all_111_0_270 & party_of_protocol(t) = all_111_1_271 & intruder_message(bt) = all_111_2_272 & ( ~ (all_111_1_271 = 0) | ~ (all_111_2_272 = 0) | all_111_0_270 = 0)
% 50.62/18.10 |
% 50.62/18.10 | Applying alpha-rule on (332) yields:
% 50.62/18.10 | (333) intruder_holds(all_0_4_4) = all_111_0_270
% 50.62/18.10 | (334) party_of_protocol(t) = all_111_1_271
% 50.62/18.10 | (335) intruder_message(bt) = all_111_2_272
% 50.62/18.10 | (336) ~ (all_111_1_271 = 0) | ~ (all_111_2_272 = 0) | all_111_0_270 = 0
% 50.62/18.10 |
% 50.62/18.10 | Instantiating (163) with all_123_0_297, all_123_1_298, all_123_2_299, all_123_3_300 yields:
% 50.62/18.10 | (337) intruder_message(all_11_3_35) = all_123_3_300 & intruder_message(all_11_4_36) = all_123_0_297 & intruder_message(all_11_7_39) = all_123_1_298 & intruder_message(b) = all_123_2_299 & ( ~ (all_123_3_300 = 0) | (all_123_0_297 = 0 & all_123_1_298 = 0 & all_123_2_299 = 0))
% 50.62/18.10 |
% 50.62/18.10 | Applying alpha-rule on (337) yields:
% 50.62/18.10 | (338) ~ (all_123_3_300 = 0) | (all_123_0_297 = 0 & all_123_1_298 = 0 & all_123_2_299 = 0)
% 50.62/18.10 | (339) intruder_message(b) = all_123_2_299
% 50.62/18.10 | (340) intruder_message(all_11_4_36) = all_123_0_297
% 50.62/18.10 | (341) intruder_message(all_11_7_39) = all_123_1_298
% 50.62/18.10 | (342) intruder_message(all_11_3_35) = all_123_3_300
% 50.62/18.10 |
% 50.62/18.10 | Instantiating (162) with all_125_0_301, all_125_1_302, all_125_2_303, all_125_3_304 yields:
% 50.62/18.10 | (343) intruder_message(all_11_3_35) = all_125_0_301 & intruder_message(all_11_4_36) = all_125_1_302 & intruder_message(all_11_7_39) = all_125_2_303 & intruder_message(b) = all_125_3_304 & ( ~ (all_125_1_302 = 0) | ~ (all_125_2_303 = 0) | ~ (all_125_3_304 = 0) | all_125_0_301 = 0)
% 50.62/18.10 |
% 50.62/18.10 | Applying alpha-rule on (343) yields:
% 50.62/18.10 | (344) ~ (all_125_1_302 = 0) | ~ (all_125_2_303 = 0) | ~ (all_125_3_304 = 0) | all_125_0_301 = 0
% 50.62/18.10 | (345) intruder_message(all_11_3_35) = all_125_0_301
% 50.62/18.10 | (346) intruder_message(b) = all_125_3_304
% 50.62/18.10 | (347) intruder_message(all_11_4_36) = all_125_1_302
% 50.62/18.10 | (348) intruder_message(all_11_7_39) = all_125_2_303
% 50.62/18.10 |
% 50.62/18.10 | Instantiating (161) with all_131_0_313, all_131_1_314, all_131_2_315, all_131_3_316, all_131_4_317, all_131_5_318, all_131_6_319, all_131_7_320, all_131_8_321, all_131_9_322 yields:
% 50.62/18.10 | (349) b_holds(all_131_1_314) = all_131_0_313 & generate_b_nonce(all_11_12_44) = all_131_8_321 & b_stored(all_131_3_316) = all_131_2_315 & encrypt(all_131_8_321, all_11_12_44) = all_131_7_320 & encrypt(all_11_5_37, bt) = all_131_9_322 & pair(all_131_9_322, all_131_7_320) = all_131_6_319 & pair(all_11_13_45, all_11_12_44) = all_131_3_316 & sent(all_11_13_45, b, all_131_6_319) = all_131_5_318 & message(all_131_5_318) = all_131_4_317 & key(all_11_12_44, all_11_13_45) = all_131_1_314 & ( ~ (all_131_2_315 = 0) | ~ (all_131_4_317 = 0) | all_131_0_313 = 0)
% 50.62/18.10 |
% 50.62/18.10 | Applying alpha-rule on (349) yields:
% 50.62/18.10 | (350) sent(all_11_13_45, b, all_131_6_319) = all_131_5_318
% 50.62/18.10 | (351) generate_b_nonce(all_11_12_44) = all_131_8_321
% 50.62/18.10 | (352) key(all_11_12_44, all_11_13_45) = all_131_1_314
% 50.62/18.10 | (353) encrypt(all_11_5_37, bt) = all_131_9_322
% 50.62/18.10 | (354) b_holds(all_131_1_314) = all_131_0_313
% 50.62/18.10 | (355) pair(all_131_9_322, all_131_7_320) = all_131_6_319
% 50.62/18.10 | (356) encrypt(all_131_8_321, all_11_12_44) = all_131_7_320
% 50.62/18.10 | (357) ~ (all_131_2_315 = 0) | ~ (all_131_4_317 = 0) | all_131_0_313 = 0
% 50.62/18.10 | (358) pair(all_11_13_45, all_11_12_44) = all_131_3_316
% 50.62/18.10 | (359) message(all_131_5_318) = all_131_4_317
% 50.62/18.10 | (360) b_stored(all_131_3_316) = all_131_2_315
% 50.62/18.10 |
% 50.62/18.10 | Instantiating (160) with all_133_0_323, all_133_1_324, all_133_2_325, all_133_3_326, all_133_4_327, all_133_5_328, all_133_6_329, all_133_7_330, all_133_8_331, all_133_9_332 yields:
% 50.62/18.10 | (361) fresh_to_b(all_11_12_44) = all_133_6_329 & generate_b_nonce(all_11_12_44) = all_133_5_328 & b_stored(all_133_9_332) = all_133_0_323 & triple(b, all_133_5_328, all_133_4_327) = all_133_3_326 & encrypt(all_11_5_37, bt) = all_133_4_327 & pair(all_11_13_45, all_11_12_44) = all_133_9_332 & sent(all_11_13_45, b, all_133_9_332) = all_133_8_331 & sent(b, t, all_133_3_326) = all_133_2_325 & message(all_133_2_325) = all_133_1_324 & message(all_133_8_331) = all_133_7_330 & ( ~ (all_133_6_329 = 0) | ~ (all_133_7_330 = 0) | (all_133_0_323 = 0 & all_133_1_324 = 0))
% 50.62/18.10 |
% 50.62/18.10 | Applying alpha-rule on (361) yields:
% 50.62/18.10 | (362) message(all_133_8_331) = all_133_7_330
% 50.62/18.10 | (363) b_stored(all_133_9_332) = all_133_0_323
% 50.62/18.10 | (364) sent(all_11_13_45, b, all_133_9_332) = all_133_8_331
% 50.62/18.11 | (365) ~ (all_133_6_329 = 0) | ~ (all_133_7_330 = 0) | (all_133_0_323 = 0 & all_133_1_324 = 0)
% 50.62/18.11 | (366) encrypt(all_11_5_37, bt) = all_133_4_327
% 50.62/18.11 | (367) message(all_133_2_325) = all_133_1_324
% 50.62/18.11 | (368) triple(b, all_133_5_328, all_133_4_327) = all_133_3_326
% 50.62/18.11 | (369) sent(b, t, all_133_3_326) = all_133_2_325
% 50.62/18.11 | (370) pair(all_11_13_45, all_11_12_44) = all_133_9_332
% 50.62/18.11 | (371) fresh_to_b(all_11_12_44) = all_133_6_329
% 50.62/18.11 | (372) generate_b_nonce(all_11_12_44) = all_133_5_328
% 50.62/18.11 |
% 50.62/18.11 | Instantiating (173) with all_135_0_333, all_135_1_334, all_135_2_335 yields:
% 50.62/18.11 | (373) intruder_message(all_13_6_52) = all_135_0_333 & intruder_message(all_13_7_53) = all_135_1_334 & intruder_message(all_13_9_55) = all_135_2_335 & ( ~ (all_135_1_334 = 0) | ~ (all_135_2_335 = 0) | all_135_0_333 = 0)
% 50.62/18.11 |
% 50.62/18.11 | Applying alpha-rule on (373) yields:
% 50.62/18.11 | (374) intruder_message(all_13_6_52) = all_135_0_333
% 50.62/18.11 | (375) intruder_message(all_13_7_53) = all_135_1_334
% 50.62/18.11 | (376) intruder_message(all_13_9_55) = all_135_2_335
% 50.62/18.11 | (377) ~ (all_135_1_334 = 0) | ~ (all_135_2_335 = 0) | all_135_0_333 = 0
% 50.62/18.11 |
% 50.62/18.11 | Instantiating (172) with all_137_0_336, all_137_1_337, all_137_2_338, all_137_3_339, all_137_4_340, all_137_5_341, all_137_6_342, all_137_7_343, all_137_8_344, all_137_9_345, all_137_10_346 yields:
% 50.62/18.11 | (378) fresh_to_b(all_13_7_53) = all_137_8_344 & generate_b_nonce(all_13_7_53) = all_137_7_343 & generate_expiration_time(all_13_7_53) = all_137_6_342 & b_stored(all_13_6_52) = all_137_0_336 & triple(all_13_9_55, all_13_7_53, all_137_6_342) = all_137_5_341 & triple(b, all_137_7_343, all_137_4_340) = all_137_3_339 & encrypt(all_137_5_341, bt) = all_137_4_340 & sent(all_13_9_55, b, all_13_6_52) = all_137_10_346 & sent(b, t, all_137_3_339) = all_137_2_338 & message(all_137_2_338) = all_137_1_337 & message(all_137_10_346) = all_137_9_345 & ( ~ (all_137_8_344 = 0) | ~ (all_137_9_345 = 0) | (all_137_0_336 = 0 & all_137_1_337 = 0))
% 50.62/18.11 |
% 50.62/18.11 | Applying alpha-rule on (378) yields:
% 50.62/18.11 | (379) encrypt(all_137_5_341, bt) = all_137_4_340
% 50.62/18.11 | (380) ~ (all_137_8_344 = 0) | ~ (all_137_9_345 = 0) | (all_137_0_336 = 0 & all_137_1_337 = 0)
% 50.62/18.11 | (381) b_stored(all_13_6_52) = all_137_0_336
% 50.62/18.11 | (382) generate_expiration_time(all_13_7_53) = all_137_6_342
% 50.62/18.11 | (383) generate_b_nonce(all_13_7_53) = all_137_7_343
% 50.62/18.11 | (384) fresh_to_b(all_13_7_53) = all_137_8_344
% 50.62/18.11 | (385) triple(all_13_9_55, all_13_7_53, all_137_6_342) = all_137_5_341
% 50.62/18.11 | (386) message(all_137_2_338) = all_137_1_337
% 50.62/18.11 | (387) triple(b, all_137_7_343, all_137_4_340) = all_137_3_339
% 50.62/18.11 | (388) sent(all_13_9_55, b, all_13_6_52) = all_137_10_346
% 50.62/18.11 | (389) message(all_137_10_346) = all_137_9_345
% 50.62/18.11 | (390) sent(b, t, all_137_3_339) = all_137_2_338
% 50.62/18.11 |
% 50.62/18.11 | Instantiating (175) with all_143_0_353, all_143_1_354, all_143_2_355, all_143_3_356, all_143_4_357, all_143_5_358, all_143_6_359, all_143_7_360, all_143_8_361, all_143_9_362, all_143_10_363 yields:
% 50.62/18.11 | (391) fresh_to_b(all_13_12_58) = all_143_8_361 & generate_b_nonce(all_13_12_58) = all_143_7_360 & generate_expiration_time(all_13_12_58) = all_143_6_359 & b_stored(all_13_3_49) = all_143_0_353 & triple(all_13_13_59, all_13_12_58, all_143_6_359) = all_143_5_358 & triple(b, all_143_7_360, all_143_4_357) = all_143_3_356 & encrypt(all_143_5_358, bt) = all_143_4_357 & sent(all_13_13_59, b, all_13_3_49) = all_143_10_363 & sent(b, t, all_143_3_356) = all_143_2_355 & message(all_143_2_355) = all_143_1_354 & message(all_143_10_363) = all_143_9_362 & ( ~ (all_143_8_361 = 0) | ~ (all_143_9_362 = 0) | (all_143_0_353 = 0 & all_143_1_354 = 0))
% 50.62/18.11 |
% 50.62/18.11 | Applying alpha-rule on (391) yields:
% 50.62/18.11 | (392) b_stored(all_13_3_49) = all_143_0_353
% 50.62/18.11 | (393) encrypt(all_143_5_358, bt) = all_143_4_357
% 50.62/18.11 | (394) ~ (all_143_8_361 = 0) | ~ (all_143_9_362 = 0) | (all_143_0_353 = 0 & all_143_1_354 = 0)
% 50.62/18.11 | (395) sent(all_13_13_59, b, all_13_3_49) = all_143_10_363
% 50.62/18.11 | (396) sent(b, t, all_143_3_356) = all_143_2_355
% 50.62/18.11 | (397) fresh_to_b(all_13_12_58) = all_143_8_361
% 50.62/18.11 | (398) generate_expiration_time(all_13_12_58) = all_143_6_359
% 50.62/18.11 | (399) message(all_143_10_363) = all_143_9_362
% 50.62/18.11 | (400) triple(b, all_143_7_360, all_143_4_357) = all_143_3_356
% 50.62/18.11 | (401) generate_b_nonce(all_13_12_58) = all_143_7_360
% 50.62/18.11 | (402) message(all_143_2_355) = all_143_1_354
% 50.62/18.11 | (403) triple(all_13_13_59, all_13_12_58, all_143_6_359) = all_143_5_358
% 50.62/18.11 |
% 50.62/18.11 | Instantiating (171) with all_145_0_364, all_145_1_365, all_145_2_366, all_145_3_367, all_145_4_368, all_145_5_369, all_145_6_370, all_145_7_371, all_145_8_372, all_145_9_373, all_145_10_374 yields:
% 50.62/18.11 | (404) fresh_to_b(all_15_5_66) = all_145_8_372 & generate_b_nonce(all_15_5_66) = all_145_7_371 & generate_expiration_time(all_15_5_66) = all_145_6_370 & b_stored(all_15_4_65) = all_145_0_364 & triple(all_15_15_76, all_15_5_66, all_145_6_370) = all_145_5_369 & triple(b, all_145_7_371, all_145_4_368) = all_145_3_367 & encrypt(all_145_5_369, bt) = all_145_4_368 & sent(all_15_15_76, b, all_15_4_65) = all_145_10_374 & sent(b, t, all_145_3_367) = all_145_2_366 & message(all_145_2_366) = all_145_1_365 & message(all_145_10_374) = all_145_9_373 & ( ~ (all_145_8_372 = 0) | ~ (all_145_9_373 = 0) | (all_145_0_364 = 0 & all_145_1_365 = 0))
% 50.62/18.11 |
% 50.62/18.11 | Applying alpha-rule on (404) yields:
% 50.62/18.11 | (405) generate_b_nonce(all_15_5_66) = all_145_7_371
% 50.62/18.11 | (406) sent(b, t, all_145_3_367) = all_145_2_366
% 50.62/18.11 | (407) message(all_145_2_366) = all_145_1_365
% 50.62/18.11 | (408) sent(all_15_15_76, b, all_15_4_65) = all_145_10_374
% 50.62/18.11 | (409) triple(b, all_145_7_371, all_145_4_368) = all_145_3_367
% 50.62/18.11 | (410) generate_expiration_time(all_15_5_66) = all_145_6_370
% 50.62/18.11 | (411) ~ (all_145_8_372 = 0) | ~ (all_145_9_373 = 0) | (all_145_0_364 = 0 & all_145_1_365 = 0)
% 50.62/18.11 | (412) encrypt(all_145_5_369, bt) = all_145_4_368
% 50.62/18.11 | (413) triple(all_15_15_76, all_15_5_66, all_145_6_370) = all_145_5_369
% 50.62/18.11 | (414) message(all_145_10_374) = all_145_9_373
% 50.62/18.11 | (415) fresh_to_b(all_15_5_66) = all_145_8_372
% 50.62/18.11 | (416) b_stored(all_15_4_65) = all_145_0_364
% 50.62/18.11 |
% 50.62/18.11 | Instantiating (170) with all_149_0_378, all_149_1_379, all_149_2_380, all_149_3_381, all_149_4_382, all_149_5_383, all_149_6_384, all_149_7_385, all_149_8_386, all_149_9_387, all_149_10_388 yields:
% 50.62/18.11 | (417) fresh_to_b(all_15_13_74) = all_149_8_386 & generate_b_nonce(all_15_13_74) = all_149_7_385 & generate_expiration_time(all_15_13_74) = all_149_6_384 & b_stored(all_15_7_68) = all_149_0_378 & triple(all_15_14_75, all_15_13_74, all_149_6_384) = all_149_5_383 & triple(b, all_149_7_385, all_149_4_382) = all_149_3_381 & encrypt(all_149_5_383, bt) = all_149_4_382 & sent(all_15_14_75, b, all_15_7_68) = all_149_10_388 & sent(b, t, all_149_3_381) = all_149_2_380 & message(all_149_2_380) = all_149_1_379 & message(all_149_10_388) = all_149_9_387 & ( ~ (all_149_8_386 = 0) | ~ (all_149_9_387 = 0) | (all_149_0_378 = 0 & all_149_1_379 = 0))
% 50.62/18.11 |
% 50.62/18.11 | Applying alpha-rule on (417) yields:
% 50.62/18.11 | (418) b_stored(all_15_7_68) = all_149_0_378
% 50.62/18.11 | (419) sent(b, t, all_149_3_381) = all_149_2_380
% 50.62/18.11 | (420) ~ (all_149_8_386 = 0) | ~ (all_149_9_387 = 0) | (all_149_0_378 = 0 & all_149_1_379 = 0)
% 50.62/18.11 | (421) encrypt(all_149_5_383, bt) = all_149_4_382
% 50.62/18.11 | (422) generate_b_nonce(all_15_13_74) = all_149_7_385
% 50.62/18.11 | (423) sent(all_15_14_75, b, all_15_7_68) = all_149_10_388
% 50.62/18.11 | (424) generate_expiration_time(all_15_13_74) = all_149_6_384
% 50.62/18.11 | (425) message(all_149_2_380) = all_149_1_379
% 50.62/18.11 | (426) message(all_149_10_388) = all_149_9_387
% 50.62/18.11 | (427) triple(all_15_14_75, all_15_13_74, all_149_6_384) = all_149_5_383
% 50.62/18.11 | (428) triple(b, all_149_7_385, all_149_4_382) = all_149_3_381
% 50.62/18.11 | (429) fresh_to_b(all_15_13_74) = all_149_8_386
% 50.62/18.11 |
% 50.62/18.11 | Instantiating (174) with all_155_0_402, all_155_1_403, all_155_2_404 yields:
% 50.62/18.11 | (430) intruder_message(all_13_6_52) = all_155_2_404 & intruder_message(all_13_7_53) = all_155_0_402 & intruder_message(all_13_9_55) = all_155_1_403 & ( ~ (all_155_2_404 = 0) | (all_155_0_402 = 0 & all_155_1_403 = 0))
% 50.62/18.11 |
% 50.62/18.11 | Applying alpha-rule on (430) yields:
% 50.62/18.11 | (431) intruder_message(all_13_6_52) = all_155_2_404
% 50.62/18.11 | (432) intruder_message(all_13_7_53) = all_155_0_402
% 50.62/18.11 | (433) intruder_message(all_13_9_55) = all_155_1_403
% 50.62/18.11 | (434) ~ (all_155_2_404 = 0) | (all_155_0_402 = 0 & all_155_1_403 = 0)
% 50.62/18.11 |
% 50.62/18.11 | Instantiating (159) with all_185_0_460, all_185_1_461, all_185_2_462, all_185_3_463, all_185_4_464, all_185_5_465, all_185_6_466, all_185_7_467, all_185_8_468, all_185_9_469 yields:
% 50.62/18.11 | (435) b_holds(all_185_1_461) = all_185_0_460 & generate_b_nonce(all_13_12_58) = all_185_8_468 & b_stored(all_185_3_463) = all_185_2_462 & encrypt(all_185_8_468, all_13_14_60) = all_185_7_467 & encrypt(all_13_10_56, bt) = all_185_9_469 & pair(all_185_9_469, all_185_7_467) = all_185_6_466 & pair(all_13_13_59, all_13_12_58) = all_185_3_463 & sent(all_13_13_59, b, all_185_6_466) = all_185_5_465 & message(all_185_5_465) = all_185_4_464 & key(all_13_14_60, all_13_13_59) = all_185_1_461 & ( ~ (all_185_2_462 = 0) | ~ (all_185_4_464 = 0) | all_185_0_460 = 0)
% 50.62/18.11 |
% 50.62/18.11 | Applying alpha-rule on (435) yields:
% 50.62/18.11 | (436) encrypt(all_185_8_468, all_13_14_60) = all_185_7_467
% 50.62/18.11 | (437) ~ (all_185_2_462 = 0) | ~ (all_185_4_464 = 0) | all_185_0_460 = 0
% 50.62/18.11 | (438) message(all_185_5_465) = all_185_4_464
% 50.62/18.11 | (439) sent(all_13_13_59, b, all_185_6_466) = all_185_5_465
% 50.62/18.12 | (440) encrypt(all_13_10_56, bt) = all_185_9_469
% 50.62/18.12 | (441) pair(all_13_13_59, all_13_12_58) = all_185_3_463
% 50.62/18.12 | (442) b_stored(all_185_3_463) = all_185_2_462
% 50.62/18.12 | (443) key(all_13_14_60, all_13_13_59) = all_185_1_461
% 50.62/18.12 | (444) generate_b_nonce(all_13_12_58) = all_185_8_468
% 50.62/18.12 | (445) pair(all_185_9_469, all_185_7_467) = all_185_6_466
% 50.62/18.12 | (446) b_holds(all_185_1_461) = all_185_0_460
% 50.62/18.12 |
% 50.62/18.12 | Instantiating formula (66) with b, all_89_2_232, all_105_1_263 and discharging atoms party_of_protocol(b) = all_105_1_263, party_of_protocol(b) = all_89_2_232, yields:
% 50.62/18.12 | (447) all_105_1_263 = all_89_2_232
% 50.62/18.12 |
% 50.62/18.12 | Instantiating formula (66) with b, all_85_1_225, 0 and discharging atoms party_of_protocol(b) = all_85_1_225, party_of_protocol(b) = 0, yields:
% 50.62/18.12 | (448) all_85_1_225 = 0
% 50.62/18.12 |
% 50.62/18.12 | Instantiating formula (66) with b, all_85_1_225, all_89_2_232 and discharging atoms party_of_protocol(b) = all_89_2_232, party_of_protocol(b) = all_85_1_225, yields:
% 50.62/18.12 | (449) all_89_2_232 = all_85_1_225
% 50.62/18.12 |
% 50.62/18.12 | Instantiating formula (66) with b, all_71_1_203, all_85_1_225 and discharging atoms party_of_protocol(b) = all_85_1_225, party_of_protocol(b) = all_71_1_203, yields:
% 50.62/18.12 | (450) all_85_1_225 = all_71_1_203
% 50.62/18.12 |
% 50.62/18.12 | Instantiating formula (66) with b, all_47_1_152, all_105_1_263 and discharging atoms party_of_protocol(b) = all_105_1_263, party_of_protocol(b) = all_47_1_152, yields:
% 50.62/18.12 | (451) all_105_1_263 = all_47_1_152
% 50.62/18.12 |
% 50.62/18.12 | Instantiating formula (66) with b, all_37_1_136, all_85_1_225 and discharging atoms party_of_protocol(b) = all_85_1_225, party_of_protocol(b) = all_37_1_136, yields:
% 50.62/18.12 | (452) all_85_1_225 = all_37_1_136
% 50.62/18.12 |
% 50.62/18.12 | Instantiating formula (66) with a, all_85_2_226, all_95_2_242 and discharging atoms party_of_protocol(a) = all_95_2_242, party_of_protocol(a) = all_85_2_226, yields:
% 50.62/18.12 | (453) all_95_2_242 = all_85_2_226
% 50.62/18.12 |
% 50.62/18.12 | Instantiating formula (66) with a, all_51_1_158, 0 and discharging atoms party_of_protocol(a) = all_51_1_158, party_of_protocol(a) = 0, yields:
% 50.62/18.12 | (454) all_51_1_158 = 0
% 50.62/18.12 |
% 50.62/18.12 | Instantiating formula (66) with a, all_33_1_130, all_85_2_226 and discharging atoms party_of_protocol(a) = all_85_2_226, party_of_protocol(a) = all_33_1_130, yields:
% 50.62/18.12 | (455) all_85_2_226 = all_33_1_130
% 50.62/18.12 |
% 50.62/18.12 | Instantiating formula (66) with a, all_33_1_130, all_51_1_158 and discharging atoms party_of_protocol(a) = all_51_1_158, party_of_protocol(a) = all_33_1_130, yields:
% 50.62/18.12 | (456) all_51_1_158 = all_33_1_130
% 50.62/18.12 |
% 50.62/18.12 | Instantiating formula (66) with a, all_31_1_127, all_95_2_242 and discharging atoms party_of_protocol(a) = all_95_2_242, party_of_protocol(a) = all_31_1_127, yields:
% 50.62/18.12 | (457) all_95_2_242 = all_31_1_127
% 50.62/18.12 |
% 50.62/18.12 | Instantiating formula (66) with t, all_111_1_271, 0 and discharging atoms party_of_protocol(t) = all_111_1_271, party_of_protocol(t) = 0, yields:
% 50.62/18.12 | (458) all_111_1_271 = 0
% 50.62/18.12 |
% 50.62/18.12 | Instantiating formula (66) with t, all_89_1_231, all_111_1_271 and discharging atoms party_of_protocol(t) = all_111_1_271, party_of_protocol(t) = all_89_1_231, yields:
% 50.62/18.12 | (459) all_111_1_271 = all_89_1_231
% 50.62/18.12 |
% 50.62/18.12 | Instantiating formula (66) with t, all_75_1_209, all_89_1_231 and discharging atoms party_of_protocol(t) = all_89_1_231, party_of_protocol(t) = all_75_1_209, yields:
% 50.62/18.12 | (460) all_89_1_231 = all_75_1_209
% 50.62/18.12 |
% 50.62/18.12 | Instantiating formula (66) with t, all_51_2_159, all_75_1_209 and discharging atoms party_of_protocol(t) = all_75_1_209, party_of_protocol(t) = all_51_2_159, yields:
% 50.62/18.12 | (461) all_75_1_209 = all_51_2_159
% 50.62/18.12 |
% 50.62/18.12 | Instantiating formula (66) with t, all_51_2_159, all_55_2_165 and discharging atoms party_of_protocol(t) = all_55_2_165, party_of_protocol(t) = all_51_2_159, yields:
% 50.62/18.12 | (462) all_55_2_165 = all_51_2_159
% 50.62/18.12 |
% 50.62/18.12 | Instantiating formula (66) with t, all_29_1_124, all_55_2_165 and discharging atoms party_of_protocol(t) = all_55_2_165, party_of_protocol(t) = all_29_1_124, yields:
% 50.62/18.12 | (463) all_55_2_165 = all_29_1_124
% 50.62/18.12 |
% 50.62/18.12 | Instantiating formula (31) with all_13_7_53, all_135_1_334, all_155_0_402 and discharging atoms intruder_message(all_13_7_53) = all_155_0_402, intruder_message(all_13_7_53) = all_135_1_334, yields:
% 50.62/18.12 | (464) all_155_0_402 = all_135_1_334
% 50.62/18.12 |
% 50.62/18.12 | Instantiating formula (31) with all_0_2_2, all_81_2_220, all_85_3_227 and discharging atoms intruder_message(all_0_2_2) = all_85_3_227, intruder_message(all_0_2_2) = all_81_2_220, yields:
% 50.62/18.12 | (465) all_85_3_227 = all_81_2_220
% 50.62/18.12 |
% 50.62/18.12 | Instantiating formula (31) with all_0_2_2, all_59_0_169, all_81_2_220 and discharging atoms intruder_message(all_0_2_2) = all_81_2_220, intruder_message(all_0_2_2) = all_59_0_169, yields:
% 50.62/18.12 | (466) all_81_2_220 = all_59_0_169
% 50.62/18.12 |
% 50.62/18.12 | Instantiating formula (31) with all_0_2_2, all_57_0_167, all_85_3_227 and discharging atoms intruder_message(all_0_2_2) = all_85_3_227, intruder_message(all_0_2_2) = all_57_0_167, yields:
% 50.62/18.12 | (467) all_85_3_227 = all_57_0_167
% 50.62/18.12 |
% 50.62/18.12 | Instantiating formula (31) with all_0_3_3, all_67_2_199, all_77_0_212 and discharging atoms intruder_message(all_0_3_3) = all_77_0_212, intruder_message(all_0_3_3) = all_67_2_199, yields:
% 50.62/18.12 | (468) all_77_0_212 = all_67_2_199
% 50.62/18.12 |
% 50.62/18.12 | Instantiating formula (31) with an_a_nonce, all_77_1_213, all_81_0_218 and discharging atoms intruder_message(an_a_nonce) = all_81_0_218, intruder_message(an_a_nonce) = all_77_1_213, yields:
% 50.62/18.12 | (469) all_81_0_218 = all_77_1_213
% 50.62/18.12 |
% 50.62/18.12 | Instantiating formula (31) with an_a_nonce, all_67_0_197, all_77_1_213 and discharging atoms intruder_message(an_a_nonce) = all_77_1_213, intruder_message(an_a_nonce) = all_67_0_197, yields:
% 50.62/18.12 | (470) all_77_1_213 = all_67_0_197
% 50.62/18.12 |
% 50.62/18.12 | Instantiating formula (31) with an_a_nonce, all_59_1_170, all_81_0_218 and discharging atoms intruder_message(an_a_nonce) = all_81_0_218, intruder_message(an_a_nonce) = all_59_1_170, yields:
% 50.62/18.12 | (471) all_81_0_218 = all_59_1_170
% 50.62/18.12 |
% 50.62/18.12 | Instantiating formula (31) with b, all_123_2_299, all_125_3_304 and discharging atoms intruder_message(b) = all_125_3_304, intruder_message(b) = all_123_2_299, yields:
% 50.62/18.12 | (472) all_125_3_304 = all_123_2_299
% 50.62/18.12 |
% 50.62/18.12 | Instantiating formula (31) with b, all_77_2_214, all_125_3_304 and discharging atoms intruder_message(b) = all_125_3_304, intruder_message(b) = all_77_2_214, yields:
% 50.62/18.12 | (473) all_125_3_304 = all_77_2_214
% 50.62/18.12 |
% 50.62/18.12 | Instantiating formula (31) with b, all_67_1_198, all_125_3_304 and discharging atoms intruder_message(b) = all_125_3_304, intruder_message(b) = all_67_1_198, yields:
% 50.62/18.12 | (474) all_125_3_304 = all_67_1_198
% 50.62/18.12 |
% 50.62/18.12 | Instantiating formula (31) with a, all_59_2_171, all_81_1_219 and discharging atoms intruder_message(a) = all_81_1_219, intruder_message(a) = all_59_2_171, yields:
% 50.62/18.12 | (475) all_81_1_219 = all_59_2_171
% 50.62/18.12 |
% 50.62/18.12 | Instantiating formula (48) with an_a_nonce, all_63_8_191, 0 and discharging atoms fresh_to_b(an_a_nonce) = all_63_8_191, fresh_to_b(an_a_nonce) = 0, yields:
% 50.62/18.12 | (476) all_63_8_191 = 0
% 50.62/18.12 |
% 50.62/18.12 | Instantiating formula (48) with an_a_nonce, all_61_8_180, all_63_8_191 and discharging atoms fresh_to_b(an_a_nonce) = all_63_8_191, fresh_to_b(an_a_nonce) = all_61_8_180, yields:
% 50.62/18.12 | (477) all_63_8_191 = all_61_8_180
% 50.62/18.12 |
% 50.62/18.12 | Instantiating formula (29) with all_13_12_58, all_185_8_468, all_13_8_54 and discharging atoms generate_b_nonce(all_13_12_58) = all_185_8_468, generate_b_nonce(all_13_12_58) = all_13_8_54, yields:
% 50.62/18.12 | (478) all_185_8_468 = all_13_8_54
% 50.62/18.12 |
% 50.62/18.12 | Instantiating formula (29) with all_13_12_58, all_143_7_360, all_185_8_468 and discharging atoms generate_b_nonce(all_13_12_58) = all_185_8_468, generate_b_nonce(all_13_12_58) = all_143_7_360, yields:
% 50.62/18.12 | (479) all_185_8_468 = all_143_7_360
% 50.62/18.12 |
% 50.62/18.12 | Instantiating formula (29) with an_a_nonce, all_61_7_179, all_63_7_190 and discharging atoms generate_b_nonce(an_a_nonce) = all_63_7_190, generate_b_nonce(an_a_nonce) = all_61_7_179, yields:
% 50.62/18.12 | (480) all_63_7_190 = all_61_7_179
% 50.62/18.12 |
% 50.62/18.12 | Instantiating formula (18) with an_a_nonce, all_61_6_178, all_63_6_189 and discharging atoms generate_expiration_time(an_a_nonce) = all_63_6_189, generate_expiration_time(an_a_nonce) = all_61_6_178, yields:
% 50.62/18.12 | (481) all_63_6_189 = all_61_6_178
% 50.62/18.12 |
% 50.62/18.12 | Instantiating formula (8) with all_11_5_37, bt, all_133_4_327, all_11_4_36 and discharging atoms encrypt(all_11_5_37, bt) = all_133_4_327, encrypt(all_11_5_37, bt) = all_11_4_36, yields:
% 50.62/18.12 | (482) all_133_4_327 = all_11_4_36
% 50.62/18.12 |
% 50.62/18.12 | Instantiating formula (8) with all_11_5_37, bt, all_131_9_322, all_133_4_327 and discharging atoms encrypt(all_11_5_37, bt) = all_133_4_327, encrypt(all_11_5_37, bt) = all_131_9_322, yields:
% 50.62/18.12 | (483) all_133_4_327 = all_131_9_322
% 50.62/18.12 |
% 50.62/18.12 | Instantiating formula (65) with a, b, all_0_2_2, all_61_10_182, all_0_1_1 and discharging atoms sent(a, b, all_0_2_2) = all_61_10_182, sent(a, b, all_0_2_2) = all_0_1_1, yields:
% 50.62/18.12 | (484) all_61_10_182 = all_0_1_1
% 50.62/18.12 |
% 50.62/18.12 | Instantiating formula (15) with all_0_1_1, all_85_0_224, 0 and discharging atoms message(all_0_1_1) = all_85_0_224, message(all_0_1_1) = 0, yields:
% 50.62/18.12 | (485) all_85_0_224 = 0
% 50.62/18.12 |
% 50.62/18.12 | Instantiating formula (15) with all_0_1_1, all_57_1_168, all_85_0_224 and discharging atoms message(all_0_1_1) = all_85_0_224, message(all_0_1_1) = all_57_1_168, yields:
% 50.62/18.12 | (486) all_85_0_224 = all_57_1_168
% 50.62/18.12 |
% 50.62/18.12 | Combining equations (478,479) yields a new equation:
% 50.62/18.12 | (487) all_143_7_360 = all_13_8_54
% 50.62/18.12 |
% 50.62/18.12 | Combining equations (483,482) yields a new equation:
% 50.62/18.12 | (488) all_131_9_322 = all_11_4_36
% 50.62/18.12 |
% 50.62/18.12 | Simplifying 488 yields:
% 50.62/18.12 | (489) all_131_9_322 = all_11_4_36
% 50.62/18.12 |
% 50.62/18.12 | Combining equations (473,472) yields a new equation:
% 50.62/18.12 | (490) all_123_2_299 = all_77_2_214
% 50.62/18.12 |
% 50.62/18.12 | Combining equations (474,472) yields a new equation:
% 50.62/18.12 | (491) all_123_2_299 = all_67_1_198
% 50.62/18.12 |
% 50.62/18.12 | Combining equations (491,490) yields a new equation:
% 50.62/18.12 | (492) all_77_2_214 = all_67_1_198
% 50.62/18.12 |
% 50.62/18.12 | Combining equations (459,458) yields a new equation:
% 50.62/18.12 | (493) all_89_1_231 = 0
% 50.62/18.12 |
% 50.62/18.12 | Simplifying 493 yields:
% 50.62/18.12 | (494) all_89_1_231 = 0
% 50.62/18.12 |
% 50.62/18.12 | Combining equations (447,451) yields a new equation:
% 50.62/18.12 | (495) all_89_2_232 = all_47_1_152
% 50.62/18.12 |
% 50.62/18.12 | Simplifying 495 yields:
% 50.62/18.12 | (496) all_89_2_232 = all_47_1_152
% 50.62/18.12 |
% 50.62/18.12 | Combining equations (453,457) yields a new equation:
% 50.62/18.12 | (497) all_85_2_226 = all_31_1_127
% 50.62/18.12 |
% 50.62/18.13 | Simplifying 497 yields:
% 50.62/18.13 | (498) all_85_2_226 = all_31_1_127
% 50.62/18.13 |
% 50.62/18.13 | Combining equations (460,494) yields a new equation:
% 50.62/18.13 | (499) all_75_1_209 = 0
% 50.62/18.13 |
% 50.62/18.13 | Simplifying 499 yields:
% 50.62/18.13 | (500) all_75_1_209 = 0
% 50.62/18.13 |
% 50.62/18.13 | Combining equations (449,496) yields a new equation:
% 50.62/18.13 | (501) all_85_1_225 = all_47_1_152
% 50.62/18.13 |
% 50.62/18.13 | Simplifying 501 yields:
% 50.62/18.13 | (502) all_85_1_225 = all_47_1_152
% 50.62/18.13 |
% 50.62/18.13 | Combining equations (485,486) yields a new equation:
% 50.62/18.13 | (503) all_57_1_168 = 0
% 50.62/18.13 |
% 50.62/18.13 | Combining equations (502,450) yields a new equation:
% 50.62/18.13 | (504) all_71_1_203 = all_47_1_152
% 50.62/18.13 |
% 50.62/18.13 | Combining equations (452,450) yields a new equation:
% 50.62/18.13 | (505) all_71_1_203 = all_37_1_136
% 50.62/18.13 |
% 50.62/18.13 | Combining equations (448,450) yields a new equation:
% 50.62/18.13 | (506) all_71_1_203 = 0
% 50.62/18.13 |
% 50.62/18.13 | Combining equations (455,498) yields a new equation:
% 50.62/18.13 | (507) all_33_1_130 = all_31_1_127
% 50.62/18.13 |
% 50.62/18.13 | Simplifying 507 yields:
% 50.62/18.13 | (508) all_33_1_130 = all_31_1_127
% 50.62/18.13 |
% 50.62/18.13 | Combining equations (465,467) yields a new equation:
% 50.62/18.13 | (509) all_81_2_220 = all_57_0_167
% 50.62/18.13 |
% 50.62/18.13 | Simplifying 509 yields:
% 50.62/18.13 | (510) all_81_2_220 = all_57_0_167
% 50.62/18.13 |
% 50.62/18.13 | Combining equations (469,471) yields a new equation:
% 50.62/18.13 | (511) all_77_1_213 = all_59_1_170
% 50.62/18.13 |
% 50.62/18.13 | Simplifying 511 yields:
% 50.62/18.13 | (512) all_77_1_213 = all_59_1_170
% 50.62/18.13 |
% 50.62/18.13 | Combining equations (510,466) yields a new equation:
% 50.62/18.13 | (513) all_59_0_169 = all_57_0_167
% 50.62/18.13 |
% 50.62/18.13 | Combining equations (512,470) yields a new equation:
% 50.62/18.13 | (514) all_67_0_197 = all_59_1_170
% 50.62/18.13 |
% 50.62/18.13 | Combining equations (461,500) yields a new equation:
% 50.62/18.13 | (515) all_51_2_159 = 0
% 50.62/18.13 |
% 50.62/18.13 | Simplifying 515 yields:
% 50.62/18.13 | (516) all_51_2_159 = 0
% 50.62/18.13 |
% 50.62/18.13 | Combining equations (506,504) yields a new equation:
% 50.62/18.13 | (517) all_47_1_152 = 0
% 50.62/18.13 |
% 50.62/18.13 | Combining equations (505,504) yields a new equation:
% 50.62/18.13 | (518) all_47_1_152 = all_37_1_136
% 50.62/18.13 |
% 50.62/18.13 | Combining equations (476,477) yields a new equation:
% 50.62/18.13 | (519) all_61_8_180 = 0
% 50.62/18.13 |
% 50.62/18.13 | Combining equations (462,463) yields a new equation:
% 50.62/18.13 | (520) all_51_2_159 = all_29_1_124
% 50.62/18.13 |
% 50.62/18.13 | Simplifying 520 yields:
% 50.62/18.13 | (521) all_51_2_159 = all_29_1_124
% 50.62/18.13 |
% 50.62/18.13 | Combining equations (456,454) yields a new equation:
% 50.62/18.13 | (522) all_33_1_130 = 0
% 50.62/18.13 |
% 50.62/18.13 | Simplifying 522 yields:
% 50.62/18.13 | (523) all_33_1_130 = 0
% 50.62/18.13 |
% 50.62/18.13 | Combining equations (521,516) yields a new equation:
% 50.62/18.13 | (524) all_29_1_124 = 0
% 50.62/18.13 |
% 50.62/18.13 | Simplifying 524 yields:
% 50.62/18.13 | (525) all_29_1_124 = 0
% 50.62/18.13 |
% 50.62/18.13 | Combining equations (517,518) yields a new equation:
% 50.62/18.13 | (526) all_37_1_136 = 0
% 50.62/18.13 |
% 50.62/18.13 | Combining equations (523,508) yields a new equation:
% 50.62/18.13 | (527) all_31_1_127 = 0
% 50.62/18.13 |
% 50.62/18.13 | Combining equations (519,477) yields a new equation:
% 50.62/18.13 | (476) all_63_8_191 = 0
% 50.62/18.13 |
% 50.62/18.13 | Combining equations (514,470) yields a new equation:
% 50.62/18.13 | (512) all_77_1_213 = all_59_1_170
% 50.62/18.13 |
% 50.62/18.13 | Combining equations (513,466) yields a new equation:
% 50.62/18.13 | (510) all_81_2_220 = all_57_0_167
% 50.62/18.13 |
% 50.62/18.13 | Combining equations (487,479) yields a new equation:
% 50.62/18.13 | (478) all_185_8_468 = all_13_8_54
% 50.62/18.13 |
% 50.62/18.13 | From (526) and (216) follows:
% 50.62/18.13 | (10) party_of_protocol(b) = 0
% 50.62/18.13 |
% 50.62/18.13 | From (527) and (206) follows:
% 50.62/18.13 | (43) party_of_protocol(a) = 0
% 50.76/18.13 |
% 50.76/18.13 | From (525) and (201) follows:
% 50.76/18.13 | (34) party_of_protocol(t) = 0
% 50.76/18.13 |
% 50.76/18.13 | From (464) and (432) follows:
% 50.76/18.13 | (375) intruder_message(all_13_7_53) = all_135_1_334
% 50.76/18.13 |
% 50.76/18.13 | From (513) and (242) follows:
% 50.76/18.13 | (238) intruder_message(all_0_2_2) = all_57_0_167
% 50.76/18.13 |
% 50.76/18.13 | From (468) and (290) follows:
% 50.76/18.13 | (273) intruder_message(all_0_3_3) = all_67_2_199
% 50.76/18.13 |
% 50.76/18.13 | From (514) and (274) follows:
% 50.76/18.13 | (243) intruder_message(an_a_nonce) = all_59_1_170
% 50.76/18.13 |
% 50.76/18.13 | From (492) and (292) follows:
% 50.76/18.13 | (275) intruder_message(b) = all_67_1_198
% 50.76/18.13 |
% 50.76/18.13 | From (475) and (297) follows:
% 50.76/18.13 | (244) intruder_message(a) = all_59_2_171
% 50.76/18.13 |
% 50.76/18.13 | From (480) and (263) follows:
% 50.76/18.13 | (258) generate_b_nonce(an_a_nonce) = all_61_7_179
% 50.76/18.13 |
% 50.76/18.13 | From (481) and (262) follows:
% 50.76/18.13 | (253) generate_expiration_time(an_a_nonce) = all_61_6_178
% 50.76/18.13 |
% 50.76/18.13 | From (487) and (400) follows:
% 50.76/18.13 | (543) triple(b, all_13_8_54, all_143_4_357) = all_143_3_356
% 50.76/18.13 |
% 50.76/18.13 | From (480) and (265) follows:
% 50.76/18.13 | (544) triple(b, all_61_7_179, all_63_4_187) = all_63_3_186
% 50.76/18.13 |
% 50.76/18.13 | From (481) and (269) follows:
% 50.76/18.13 | (545) triple(b, an_a_nonce, all_61_6_178) = all_63_5_188
% 50.76/18.13 |
% 50.76/18.13 | From (478) and (436) follows:
% 50.76/18.13 | (546) encrypt(all_13_8_54, all_13_14_60) = all_185_7_467
% 50.76/18.13 |
% 50.76/18.13 | From (489) and (355) follows:
% 50.76/18.13 | (547) pair(all_11_4_36, all_131_7_320) = all_131_6_319
% 50.76/18.13 |
% 50.76/18.13 | From (484) and (252) follows:
% 50.76/18.13 | (548) message(all_0_1_1) = all_61_9_181
% 50.76/18.13 |
% 50.76/18.13 | From (503) and (239) follows:
% 50.76/18.13 | (49) message(all_0_1_1) = 0
% 50.76/18.13 |
% 50.76/18.13 +-Applying beta-rule and splitting (240), into two cases.
% 50.76/18.13 |-Branch one:
% 50.76/18.13 | (550) ~ (all_57_1_168 = 0)
% 50.76/18.13 |
% 50.76/18.13 | Equations (503) can reduce 550 to:
% 50.76/18.13 | (551) $false
% 50.76/18.13 |
% 50.76/18.13 |-The branch is then unsatisfiable
% 50.76/18.13 |-Branch two:
% 50.76/18.13 | (503) all_57_1_168 = 0
% 50.76/18.13 | (553) all_57_0_167 = 0
% 50.76/18.13 |
% 50.76/18.13 | Combining equations (553,510) yields a new equation:
% 50.76/18.13 | (554) all_81_2_220 = 0
% 50.76/18.13 |
% 50.76/18.13 | From (553) and (238) follows:
% 50.76/18.13 | (555) intruder_message(all_0_2_2) = 0
% 50.76/18.13 |
% 50.76/18.13 +-Applying beta-rule and splitting (298), into two cases.
% 50.76/18.13 |-Branch one:
% 50.76/18.13 | (556) ~ (all_81_2_220 = 0)
% 50.76/18.13 |
% 50.76/18.13 | Equations (554) can reduce 556 to:
% 50.76/18.13 | (551) $false
% 50.76/18.13 |
% 50.76/18.13 |-The branch is then unsatisfiable
% 50.76/18.13 |-Branch two:
% 50.76/18.13 | (554) all_81_2_220 = 0
% 50.76/18.13 | (559) all_81_0_218 = 0 & all_81_1_219 = 0
% 50.76/18.13 |
% 50.76/18.13 | Applying alpha-rule on (559) yields:
% 50.76/18.13 | (560) all_81_0_218 = 0
% 50.76/18.13 | (561) all_81_1_219 = 0
% 50.76/18.14 |
% 50.76/18.14 | Combining equations (560,471) yields a new equation:
% 50.76/18.14 | (562) all_59_1_170 = 0
% 50.76/18.14 |
% 50.76/18.14 | Combining equations (475,561) yields a new equation:
% 50.76/18.14 | (563) all_59_2_171 = 0
% 50.76/18.14 |
% 50.76/18.14 | Simplifying 563 yields:
% 50.76/18.14 | (564) all_59_2_171 = 0
% 50.76/18.14 |
% 50.76/18.14 | Combining equations (562,512) yields a new equation:
% 50.76/18.14 | (565) all_77_1_213 = 0
% 50.76/18.14 |
% 50.76/18.14 | From (562) and (243) follows:
% 50.76/18.14 | (566) intruder_message(an_a_nonce) = 0
% 50.76/18.14 |
% 50.76/18.14 | From (564) and (244) follows:
% 50.76/18.14 | (567) intruder_message(a) = 0
% 50.76/18.14 |
% 50.76/18.14 | Instantiating formula (8) with all_13_8_54, all_13_14_60, all_185_7_467, all_13_7_53 and discharging atoms encrypt(all_13_8_54, all_13_14_60) = all_185_7_467, encrypt(all_13_8_54, all_13_14_60) = all_13_7_53, yields:
% 50.76/18.14 | (568) all_185_7_467 = all_13_7_53
% 50.76/18.14 |
% 50.76/18.14 | Instantiating formula (15) with all_0_1_1, all_61_9_181, 0 and discharging atoms message(all_0_1_1) = all_61_9_181, message(all_0_1_1) = 0, yields:
% 50.76/18.14 | (569) all_61_9_181 = 0
% 50.76/18.14 |
% 50.76/18.14 | From (568) and (546) follows:
% 50.76/18.14 | (107) encrypt(all_13_8_54, all_13_14_60) = all_13_7_53
% 50.76/18.14 |
% 50.76/18.14 +-Applying beta-rule and splitting (251), into two cases.
% 50.76/18.14 |-Branch one:
% 50.76/18.14 | (571) ~ (all_61_8_180 = 0)
% 50.76/18.14 |
% 50.76/18.14 | Equations (519) can reduce 571 to:
% 50.76/18.14 | (551) $false
% 50.76/18.14 |
% 50.76/18.14 |-The branch is then unsatisfiable
% 50.76/18.14 |-Branch two:
% 50.76/18.14 | (519) all_61_8_180 = 0
% 50.76/18.14 | (574) ~ (all_61_9_181 = 0) | (all_61_0_172 = 0 & all_61_1_173 = 0)
% 50.76/18.14 |
% 50.76/18.14 +-Applying beta-rule and splitting (574), into two cases.
% 50.76/18.14 |-Branch one:
% 50.76/18.14 | (575) ~ (all_61_9_181 = 0)
% 50.76/18.14 |
% 50.76/18.14 | Equations (569) can reduce 575 to:
% 50.76/18.14 | (551) $false
% 50.76/18.14 |
% 50.76/18.14 |-The branch is then unsatisfiable
% 50.76/18.14 |-Branch two:
% 50.76/18.14 | (569) all_61_9_181 = 0
% 50.76/18.14 | (578) all_61_0_172 = 0 & all_61_1_173 = 0
% 50.76/18.14 |
% 50.76/18.14 | Applying alpha-rule on (578) yields:
% 50.76/18.14 | (579) all_61_0_172 = 0
% 50.76/18.14 | (580) all_61_1_173 = 0
% 50.76/18.14 |
% 50.76/18.14 | From (579) and (250) follows:
% 50.76/18.14 | (581) b_stored(all_0_2_2) = 0
% 50.76/18.14 |
% 50.76/18.14 | From (580) and (254) follows:
% 50.76/18.14 | (582) message(all_61_2_174) = 0
% 50.76/18.14 |
% 50.76/18.14 | Instantiating formula (7) with all_135_1_334, all_13_7_53, a, all_13_14_60, all_13_8_54 and discharging atoms party_of_protocol(a) = 0, intruder_message(all_13_7_53) = all_135_1_334, encrypt(all_13_8_54, all_13_14_60) = all_13_7_53, yields:
% 50.76/18.14 | (583) all_135_1_334 = 0 | ? [v0] : ? [v1] : ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_13_8_54) = v0 & key(all_13_14_60, a) = v1 & ( ~ (v2 = 0) | ~ (v0 = 0)))
% 50.76/18.14 |
% 50.76/18.14 | Instantiating formula (58) with all_149_5_383, all_149_6_384, all_15_13_74, all_15_14_75 and discharging atoms generate_expiration_time(all_15_13_74) = all_149_6_384, triple(all_15_14_75, all_15_13_74, all_149_6_384) = all_149_5_383, yields:
% 50.76/18.14 | (584) ? [v0] : ? [v1] : ? [v2] : ? [v3] : ? [v4] : ? [v5] : ? [v6] : ? [v7] : ? [v8] : ? [v9] : (fresh_to_b(all_15_13_74) = v3 & generate_b_nonce(all_15_13_74) = v4 & b_stored(v0) = v9 & triple(b, v4, v5) = v6 & encrypt(all_149_5_383, bt) = v5 & pair(all_15_14_75, all_15_13_74) = v0 & sent(all_15_14_75, b, v0) = v1 & sent(b, t, v6) = v7 & message(v7) = v8 & message(v1) = v2 & ( ~ (v3 = 0) | ~ (v2 = 0) | (v9 = 0 & v8 = 0)))
% 50.76/18.14 |
% 50.76/18.14 | Instantiating formula (22) with all_149_5_383, all_149_6_384, all_15_13_74, all_15_14_75, all_15_13_74 and discharging atoms generate_expiration_time(all_15_13_74) = all_149_6_384, triple(all_15_14_75, all_15_13_74, all_149_6_384) = all_149_5_383, yields:
% 50.76/18.14 | (585) ? [v0] : ? [v1] : ? [v2] : ? [v3] : ? [v4] : ? [v5] : ? [v6] : ? [v7] : ? [v8] : ? [v9] : (b_holds(v8) = v9 & generate_b_nonce(all_15_13_74) = v1 & b_stored(v6) = v7 & encrypt(v1, all_15_13_74) = v2 & encrypt(all_149_5_383, bt) = v0 & pair(v0, v2) = v3 & pair(all_15_14_75, all_15_13_74) = v6 & sent(all_15_14_75, b, v3) = v4 & message(v4) = v5 & key(all_15_13_74, all_15_14_75) = v8 & ( ~ (v7 = 0) | ~ (v5 = 0) | v9 = 0))
% 50.76/18.14 |
% 50.76/18.14 | Instantiating formula (22) with all_145_5_369, all_145_6_370, all_15_5_66, all_15_15_76, all_15_5_66 and discharging atoms generate_expiration_time(all_15_5_66) = all_145_6_370, triple(all_15_15_76, all_15_5_66, all_145_6_370) = all_145_5_369, yields:
% 50.76/18.14 | (586) ? [v0] : ? [v1] : ? [v2] : ? [v3] : ? [v4] : ? [v5] : ? [v6] : ? [v7] : ? [v8] : ? [v9] : (b_holds(v8) = v9 & generate_b_nonce(all_15_5_66) = v1 & b_stored(v6) = v7 & encrypt(v1, all_15_5_66) = v2 & encrypt(all_145_5_369, bt) = v0 & pair(v0, v2) = v3 & pair(all_15_15_76, all_15_5_66) = v6 & sent(all_15_15_76, b, v3) = v4 & message(v4) = v5 & key(all_15_5_66, all_15_15_76) = v8 & ( ~ (v7 = 0) | ~ (v5 = 0) | v9 = 0))
% 50.76/18.14 |
% 50.76/18.14 | Instantiating formula (22) with all_137_5_341, all_137_6_342, all_13_7_53, all_13_9_55, all_13_7_53 and discharging atoms generate_expiration_time(all_13_7_53) = all_137_6_342, triple(all_13_9_55, all_13_7_53, all_137_6_342) = all_137_5_341, yields:
% 50.76/18.14 | (587) ? [v0] : ? [v1] : ? [v2] : ? [v3] : ? [v4] : ? [v5] : ? [v6] : ? [v7] : ? [v8] : ? [v9] : (b_holds(v8) = v9 & generate_b_nonce(all_13_7_53) = v1 & b_stored(v6) = v7 & encrypt(v1, all_13_7_53) = v2 & encrypt(all_137_5_341, bt) = v0 & pair(v0, v2) = v3 & pair(all_13_9_55, all_13_7_53) = v6 & sent(all_13_9_55, b, v3) = v4 & message(v4) = v5 & key(all_13_7_53, all_13_9_55) = v8 & ( ~ (v7 = 0) | ~ (v5 = 0) | v9 = 0))
% 50.76/18.14 |
% 50.76/18.14 | Instantiating formula (40) with all_137_5_341, all_137_6_342, all_13_7_53, all_13_9_55 and discharging atoms triple(all_13_9_55, all_13_7_53, all_137_6_342) = all_137_5_341, yields:
% 50.76/18.14 | (588) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (intruder_message(all_137_5_341) = v3 & intruder_message(all_137_6_342) = v2 & intruder_message(all_13_7_53) = v1 & intruder_message(all_13_9_55) = v0 & ( ~ (v2 = 0) | ~ (v1 = 0) | ~ (v0 = 0) | v3 = 0))
% 50.76/18.14 |
% 50.76/18.14 | Instantiating formula (68) with all_137_5_341, all_137_6_342, all_13_7_53, all_13_9_55 and discharging atoms triple(all_13_9_55, all_13_7_53, all_137_6_342) = all_137_5_341, yields:
% 50.76/18.14 | (589) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (intruder_message(all_137_5_341) = v0 & intruder_message(all_137_6_342) = v3 & intruder_message(all_13_7_53) = v2 & intruder_message(all_13_9_55) = v1 & ( ~ (v0 = 0) | (v3 = 0 & v2 = 0 & v1 = 0)))
% 50.76/18.14 |
% 50.76/18.14 | Instantiating formula (40) with all_149_3_381, all_149_4_382, all_149_7_385, b and discharging atoms triple(b, all_149_7_385, all_149_4_382) = all_149_3_381, yields:
% 50.76/18.14 | (590) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (intruder_message(all_149_3_381) = v3 & intruder_message(all_149_4_382) = v2 & intruder_message(all_149_7_385) = v1 & intruder_message(b) = v0 & ( ~ (v2 = 0) | ~ (v1 = 0) | ~ (v0 = 0) | v3 = 0))
% 50.76/18.14 |
% 50.76/18.14 | Instantiating formula (68) with all_149_3_381, all_149_4_382, all_149_7_385, b and discharging atoms triple(b, all_149_7_385, all_149_4_382) = all_149_3_381, yields:
% 50.76/18.14 | (591) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (intruder_message(all_149_3_381) = v0 & intruder_message(all_149_4_382) = v3 & intruder_message(all_149_7_385) = v2 & intruder_message(b) = v1 & ( ~ (v0 = 0) | (v3 = 0 & v2 = 0 & v1 = 0)))
% 50.76/18.14 |
% 50.76/18.14 | Instantiating formula (40) with all_145_3_367, all_145_4_368, all_145_7_371, b and discharging atoms triple(b, all_145_7_371, all_145_4_368) = all_145_3_367, yields:
% 50.76/18.14 | (592) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (intruder_message(all_145_3_367) = v3 & intruder_message(all_145_4_368) = v2 & intruder_message(all_145_7_371) = v1 & intruder_message(b) = v0 & ( ~ (v2 = 0) | ~ (v1 = 0) | ~ (v0 = 0) | v3 = 0))
% 50.76/18.14 |
% 50.76/18.14 | Instantiating formula (68) with all_145_3_367, all_145_4_368, all_145_7_371, b and discharging atoms triple(b, all_145_7_371, all_145_4_368) = all_145_3_367, yields:
% 50.76/18.14 | (593) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (intruder_message(all_145_3_367) = v0 & intruder_message(all_145_4_368) = v3 & intruder_message(all_145_7_371) = v2 & intruder_message(b) = v1 & ( ~ (v0 = 0) | (v3 = 0 & v2 = 0 & v1 = 0)))
% 50.76/18.14 |
% 50.76/18.14 | Instantiating formula (40) with all_137_3_339, all_137_4_340, all_137_7_343, b and discharging atoms triple(b, all_137_7_343, all_137_4_340) = all_137_3_339, yields:
% 50.76/18.14 | (594) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (intruder_message(all_137_3_339) = v3 & intruder_message(all_137_4_340) = v2 & intruder_message(all_137_7_343) = v1 & intruder_message(b) = v0 & ( ~ (v2 = 0) | ~ (v1 = 0) | ~ (v0 = 0) | v3 = 0))
% 50.76/18.14 |
% 50.76/18.14 | Instantiating formula (68) with all_137_3_339, all_137_4_340, all_137_7_343, b and discharging atoms triple(b, all_137_7_343, all_137_4_340) = all_137_3_339, yields:
% 50.76/18.14 | (595) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (intruder_message(all_137_3_339) = v0 & intruder_message(all_137_4_340) = v3 & intruder_message(all_137_7_343) = v2 & intruder_message(b) = v1 & ( ~ (v0 = 0) | (v3 = 0 & v2 = 0 & v1 = 0)))
% 50.76/18.14 |
% 50.76/18.14 | Instantiating formula (40) with all_63_3_186, all_63_4_187, all_61_7_179, b and discharging atoms triple(b, all_61_7_179, all_63_4_187) = all_63_3_186, yields:
% 50.76/18.14 | (596) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (intruder_message(all_63_3_186) = v3 & intruder_message(all_63_4_187) = v2 & intruder_message(all_61_7_179) = v1 & intruder_message(b) = v0 & ( ~ (v2 = 0) | ~ (v1 = 0) | ~ (v0 = 0) | v3 = 0))
% 50.76/18.14 |
% 50.76/18.14 | Instantiating formula (68) with all_63_3_186, all_63_4_187, all_61_7_179, b and discharging atoms triple(b, all_61_7_179, all_63_4_187) = all_63_3_186, yields:
% 50.76/18.14 | (597) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (intruder_message(all_63_3_186) = v0 & intruder_message(all_63_4_187) = v3 & intruder_message(all_61_7_179) = v2 & intruder_message(b) = v1 & ( ~ (v0 = 0) | (v3 = 0 & v2 = 0 & v1 = 0)))
% 50.76/18.14 |
% 50.76/18.14 | Instantiating formula (40) with all_61_3_175, all_61_4_176, all_61_7_179, b and discharging atoms triple(b, all_61_7_179, all_61_4_176) = all_61_3_175, yields:
% 50.76/18.14 | (598) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (intruder_message(all_61_3_175) = v3 & intruder_message(all_61_4_176) = v2 & intruder_message(all_61_7_179) = v1 & intruder_message(b) = v0 & ( ~ (v2 = 0) | ~ (v1 = 0) | ~ (v0 = 0) | v3 = 0))
% 50.76/18.15 |
% 50.76/18.15 | Instantiating formula (68) with all_61_3_175, all_61_4_176, all_61_7_179, b and discharging atoms triple(b, all_61_7_179, all_61_4_176) = all_61_3_175, yields:
% 50.76/18.15 | (599) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (intruder_message(all_61_3_175) = v0 & intruder_message(all_61_4_176) = v3 & intruder_message(all_61_7_179) = v2 & intruder_message(b) = v1 & ( ~ (v0 = 0) | (v3 = 0 & v2 = 0 & v1 = 0)))
% 50.76/18.15 |
% 50.76/18.15 | Instantiating formula (40) with all_143_3_356, all_143_4_357, all_13_8_54, b and discharging atoms triple(b, all_13_8_54, all_143_4_357) = all_143_3_356, yields:
% 50.76/18.15 | (600) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (intruder_message(all_143_3_356) = v3 & intruder_message(all_143_4_357) = v2 & intruder_message(all_13_8_54) = v1 & intruder_message(b) = v0 & ( ~ (v2 = 0) | ~ (v1 = 0) | ~ (v0 = 0) | v3 = 0))
% 50.76/18.15 |
% 50.76/18.15 | Instantiating formula (68) with all_143_3_356, all_143_4_357, all_13_8_54, b and discharging atoms triple(b, all_13_8_54, all_143_4_357) = all_143_3_356, yields:
% 50.76/18.15 | (601) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (intruder_message(all_143_3_356) = v0 & intruder_message(all_143_4_357) = v3 & intruder_message(all_13_8_54) = v2 & intruder_message(b) = v1 & ( ~ (v0 = 0) | (v3 = 0 & v2 = 0 & v1 = 0)))
% 50.76/18.15 |
% 50.76/18.15 | Instantiating formula (58) with all_63_5_188, all_61_6_178, an_a_nonce, b and discharging atoms generate_expiration_time(an_a_nonce) = all_61_6_178, triple(b, an_a_nonce, all_61_6_178) = all_63_5_188, yields:
% 50.76/18.15 | (602) ? [v0] : ? [v1] : ? [v2] : ? [v3] : ? [v4] : ? [v5] : ? [v6] : ? [v7] : ? [v8] : ? [v9] : (fresh_to_b(an_a_nonce) = v3 & generate_b_nonce(an_a_nonce) = v4 & b_stored(v0) = v9 & triple(b, v4, v5) = v6 & encrypt(all_63_5_188, bt) = v5 & pair(b, an_a_nonce) = v0 & sent(b, b, v0) = v1 & sent(b, t, v6) = v7 & message(v7) = v8 & message(v1) = v2 & ( ~ (v3 = 0) | ~ (v2 = 0) | (v9 = 0 & v8 = 0)))
% 50.76/18.15 |
% 50.76/18.15 | Instantiating formula (22) with all_63_5_188, all_61_6_178, an_a_nonce, b, an_a_nonce and discharging atoms generate_expiration_time(an_a_nonce) = all_61_6_178, triple(b, an_a_nonce, all_61_6_178) = all_63_5_188, yields:
% 50.76/18.15 | (603) ? [v0] : ? [v1] : ? [v2] : ? [v3] : ? [v4] : ? [v5] : ? [v6] : ? [v7] : ? [v8] : ? [v9] : (b_holds(v8) = v9 & generate_b_nonce(an_a_nonce) = v1 & b_stored(v6) = v7 & encrypt(v1, an_a_nonce) = v2 & encrypt(all_63_5_188, bt) = v0 & pair(v0, v2) = v3 & pair(b, an_a_nonce) = v6 & sent(b, b, v3) = v4 & message(v4) = v5 & key(an_a_nonce, b) = v8 & ( ~ (v7 = 0) | ~ (v5 = 0) | v9 = 0))
% 50.76/18.15 |
% 50.76/18.15 | Instantiating formula (40) with all_63_5_188, all_61_6_178, an_a_nonce, b and discharging atoms triple(b, an_a_nonce, all_61_6_178) = all_63_5_188, yields:
% 50.76/18.15 | (604) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (intruder_message(all_63_5_188) = v3 & intruder_message(all_61_6_178) = v2 & intruder_message(an_a_nonce) = v1 & intruder_message(b) = v0 & ( ~ (v2 = 0) | ~ (v1 = 0) | ~ (v0 = 0) | v3 = 0))
% 50.76/18.15 |
% 50.76/18.15 | Instantiating formula (68) with all_63_5_188, all_61_6_178, an_a_nonce, b and discharging atoms triple(b, an_a_nonce, all_61_6_178) = all_63_5_188, yields:
% 50.76/18.15 | (605) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (intruder_message(all_63_5_188) = v0 & intruder_message(all_61_6_178) = v3 & intruder_message(an_a_nonce) = v2 & intruder_message(b) = v1 & ( ~ (v0 = 0) | (v3 = 0 & v2 = 0 & v1 = 0)))
% 50.76/18.15 |
% 50.76/18.15 | Instantiating formula (22) with all_61_5_177, all_61_6_178, an_a_nonce, a, an_a_nonce and discharging atoms generate_expiration_time(an_a_nonce) = all_61_6_178, triple(a, an_a_nonce, all_61_6_178) = all_61_5_177, yields:
% 50.76/18.15 | (606) ? [v0] : ? [v1] : ? [v2] : ? [v3] : ? [v4] : ? [v5] : ? [v6] : ? [v7] : ? [v8] : ? [v9] : (b_holds(v8) = v9 & generate_b_nonce(an_a_nonce) = v1 & b_stored(v6) = v7 & encrypt(v1, an_a_nonce) = v2 & encrypt(all_61_5_177, bt) = v0 & pair(v0, v2) = v3 & pair(a, an_a_nonce) = v6 & sent(a, b, v3) = v4 & message(v4) = v5 & key(an_a_nonce, a) = v8 & ( ~ (v7 = 0) | ~ (v5 = 0) | v9 = 0))
% 50.76/18.15 |
% 50.76/18.15 | Instantiating formula (40) with all_61_5_177, all_61_6_178, an_a_nonce, a and discharging atoms triple(a, an_a_nonce, all_61_6_178) = all_61_5_177, yields:
% 50.76/18.15 | (607) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (intruder_message(all_61_5_177) = v3 & intruder_message(all_61_6_178) = v2 & intruder_message(an_a_nonce) = v1 & intruder_message(a) = v0 & ( ~ (v2 = 0) | ~ (v1 = 0) | ~ (v0 = 0) | v3 = 0))
% 50.76/18.15 |
% 50.76/18.15 | Instantiating formula (68) with all_61_5_177, all_61_6_178, an_a_nonce, a and discharging atoms triple(a, an_a_nonce, all_61_6_178) = all_61_5_177, yields:
% 50.76/18.15 | (608) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (intruder_message(all_61_5_177) = v0 & intruder_message(all_61_6_178) = v3 & intruder_message(an_a_nonce) = v2 & intruder_message(a) = v1 & ( ~ (v0 = 0) | (v3 = 0 & v2 = 0 & v1 = 0)))
% 50.76/18.15 |
% 50.76/18.15 | Instantiating formula (70) with all_131_6_319, all_131_7_320, all_11_4_36 and discharging atoms pair(all_11_4_36, all_131_7_320) = all_131_6_319, yields:
% 50.76/18.15 | (609) ? [v0] : ? [v1] : ? [v2] : ? [v3] : ? [v4] : ? [v5] : ? [v6] : ? [v7] : ? [v8] : ? [v9] : ? [v10] : (fresh_to_b(all_131_7_320) = v2 & generate_b_nonce(all_131_7_320) = v3 & generate_expiration_time(all_131_7_320) = v4 & b_stored(all_131_6_319) = v10 & triple(all_11_4_36, all_131_7_320, v4) = v5 & triple(b, v3, v6) = v7 & encrypt(v5, bt) = v6 & sent(all_11_4_36, b, all_131_6_319) = v0 & sent(b, t, v7) = v8 & message(v8) = v9 & message(v0) = v1 & ( ~ (v2 = 0) | ~ (v1 = 0) | (v10 = 0 & v9 = 0)))
% 50.76/18.15 |
% 50.76/18.15 | Instantiating formula (73) with all_149_10_388, b, all_15_14_75, all_15_7_68 and discharging atoms sent(all_15_14_75, b, all_15_7_68) = all_149_10_388, yields:
% 50.76/18.15 | (610) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (party_of_protocol(all_15_14_75) = v1 & party_of_protocol(b) = v2 & intruder_message(all_15_7_68) = v0 & message(all_149_10_388) = v3 & ( ~ (v2 = 0) | ~ (v1 = 0) | ~ (v0 = 0) | v3 = 0))
% 50.76/18.15 |
% 50.76/18.15 | Instantiating formula (73) with all_145_10_374, b, all_15_15_76, all_15_4_65 and discharging atoms sent(all_15_15_76, b, all_15_4_65) = all_145_10_374, yields:
% 50.76/18.15 | (611) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (party_of_protocol(all_15_15_76) = v1 & party_of_protocol(b) = v2 & intruder_message(all_15_4_65) = v0 & message(all_145_10_374) = v3 & ( ~ (v2 = 0) | ~ (v1 = 0) | ~ (v0 = 0) | v3 = 0))
% 50.76/18.15 |
% 50.76/18.15 | Instantiating formula (73) with all_137_10_346, b, all_13_9_55, all_13_6_52 and discharging atoms sent(all_13_9_55, b, all_13_6_52) = all_137_10_346, yields:
% 50.76/18.15 | (612) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (party_of_protocol(all_13_9_55) = v1 & party_of_protocol(b) = v2 & intruder_message(all_13_6_52) = v0 & message(all_137_10_346) = v3 & ( ~ (v2 = 0) | ~ (v1 = 0) | ~ (v0 = 0) | v3 = 0))
% 50.76/18.15 |
% 50.76/18.15 | Instantiating formula (73) with all_143_10_363, b, all_13_13_59, all_13_3_49 and discharging atoms sent(all_13_13_59, b, all_13_3_49) = all_143_10_363, yields:
% 50.76/18.15 | (613) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (party_of_protocol(all_13_13_59) = v1 & party_of_protocol(b) = v2 & intruder_message(all_13_3_49) = v0 & message(all_143_10_363) = v3 & ( ~ (v2 = 0) | ~ (v1 = 0) | ~ (v0 = 0) | v3 = 0))
% 50.76/18.15 |
% 50.76/18.15 | Instantiating formula (73) with all_131_5_318, b, all_11_13_45, all_131_6_319 and discharging atoms sent(all_11_13_45, b, all_131_6_319) = all_131_5_318, yields:
% 50.76/18.15 | (614) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (party_of_protocol(all_11_13_45) = v1 & party_of_protocol(b) = v2 & intruder_message(all_131_6_319) = v0 & message(all_131_5_318) = v3 & ( ~ (v2 = 0) | ~ (v1 = 0) | ~ (v0 = 0) | v3 = 0))
% 50.76/18.15 |
% 50.76/18.15 | Instantiating formula (73) with all_63_10_193, b, b, all_0_3_3 and discharging atoms sent(b, b, all_0_3_3) = all_63_10_193, yields:
% 50.76/18.15 | (615) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (party_of_protocol(b) = v2 & party_of_protocol(b) = v1 & intruder_message(all_0_3_3) = v0 & message(all_63_10_193) = v3 & ( ~ (v2 = 0) | ~ (v1 = 0) | ~ (v0 = 0) | v3 = 0))
% 50.76/18.15 |
% 50.76/18.15 | Instantiating formula (4) with all_63_10_193, all_0_3_3, b, b and discharging atoms sent(b, b, all_0_3_3) = all_63_10_193, yields:
% 50.76/18.15 | (616) ? [v0] : ? [v1] : (intruder_message(all_0_3_3) = v1 & message(all_63_10_193) = v0 & ( ~ (v0 = 0) | v1 = 0))
% 50.76/18.15 |
% 50.76/18.15 | Instantiating formula (73) with all_149_2_380, t, b, all_149_3_381 and discharging atoms sent(b, t, all_149_3_381) = all_149_2_380, yields:
% 50.76/18.15 | (617) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (party_of_protocol(b) = v1 & party_of_protocol(t) = v2 & intruder_message(all_149_3_381) = v0 & message(all_149_2_380) = v3 & ( ~ (v2 = 0) | ~ (v1 = 0) | ~ (v0 = 0) | v3 = 0))
% 50.76/18.15 |
% 50.76/18.15 | Instantiating formula (73) with all_145_2_366, t, b, all_145_3_367 and discharging atoms sent(b, t, all_145_3_367) = all_145_2_366, yields:
% 50.76/18.15 | (618) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (party_of_protocol(b) = v1 & party_of_protocol(t) = v2 & intruder_message(all_145_3_367) = v0 & message(all_145_2_366) = v3 & ( ~ (v2 = 0) | ~ (v1 = 0) | ~ (v0 = 0) | v3 = 0))
% 50.76/18.15 |
% 50.76/18.15 | Instantiating formula (73) with all_143_2_355, t, b, all_143_3_356 and discharging atoms sent(b, t, all_143_3_356) = all_143_2_355, yields:
% 50.76/18.15 | (619) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (party_of_protocol(b) = v1 & party_of_protocol(t) = v2 & intruder_message(all_143_3_356) = v0 & message(all_143_2_355) = v3 & ( ~ (v2 = 0) | ~ (v1 = 0) | ~ (v0 = 0) | v3 = 0))
% 50.76/18.15 |
% 50.76/18.15 | Instantiating formula (73) with all_137_2_338, t, b, all_137_3_339 and discharging atoms sent(b, t, all_137_3_339) = all_137_2_338, yields:
% 50.76/18.15 | (620) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (party_of_protocol(b) = v1 & party_of_protocol(t) = v2 & intruder_message(all_137_3_339) = v0 & message(all_137_2_338) = v3 & ( ~ (v2 = 0) | ~ (v1 = 0) | ~ (v0 = 0) | v3 = 0))
% 50.76/18.15 |
% 50.76/18.15 | Instantiating formula (73) with all_63_2_185, t, b, all_63_3_186 and discharging atoms sent(b, t, all_63_3_186) = all_63_2_185, yields:
% 50.76/18.15 | (621) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (party_of_protocol(b) = v1 & party_of_protocol(t) = v2 & intruder_message(all_63_3_186) = v0 & message(all_63_2_185) = v3 & ( ~ (v2 = 0) | ~ (v1 = 0) | ~ (v0 = 0) | v3 = 0))
% 50.76/18.15 |
% 50.76/18.15 | Instantiating formula (4) with all_63_2_185, all_63_3_186, t, b and discharging atoms sent(b, t, all_63_3_186) = all_63_2_185, yields:
% 50.76/18.15 | (622) ? [v0] : ? [v1] : (intruder_message(all_63_3_186) = v1 & message(all_63_2_185) = v0 & ( ~ (v0 = 0) | v1 = 0))
% 50.76/18.15 |
% 50.76/18.15 | Instantiating formula (73) with all_61_2_174, t, b, all_61_3_175 and discharging atoms sent(b, t, all_61_3_175) = all_61_2_174, yields:
% 50.76/18.15 | (623) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (party_of_protocol(b) = v1 & party_of_protocol(t) = v2 & intruder_message(all_61_3_175) = v0 & message(all_61_2_174) = v3 & ( ~ (v2 = 0) | ~ (v1 = 0) | ~ (v0 = 0) | v3 = 0))
% 50.76/18.15 |
% 50.76/18.15 | Instantiating formula (4) with all_61_2_174, all_61_3_175, t, b and discharging atoms sent(b, t, all_61_3_175) = all_61_2_174, yields:
% 50.76/18.16 | (624) ? [v0] : ? [v1] : (intruder_message(all_61_3_175) = v1 & message(all_61_2_174) = v0 & ( ~ (v0 = 0) | v1 = 0))
% 50.76/18.16 |
% 50.76/18.16 | Instantiating formula (57) with all_109_1_268, a, bt and discharging atoms key(bt, a) = all_109_1_268, yields:
% 50.76/18.16 | (625) ? [v0] : ? [v1] : ? [v2] : (intruder_holds(all_109_1_268) = v2 & party_of_protocol(a) = v1 & intruder_message(bt) = v0 & ( ~ (v1 = 0) | ~ (v0 = 0) | v2 = 0))
% 50.76/18.16 |
% 50.76/18.16 | Instantiating formula (57) with all_103_2_261, b, at and discharging atoms key(at, b) = all_103_2_261, yields:
% 50.76/18.16 | (626) ? [v0] : ? [v1] : ? [v2] : (intruder_holds(all_103_2_261) = v2 & party_of_protocol(b) = v1 & intruder_message(at) = v0 & ( ~ (v1 = 0) | ~ (v0 = 0) | v2 = 0))
% 50.76/18.16 |
% 50.76/18.16 | Instantiating (605) with all_243_0_490, all_243_1_491, all_243_2_492, all_243_3_493 yields:
% 50.76/18.16 | (627) intruder_message(all_63_5_188) = all_243_3_493 & intruder_message(all_61_6_178) = all_243_0_490 & intruder_message(an_a_nonce) = all_243_1_491 & intruder_message(b) = all_243_2_492 & ( ~ (all_243_3_493 = 0) | (all_243_0_490 = 0 & all_243_1_491 = 0 & all_243_2_492 = 0))
% 50.76/18.16 |
% 50.76/18.16 | Applying alpha-rule on (627) yields:
% 50.76/18.16 | (628) intruder_message(b) = all_243_2_492
% 50.76/18.16 | (629) intruder_message(an_a_nonce) = all_243_1_491
% 50.76/18.16 | (630) intruder_message(all_63_5_188) = all_243_3_493
% 50.76/18.16 | (631) ~ (all_243_3_493 = 0) | (all_243_0_490 = 0 & all_243_1_491 = 0 & all_243_2_492 = 0)
% 50.76/18.16 | (632) intruder_message(all_61_6_178) = all_243_0_490
% 50.76/18.16 |
% 50.76/18.16 | Instantiating (604) with all_245_0_494, all_245_1_495, all_245_2_496, all_245_3_497 yields:
% 50.76/18.16 | (633) intruder_message(all_63_5_188) = all_245_0_494 & intruder_message(all_61_6_178) = all_245_1_495 & intruder_message(an_a_nonce) = all_245_2_496 & intruder_message(b) = all_245_3_497 & ( ~ (all_245_1_495 = 0) | ~ (all_245_2_496 = 0) | ~ (all_245_3_497 = 0) | all_245_0_494 = 0)
% 50.76/18.16 |
% 50.76/18.16 | Applying alpha-rule on (633) yields:
% 50.76/18.16 | (634) intruder_message(all_61_6_178) = all_245_1_495
% 50.76/18.16 | (635) intruder_message(an_a_nonce) = all_245_2_496
% 50.76/18.16 | (636) intruder_message(all_63_5_188) = all_245_0_494
% 50.76/18.16 | (637) intruder_message(b) = all_245_3_497
% 50.76/18.16 | (638) ~ (all_245_1_495 = 0) | ~ (all_245_2_496 = 0) | ~ (all_245_3_497 = 0) | all_245_0_494 = 0
% 50.76/18.16 |
% 50.76/18.16 | Instantiating (601) with all_253_0_522, all_253_1_523, all_253_2_524, all_253_3_525 yields:
% 50.76/18.16 | (639) intruder_message(all_143_3_356) = all_253_3_525 & intruder_message(all_143_4_357) = all_253_0_522 & intruder_message(all_13_8_54) = all_253_1_523 & intruder_message(b) = all_253_2_524 & ( ~ (all_253_3_525 = 0) | (all_253_0_522 = 0 & all_253_1_523 = 0 & all_253_2_524 = 0))
% 50.76/18.16 |
% 50.76/18.16 | Applying alpha-rule on (639) yields:
% 50.76/18.16 | (640) intruder_message(all_143_3_356) = all_253_3_525
% 50.76/18.16 | (641) intruder_message(b) = all_253_2_524
% 50.76/18.16 | (642) intruder_message(all_13_8_54) = all_253_1_523
% 50.76/18.16 | (643) intruder_message(all_143_4_357) = all_253_0_522
% 50.76/18.16 | (644) ~ (all_253_3_525 = 0) | (all_253_0_522 = 0 & all_253_1_523 = 0 & all_253_2_524 = 0)
% 50.76/18.16 |
% 50.76/18.16 | Instantiating (600) with all_255_0_526, all_255_1_527, all_255_2_528, all_255_3_529 yields:
% 50.76/18.16 | (645) intruder_message(all_143_3_356) = all_255_0_526 & intruder_message(all_143_4_357) = all_255_1_527 & intruder_message(all_13_8_54) = all_255_2_528 & intruder_message(b) = all_255_3_529 & ( ~ (all_255_1_527 = 0) | ~ (all_255_2_528 = 0) | ~ (all_255_3_529 = 0) | all_255_0_526 = 0)
% 50.76/18.16 |
% 50.76/18.16 | Applying alpha-rule on (645) yields:
% 50.76/18.16 | (646) intruder_message(b) = all_255_3_529
% 50.76/18.16 | (647) intruder_message(all_143_4_357) = all_255_1_527
% 50.76/18.16 | (648) intruder_message(all_143_3_356) = all_255_0_526
% 50.76/18.16 | (649) ~ (all_255_1_527 = 0) | ~ (all_255_2_528 = 0) | ~ (all_255_3_529 = 0) | all_255_0_526 = 0
% 50.76/18.16 | (650) intruder_message(all_13_8_54) = all_255_2_528
% 50.76/18.16 |
% 50.76/18.16 | Instantiating (599) with all_257_0_530, all_257_1_531, all_257_2_532, all_257_3_533 yields:
% 50.76/18.16 | (651) intruder_message(all_61_3_175) = all_257_3_533 & intruder_message(all_61_4_176) = all_257_0_530 & intruder_message(all_61_7_179) = all_257_1_531 & intruder_message(b) = all_257_2_532 & ( ~ (all_257_3_533 = 0) | (all_257_0_530 = 0 & all_257_1_531 = 0 & all_257_2_532 = 0))
% 50.76/18.16 |
% 50.76/18.16 | Applying alpha-rule on (651) yields:
% 50.76/18.16 | (652) intruder_message(all_61_4_176) = all_257_0_530
% 50.76/18.16 | (653) intruder_message(all_61_3_175) = all_257_3_533
% 50.76/18.16 | (654) intruder_message(b) = all_257_2_532
% 50.76/18.16 | (655) ~ (all_257_3_533 = 0) | (all_257_0_530 = 0 & all_257_1_531 = 0 & all_257_2_532 = 0)
% 50.76/18.16 | (656) intruder_message(all_61_7_179) = all_257_1_531
% 50.76/18.16 |
% 50.76/18.16 | Instantiating (598) with all_259_0_534, all_259_1_535, all_259_2_536, all_259_3_537 yields:
% 50.76/18.16 | (657) intruder_message(all_61_3_175) = all_259_0_534 & intruder_message(all_61_4_176) = all_259_1_535 & intruder_message(all_61_7_179) = all_259_2_536 & intruder_message(b) = all_259_3_537 & ( ~ (all_259_1_535 = 0) | ~ (all_259_2_536 = 0) | ~ (all_259_3_537 = 0) | all_259_0_534 = 0)
% 50.76/18.16 |
% 50.76/18.16 | Applying alpha-rule on (657) yields:
% 50.76/18.16 | (658) ~ (all_259_1_535 = 0) | ~ (all_259_2_536 = 0) | ~ (all_259_3_537 = 0) | all_259_0_534 = 0
% 50.76/18.16 | (659) intruder_message(all_61_7_179) = all_259_2_536
% 50.76/18.16 | (660) intruder_message(all_61_4_176) = all_259_1_535
% 50.76/18.16 | (661) intruder_message(b) = all_259_3_537
% 50.76/18.16 | (662) intruder_message(all_61_3_175) = all_259_0_534
% 50.76/18.16 |
% 50.76/18.16 | Instantiating (586) with all_269_0_554, all_269_1_555, all_269_2_556, all_269_3_557, all_269_4_558, all_269_5_559, all_269_6_560, all_269_7_561, all_269_8_562, all_269_9_563 yields:
% 50.76/18.16 | (663) b_holds(all_269_1_555) = all_269_0_554 & generate_b_nonce(all_15_5_66) = all_269_8_562 & b_stored(all_269_3_557) = all_269_2_556 & encrypt(all_269_8_562, all_15_5_66) = all_269_7_561 & encrypt(all_145_5_369, bt) = all_269_9_563 & pair(all_269_9_563, all_269_7_561) = all_269_6_560 & pair(all_15_15_76, all_15_5_66) = all_269_3_557 & sent(all_15_15_76, b, all_269_6_560) = all_269_5_559 & message(all_269_5_559) = all_269_4_558 & key(all_15_5_66, all_15_15_76) = all_269_1_555 & ( ~ (all_269_2_556 = 0) | ~ (all_269_4_558 = 0) | all_269_0_554 = 0)
% 50.76/18.16 |
% 50.76/18.16 | Applying alpha-rule on (663) yields:
% 50.76/18.16 | (664) encrypt(all_269_8_562, all_15_5_66) = all_269_7_561
% 50.76/18.16 | (665) message(all_269_5_559) = all_269_4_558
% 50.76/18.16 | (666) pair(all_15_15_76, all_15_5_66) = all_269_3_557
% 50.76/18.16 | (667) key(all_15_5_66, all_15_15_76) = all_269_1_555
% 50.76/18.16 | (668) b_holds(all_269_1_555) = all_269_0_554
% 50.76/18.16 | (669) encrypt(all_145_5_369, bt) = all_269_9_563
% 50.76/18.16 | (670) generate_b_nonce(all_15_5_66) = all_269_8_562
% 50.76/18.16 | (671) sent(all_15_15_76, b, all_269_6_560) = all_269_5_559
% 50.76/18.16 | (672) pair(all_269_9_563, all_269_7_561) = all_269_6_560
% 50.76/18.16 | (673) ~ (all_269_2_556 = 0) | ~ (all_269_4_558 = 0) | all_269_0_554 = 0
% 50.76/18.16 | (674) b_stored(all_269_3_557) = all_269_2_556
% 50.76/18.16 |
% 50.76/18.16 | Instantiating (589) with all_273_0_568, all_273_1_569, all_273_2_570, all_273_3_571 yields:
% 50.76/18.16 | (675) intruder_message(all_137_5_341) = all_273_3_571 & intruder_message(all_137_6_342) = all_273_0_568 & intruder_message(all_13_7_53) = all_273_1_569 & intruder_message(all_13_9_55) = all_273_2_570 & ( ~ (all_273_3_571 = 0) | (all_273_0_568 = 0 & all_273_1_569 = 0 & all_273_2_570 = 0))
% 50.76/18.16 |
% 50.76/18.16 | Applying alpha-rule on (675) yields:
% 50.76/18.16 | (676) intruder_message(all_13_7_53) = all_273_1_569
% 50.76/18.16 | (677) intruder_message(all_137_5_341) = all_273_3_571
% 50.76/18.16 | (678) ~ (all_273_3_571 = 0) | (all_273_0_568 = 0 & all_273_1_569 = 0 & all_273_2_570 = 0)
% 50.76/18.16 | (679) intruder_message(all_137_6_342) = all_273_0_568
% 50.76/18.16 | (680) intruder_message(all_13_9_55) = all_273_2_570
% 50.76/18.16 |
% 50.76/18.16 | Instantiating (588) with all_275_0_572, all_275_1_573, all_275_2_574, all_275_3_575 yields:
% 50.76/18.16 | (681) intruder_message(all_137_5_341) = all_275_0_572 & intruder_message(all_137_6_342) = all_275_1_573 & intruder_message(all_13_7_53) = all_275_2_574 & intruder_message(all_13_9_55) = all_275_3_575 & ( ~ (all_275_1_573 = 0) | ~ (all_275_2_574 = 0) | ~ (all_275_3_575 = 0) | all_275_0_572 = 0)
% 50.76/18.16 |
% 50.76/18.16 | Applying alpha-rule on (681) yields:
% 50.76/18.16 | (682) intruder_message(all_137_5_341) = all_275_0_572
% 50.76/18.16 | (683) intruder_message(all_137_6_342) = all_275_1_573
% 50.76/18.16 | (684) intruder_message(all_13_7_53) = all_275_2_574
% 50.76/18.16 | (685) ~ (all_275_1_573 = 0) | ~ (all_275_2_574 = 0) | ~ (all_275_3_575 = 0) | all_275_0_572 = 0
% 50.76/18.16 | (686) intruder_message(all_13_9_55) = all_275_3_575
% 50.76/18.16 |
% 50.76/18.16 | Instantiating (587) with all_277_0_576, all_277_1_577, all_277_2_578, all_277_3_579, all_277_4_580, all_277_5_581, all_277_6_582, all_277_7_583, all_277_8_584, all_277_9_585 yields:
% 50.76/18.16 | (687) b_holds(all_277_1_577) = all_277_0_576 & generate_b_nonce(all_13_7_53) = all_277_8_584 & b_stored(all_277_3_579) = all_277_2_578 & encrypt(all_277_8_584, all_13_7_53) = all_277_7_583 & encrypt(all_137_5_341, bt) = all_277_9_585 & pair(all_277_9_585, all_277_7_583) = all_277_6_582 & pair(all_13_9_55, all_13_7_53) = all_277_3_579 & sent(all_13_9_55, b, all_277_6_582) = all_277_5_581 & message(all_277_5_581) = all_277_4_580 & key(all_13_7_53, all_13_9_55) = all_277_1_577 & ( ~ (all_277_2_578 = 0) | ~ (all_277_4_580 = 0) | all_277_0_576 = 0)
% 50.76/18.16 |
% 50.76/18.16 | Applying alpha-rule on (687) yields:
% 50.76/18.16 | (688) encrypt(all_277_8_584, all_13_7_53) = all_277_7_583
% 50.76/18.16 | (689) pair(all_13_9_55, all_13_7_53) = all_277_3_579
% 50.76/18.16 | (690) key(all_13_7_53, all_13_9_55) = all_277_1_577
% 50.76/18.16 | (691) ~ (all_277_2_578 = 0) | ~ (all_277_4_580 = 0) | all_277_0_576 = 0
% 50.76/18.16 | (692) generate_b_nonce(all_13_7_53) = all_277_8_584
% 50.76/18.16 | (693) sent(all_13_9_55, b, all_277_6_582) = all_277_5_581
% 50.76/18.16 | (694) b_stored(all_277_3_579) = all_277_2_578
% 50.76/18.16 | (695) pair(all_277_9_585, all_277_7_583) = all_277_6_582
% 50.76/18.16 | (696) message(all_277_5_581) = all_277_4_580
% 50.76/18.16 | (697) encrypt(all_137_5_341, bt) = all_277_9_585
% 50.76/18.16 | (698) b_holds(all_277_1_577) = all_277_0_576
% 50.76/18.16 |
% 50.76/18.16 | Instantiating (585) with all_281_0_596, all_281_1_597, all_281_2_598, all_281_3_599, all_281_4_600, all_281_5_601, all_281_6_602, all_281_7_603, all_281_8_604, all_281_9_605 yields:
% 50.76/18.16 | (699) b_holds(all_281_1_597) = all_281_0_596 & generate_b_nonce(all_15_13_74) = all_281_8_604 & b_stored(all_281_3_599) = all_281_2_598 & encrypt(all_281_8_604, all_15_13_74) = all_281_7_603 & encrypt(all_149_5_383, bt) = all_281_9_605 & pair(all_281_9_605, all_281_7_603) = all_281_6_602 & pair(all_15_14_75, all_15_13_74) = all_281_3_599 & sent(all_15_14_75, b, all_281_6_602) = all_281_5_601 & message(all_281_5_601) = all_281_4_600 & key(all_15_13_74, all_15_14_75) = all_281_1_597 & ( ~ (all_281_2_598 = 0) | ~ (all_281_4_600 = 0) | all_281_0_596 = 0)
% 50.76/18.17 |
% 50.76/18.17 | Applying alpha-rule on (699) yields:
% 50.76/18.17 | (700) b_stored(all_281_3_599) = all_281_2_598
% 50.76/18.17 | (701) sent(all_15_14_75, b, all_281_6_602) = all_281_5_601
% 50.76/18.17 | (702) pair(all_281_9_605, all_281_7_603) = all_281_6_602
% 50.76/18.17 | (703) generate_b_nonce(all_15_13_74) = all_281_8_604
% 50.76/18.17 | (704) pair(all_15_14_75, all_15_13_74) = all_281_3_599
% 50.76/18.17 | (705) message(all_281_5_601) = all_281_4_600
% 50.76/18.17 | (706) ~ (all_281_2_598 = 0) | ~ (all_281_4_600 = 0) | all_281_0_596 = 0
% 50.76/18.17 | (707) key(all_15_13_74, all_15_14_75) = all_281_1_597
% 50.76/18.17 | (708) encrypt(all_149_5_383, bt) = all_281_9_605
% 50.76/18.17 | (709) encrypt(all_281_8_604, all_15_13_74) = all_281_7_603
% 50.76/18.17 | (710) b_holds(all_281_1_597) = all_281_0_596
% 50.76/18.17 |
% 50.76/18.17 | Instantiating (603) with all_285_0_616, all_285_1_617, all_285_2_618, all_285_3_619, all_285_4_620, all_285_5_621, all_285_6_622, all_285_7_623, all_285_8_624, all_285_9_625 yields:
% 50.76/18.17 | (711) b_holds(all_285_1_617) = all_285_0_616 & generate_b_nonce(an_a_nonce) = all_285_8_624 & b_stored(all_285_3_619) = all_285_2_618 & encrypt(all_285_8_624, an_a_nonce) = all_285_7_623 & encrypt(all_63_5_188, bt) = all_285_9_625 & pair(all_285_9_625, all_285_7_623) = all_285_6_622 & pair(b, an_a_nonce) = all_285_3_619 & sent(b, b, all_285_6_622) = all_285_5_621 & message(all_285_5_621) = all_285_4_620 & key(an_a_nonce, b) = all_285_1_617 & ( ~ (all_285_2_618 = 0) | ~ (all_285_4_620 = 0) | all_285_0_616 = 0)
% 50.76/18.17 |
% 50.76/18.17 | Applying alpha-rule on (711) yields:
% 50.76/18.17 | (712) encrypt(all_285_8_624, an_a_nonce) = all_285_7_623
% 50.76/18.17 | (713) b_holds(all_285_1_617) = all_285_0_616
% 50.76/18.17 | (714) b_stored(all_285_3_619) = all_285_2_618
% 50.76/18.17 | (715) encrypt(all_63_5_188, bt) = all_285_9_625
% 50.76/18.17 | (716) key(an_a_nonce, b) = all_285_1_617
% 50.76/18.17 | (717) pair(all_285_9_625, all_285_7_623) = all_285_6_622
% 50.76/18.17 | (718) sent(b, b, all_285_6_622) = all_285_5_621
% 50.76/18.17 | (719) pair(b, an_a_nonce) = all_285_3_619
% 50.76/18.17 | (720) message(all_285_5_621) = all_285_4_620
% 50.76/18.17 | (721) ~ (all_285_2_618 = 0) | ~ (all_285_4_620 = 0) | all_285_0_616 = 0
% 50.76/18.17 | (722) generate_b_nonce(an_a_nonce) = all_285_8_624
% 50.76/18.17 |
% 50.76/18.17 | Instantiating (602) with all_287_0_626, all_287_1_627, all_287_2_628, all_287_3_629, all_287_4_630, all_287_5_631, all_287_6_632, all_287_7_633, all_287_8_634, all_287_9_635 yields:
% 50.76/18.17 | (723) fresh_to_b(an_a_nonce) = all_287_6_632 & generate_b_nonce(an_a_nonce) = all_287_5_631 & b_stored(all_287_9_635) = all_287_0_626 & triple(b, all_287_5_631, all_287_4_630) = all_287_3_629 & encrypt(all_63_5_188, bt) = all_287_4_630 & pair(b, an_a_nonce) = all_287_9_635 & sent(b, b, all_287_9_635) = all_287_8_634 & sent(b, t, all_287_3_629) = all_287_2_628 & message(all_287_2_628) = all_287_1_627 & message(all_287_8_634) = all_287_7_633 & ( ~ (all_287_6_632 = 0) | ~ (all_287_7_633 = 0) | (all_287_0_626 = 0 & all_287_1_627 = 0))
% 50.76/18.17 |
% 50.76/18.17 | Applying alpha-rule on (723) yields:
% 50.76/18.17 | (724) triple(b, all_287_5_631, all_287_4_630) = all_287_3_629
% 50.76/18.17 | (725) pair(b, an_a_nonce) = all_287_9_635
% 50.76/18.17 | (726) encrypt(all_63_5_188, bt) = all_287_4_630
% 50.76/18.17 | (727) ~ (all_287_6_632 = 0) | ~ (all_287_7_633 = 0) | (all_287_0_626 = 0 & all_287_1_627 = 0)
% 50.76/18.17 | (728) message(all_287_8_634) = all_287_7_633
% 50.76/18.17 | (729) sent(b, t, all_287_3_629) = all_287_2_628
% 50.76/18.17 | (730) sent(b, b, all_287_9_635) = all_287_8_634
% 50.76/18.17 | (731) fresh_to_b(an_a_nonce) = all_287_6_632
% 50.76/18.17 | (732) message(all_287_2_628) = all_287_1_627
% 50.76/18.17 | (733) b_stored(all_287_9_635) = all_287_0_626
% 50.76/18.17 | (734) generate_b_nonce(an_a_nonce) = all_287_5_631
% 50.76/18.17 |
% 50.76/18.17 | Instantiating (626) with all_289_0_636, all_289_1_637, all_289_2_638 yields:
% 50.76/18.17 | (735) intruder_holds(all_103_2_261) = all_289_0_636 & party_of_protocol(b) = all_289_1_637 & intruder_message(at) = all_289_2_638 & ( ~ (all_289_1_637 = 0) | ~ (all_289_2_638 = 0) | all_289_0_636 = 0)
% 50.76/18.17 |
% 50.76/18.17 | Applying alpha-rule on (735) yields:
% 50.76/18.17 | (736) intruder_holds(all_103_2_261) = all_289_0_636
% 50.76/18.17 | (737) party_of_protocol(b) = all_289_1_637
% 50.76/18.17 | (738) intruder_message(at) = all_289_2_638
% 50.76/18.17 | (739) ~ (all_289_1_637 = 0) | ~ (all_289_2_638 = 0) | all_289_0_636 = 0
% 50.76/18.17 |
% 50.76/18.17 | Instantiating (625) with all_293_0_642, all_293_1_643, all_293_2_644 yields:
% 50.76/18.17 | (740) intruder_holds(all_109_1_268) = all_293_0_642 & party_of_protocol(a) = all_293_1_643 & intruder_message(bt) = all_293_2_644 & ( ~ (all_293_1_643 = 0) | ~ (all_293_2_644 = 0) | all_293_0_642 = 0)
% 50.76/18.17 |
% 50.76/18.17 | Applying alpha-rule on (740) yields:
% 50.76/18.17 | (741) intruder_holds(all_109_1_268) = all_293_0_642
% 50.76/18.17 | (742) party_of_protocol(a) = all_293_1_643
% 50.76/18.17 | (743) intruder_message(bt) = all_293_2_644
% 50.76/18.17 | (744) ~ (all_293_1_643 = 0) | ~ (all_293_2_644 = 0) | all_293_0_642 = 0
% 50.76/18.17 |
% 50.76/18.17 | Instantiating (597) with all_295_0_645, all_295_1_646, all_295_2_647, all_295_3_648 yields:
% 50.76/18.17 | (745) intruder_message(all_63_3_186) = all_295_3_648 & intruder_message(all_63_4_187) = all_295_0_645 & intruder_message(all_61_7_179) = all_295_1_646 & intruder_message(b) = all_295_2_647 & ( ~ (all_295_3_648 = 0) | (all_295_0_645 = 0 & all_295_1_646 = 0 & all_295_2_647 = 0))
% 50.76/18.17 |
% 50.76/18.17 | Applying alpha-rule on (745) yields:
% 50.76/18.17 | (746) intruder_message(all_61_7_179) = all_295_1_646
% 50.76/18.17 | (747) intruder_message(b) = all_295_2_647
% 50.76/18.17 | (748) ~ (all_295_3_648 = 0) | (all_295_0_645 = 0 & all_295_1_646 = 0 & all_295_2_647 = 0)
% 50.76/18.17 | (749) intruder_message(all_63_3_186) = all_295_3_648
% 50.76/18.17 | (750) intruder_message(all_63_4_187) = all_295_0_645
% 50.76/18.17 |
% 50.76/18.17 | Instantiating (595) with all_297_0_649, all_297_1_650, all_297_2_651, all_297_3_652 yields:
% 50.76/18.17 | (751) intruder_message(all_137_3_339) = all_297_3_652 & intruder_message(all_137_4_340) = all_297_0_649 & intruder_message(all_137_7_343) = all_297_1_650 & intruder_message(b) = all_297_2_651 & ( ~ (all_297_3_652 = 0) | (all_297_0_649 = 0 & all_297_1_650 = 0 & all_297_2_651 = 0))
% 50.76/18.17 |
% 50.76/18.17 | Applying alpha-rule on (751) yields:
% 50.76/18.17 | (752) intruder_message(all_137_7_343) = all_297_1_650
% 50.76/18.17 | (753) intruder_message(all_137_4_340) = all_297_0_649
% 50.76/18.17 | (754) intruder_message(all_137_3_339) = all_297_3_652
% 50.76/18.17 | (755) ~ (all_297_3_652 = 0) | (all_297_0_649 = 0 & all_297_1_650 = 0 & all_297_2_651 = 0)
% 50.76/18.17 | (756) intruder_message(b) = all_297_2_651
% 50.76/18.17 |
% 50.76/18.17 | Instantiating (622) with all_303_0_659, all_303_1_660 yields:
% 50.76/18.17 | (757) intruder_message(all_63_3_186) = all_303_0_659 & message(all_63_2_185) = all_303_1_660 & ( ~ (all_303_1_660 = 0) | all_303_0_659 = 0)
% 50.76/18.17 |
% 50.76/18.17 | Applying alpha-rule on (757) yields:
% 50.76/18.17 | (758) intruder_message(all_63_3_186) = all_303_0_659
% 50.76/18.17 | (759) message(all_63_2_185) = all_303_1_660
% 50.76/18.17 | (760) ~ (all_303_1_660 = 0) | all_303_0_659 = 0
% 50.76/18.17 |
% 50.76/18.17 | Instantiating (621) with all_305_0_661, all_305_1_662, all_305_2_663, all_305_3_664 yields:
% 50.76/18.17 | (761) party_of_protocol(b) = all_305_2_663 & party_of_protocol(t) = all_305_1_662 & intruder_message(all_63_3_186) = all_305_3_664 & message(all_63_2_185) = all_305_0_661 & ( ~ (all_305_1_662 = 0) | ~ (all_305_2_663 = 0) | ~ (all_305_3_664 = 0) | all_305_0_661 = 0)
% 50.76/18.17 |
% 50.76/18.17 | Applying alpha-rule on (761) yields:
% 50.76/18.17 | (762) message(all_63_2_185) = all_305_0_661
% 50.76/18.17 | (763) party_of_protocol(t) = all_305_1_662
% 50.76/18.17 | (764) ~ (all_305_1_662 = 0) | ~ (all_305_2_663 = 0) | ~ (all_305_3_664 = 0) | all_305_0_661 = 0
% 50.76/18.17 | (765) intruder_message(all_63_3_186) = all_305_3_664
% 50.76/18.17 | (766) party_of_protocol(b) = all_305_2_663
% 50.76/18.17 |
% 50.76/18.17 | Instantiating (624) with all_309_0_667, all_309_1_668 yields:
% 50.76/18.17 | (767) intruder_message(all_61_3_175) = all_309_0_667 & message(all_61_2_174) = all_309_1_668 & ( ~ (all_309_1_668 = 0) | all_309_0_667 = 0)
% 50.76/18.17 |
% 50.76/18.17 | Applying alpha-rule on (767) yields:
% 50.76/18.17 | (768) intruder_message(all_61_3_175) = all_309_0_667
% 50.76/18.17 | (769) message(all_61_2_174) = all_309_1_668
% 50.76/18.17 | (770) ~ (all_309_1_668 = 0) | all_309_0_667 = 0
% 50.76/18.17 |
% 50.76/18.17 | Instantiating (594) with all_315_0_673, all_315_1_674, all_315_2_675, all_315_3_676 yields:
% 50.76/18.17 | (771) intruder_message(all_137_3_339) = all_315_0_673 & intruder_message(all_137_4_340) = all_315_1_674 & intruder_message(all_137_7_343) = all_315_2_675 & intruder_message(b) = all_315_3_676 & ( ~ (all_315_1_674 = 0) | ~ (all_315_2_675 = 0) | ~ (all_315_3_676 = 0) | all_315_0_673 = 0)
% 50.76/18.17 |
% 50.76/18.17 | Applying alpha-rule on (771) yields:
% 50.76/18.17 | (772) ~ (all_315_1_674 = 0) | ~ (all_315_2_675 = 0) | ~ (all_315_3_676 = 0) | all_315_0_673 = 0
% 50.76/18.17 | (773) intruder_message(all_137_4_340) = all_315_1_674
% 50.76/18.17 | (774) intruder_message(all_137_3_339) = all_315_0_673
% 50.76/18.17 | (775) intruder_message(b) = all_315_3_676
% 50.76/18.17 | (776) intruder_message(all_137_7_343) = all_315_2_675
% 50.76/18.17 |
% 50.76/18.17 | Instantiating (596) with all_317_0_677, all_317_1_678, all_317_2_679, all_317_3_680 yields:
% 50.76/18.17 | (777) intruder_message(all_63_3_186) = all_317_0_677 & intruder_message(all_63_4_187) = all_317_1_678 & intruder_message(all_61_7_179) = all_317_2_679 & intruder_message(b) = all_317_3_680 & ( ~ (all_317_1_678 = 0) | ~ (all_317_2_679 = 0) | ~ (all_317_3_680 = 0) | all_317_0_677 = 0)
% 50.76/18.17 |
% 50.76/18.17 | Applying alpha-rule on (777) yields:
% 50.76/18.17 | (778) ~ (all_317_1_678 = 0) | ~ (all_317_2_679 = 0) | ~ (all_317_3_680 = 0) | all_317_0_677 = 0
% 50.76/18.17 | (779) intruder_message(all_61_7_179) = all_317_2_679
% 50.76/18.17 | (780) intruder_message(all_63_3_186) = all_317_0_677
% 50.76/18.17 | (781) intruder_message(all_63_4_187) = all_317_1_678
% 50.76/18.17 | (782) intruder_message(b) = all_317_3_680
% 50.76/18.17 |
% 50.76/18.17 | Instantiating (584) with all_319_0_681, all_319_1_682, all_319_2_683, all_319_3_684, all_319_4_685, all_319_5_686, all_319_6_687, all_319_7_688, all_319_8_689, all_319_9_690 yields:
% 50.76/18.17 | (783) fresh_to_b(all_15_13_74) = all_319_6_687 & generate_b_nonce(all_15_13_74) = all_319_5_686 & b_stored(all_319_9_690) = all_319_0_681 & triple(b, all_319_5_686, all_319_4_685) = all_319_3_684 & encrypt(all_149_5_383, bt) = all_319_4_685 & pair(all_15_14_75, all_15_13_74) = all_319_9_690 & sent(all_15_14_75, b, all_319_9_690) = all_319_8_689 & sent(b, t, all_319_3_684) = all_319_2_683 & message(all_319_2_683) = all_319_1_682 & message(all_319_8_689) = all_319_7_688 & ( ~ (all_319_6_687 = 0) | ~ (all_319_7_688 = 0) | (all_319_0_681 = 0 & all_319_1_682 = 0))
% 50.76/18.17 |
% 50.76/18.17 | Applying alpha-rule on (783) yields:
% 50.76/18.17 | (784) message(all_319_8_689) = all_319_7_688
% 50.76/18.17 | (785) sent(all_15_14_75, b, all_319_9_690) = all_319_8_689
% 50.76/18.18 | (786) pair(all_15_14_75, all_15_13_74) = all_319_9_690
% 50.76/18.18 | (787) sent(b, t, all_319_3_684) = all_319_2_683
% 50.76/18.18 | (788) fresh_to_b(all_15_13_74) = all_319_6_687
% 50.76/18.18 | (789) generate_b_nonce(all_15_13_74) = all_319_5_686
% 50.76/18.18 | (790) b_stored(all_319_9_690) = all_319_0_681
% 50.76/18.18 | (791) encrypt(all_149_5_383, bt) = all_319_4_685
% 50.76/18.18 | (792) triple(b, all_319_5_686, all_319_4_685) = all_319_3_684
% 50.76/18.18 | (793) ~ (all_319_6_687 = 0) | ~ (all_319_7_688 = 0) | (all_319_0_681 = 0 & all_319_1_682 = 0)
% 50.76/18.18 | (794) message(all_319_2_683) = all_319_1_682
% 50.76/18.18 |
% 50.76/18.18 | Instantiating (593) with all_321_0_691, all_321_1_692, all_321_2_693, all_321_3_694 yields:
% 50.76/18.18 | (795) intruder_message(all_145_3_367) = all_321_3_694 & intruder_message(all_145_4_368) = all_321_0_691 & intruder_message(all_145_7_371) = all_321_1_692 & intruder_message(b) = all_321_2_693 & ( ~ (all_321_3_694 = 0) | (all_321_0_691 = 0 & all_321_1_692 = 0 & all_321_2_693 = 0))
% 50.76/18.18 |
% 50.76/18.18 | Applying alpha-rule on (795) yields:
% 50.76/18.18 | (796) intruder_message(all_145_4_368) = all_321_0_691
% 50.76/18.18 | (797) intruder_message(b) = all_321_2_693
% 50.76/18.18 | (798) intruder_message(all_145_3_367) = all_321_3_694
% 50.76/18.18 | (799) intruder_message(all_145_7_371) = all_321_1_692
% 50.76/18.18 | (800) ~ (all_321_3_694 = 0) | (all_321_0_691 = 0 & all_321_1_692 = 0 & all_321_2_693 = 0)
% 50.76/18.18 |
% 50.76/18.18 | Instantiating (592) with all_323_0_695, all_323_1_696, all_323_2_697, all_323_3_698 yields:
% 50.76/18.18 | (801) intruder_message(all_145_3_367) = all_323_0_695 & intruder_message(all_145_4_368) = all_323_1_696 & intruder_message(all_145_7_371) = all_323_2_697 & intruder_message(b) = all_323_3_698 & ( ~ (all_323_1_696 = 0) | ~ (all_323_2_697 = 0) | ~ (all_323_3_698 = 0) | all_323_0_695 = 0)
% 50.76/18.18 |
% 50.76/18.18 | Applying alpha-rule on (801) yields:
% 50.76/18.18 | (802) intruder_message(all_145_3_367) = all_323_0_695
% 50.76/18.18 | (803) intruder_message(all_145_7_371) = all_323_2_697
% 50.76/18.18 | (804) ~ (all_323_1_696 = 0) | ~ (all_323_2_697 = 0) | ~ (all_323_3_698 = 0) | all_323_0_695 = 0
% 50.76/18.18 | (805) intruder_message(b) = all_323_3_698
% 50.76/18.18 | (806) intruder_message(all_145_4_368) = all_323_1_696
% 50.76/18.18 |
% 50.76/18.18 | Instantiating (591) with all_325_0_699, all_325_1_700, all_325_2_701, all_325_3_702 yields:
% 50.76/18.18 | (807) intruder_message(all_149_3_381) = all_325_3_702 & intruder_message(all_149_4_382) = all_325_0_699 & intruder_message(all_149_7_385) = all_325_1_700 & intruder_message(b) = all_325_2_701 & ( ~ (all_325_3_702 = 0) | (all_325_0_699 = 0 & all_325_1_700 = 0 & all_325_2_701 = 0))
% 50.76/18.18 |
% 50.76/18.18 | Applying alpha-rule on (807) yields:
% 50.76/18.18 | (808) ~ (all_325_3_702 = 0) | (all_325_0_699 = 0 & all_325_1_700 = 0 & all_325_2_701 = 0)
% 50.76/18.18 | (809) intruder_message(all_149_3_381) = all_325_3_702
% 50.76/18.18 | (810) intruder_message(b) = all_325_2_701
% 50.76/18.18 | (811) intruder_message(all_149_7_385) = all_325_1_700
% 50.76/18.18 | (812) intruder_message(all_149_4_382) = all_325_0_699
% 50.76/18.18 |
% 50.76/18.18 | Instantiating (590) with all_327_0_703, all_327_1_704, all_327_2_705, all_327_3_706 yields:
% 50.76/18.18 | (813) intruder_message(all_149_3_381) = all_327_0_703 & intruder_message(all_149_4_382) = all_327_1_704 & intruder_message(all_149_7_385) = all_327_2_705 & intruder_message(b) = all_327_3_706 & ( ~ (all_327_1_704 = 0) | ~ (all_327_2_705 = 0) | ~ (all_327_3_706 = 0) | all_327_0_703 = 0)
% 50.76/18.18 |
% 50.76/18.18 | Applying alpha-rule on (813) yields:
% 50.76/18.18 | (814) intruder_message(all_149_3_381) = all_327_0_703
% 50.76/18.18 | (815) intruder_message(all_149_7_385) = all_327_2_705
% 50.76/18.18 | (816) ~ (all_327_1_704 = 0) | ~ (all_327_2_705 = 0) | ~ (all_327_3_706 = 0) | all_327_0_703 = 0
% 50.76/18.18 | (817) intruder_message(b) = all_327_3_706
% 50.76/18.18 | (818) intruder_message(all_149_4_382) = all_327_1_704
% 50.76/18.18 |
% 50.76/18.18 | Instantiating (618) with all_329_0_707, all_329_1_708, all_329_2_709, all_329_3_710 yields:
% 50.76/18.18 | (819) party_of_protocol(b) = all_329_2_709 & party_of_protocol(t) = all_329_1_708 & intruder_message(all_145_3_367) = all_329_3_710 & message(all_145_2_366) = all_329_0_707 & ( ~ (all_329_1_708 = 0) | ~ (all_329_2_709 = 0) | ~ (all_329_3_710 = 0) | all_329_0_707 = 0)
% 50.76/18.18 |
% 50.76/18.18 | Applying alpha-rule on (819) yields:
% 50.76/18.18 | (820) party_of_protocol(t) = all_329_1_708
% 50.76/18.18 | (821) party_of_protocol(b) = all_329_2_709
% 50.76/18.18 | (822) message(all_145_2_366) = all_329_0_707
% 50.76/18.18 | (823) intruder_message(all_145_3_367) = all_329_3_710
% 50.76/18.18 | (824) ~ (all_329_1_708 = 0) | ~ (all_329_2_709 = 0) | ~ (all_329_3_710 = 0) | all_329_0_707 = 0
% 50.76/18.18 |
% 50.76/18.18 | Instantiating (619) with all_331_0_711, all_331_1_712, all_331_2_713, all_331_3_714 yields:
% 50.76/18.18 | (825) party_of_protocol(b) = all_331_2_713 & party_of_protocol(t) = all_331_1_712 & intruder_message(all_143_3_356) = all_331_3_714 & message(all_143_2_355) = all_331_0_711 & ( ~ (all_331_1_712 = 0) | ~ (all_331_2_713 = 0) | ~ (all_331_3_714 = 0) | all_331_0_711 = 0)
% 50.76/18.18 |
% 50.76/18.18 | Applying alpha-rule on (825) yields:
% 50.76/18.18 | (826) party_of_protocol(b) = all_331_2_713
% 50.76/18.18 | (827) message(all_143_2_355) = all_331_0_711
% 50.76/18.18 | (828) ~ (all_331_1_712 = 0) | ~ (all_331_2_713 = 0) | ~ (all_331_3_714 = 0) | all_331_0_711 = 0
% 50.76/18.18 | (829) intruder_message(all_143_3_356) = all_331_3_714
% 50.76/18.18 | (830) party_of_protocol(t) = all_331_1_712
% 50.76/18.18 |
% 50.76/18.18 | Instantiating (620) with all_333_0_715, all_333_1_716, all_333_2_717, all_333_3_718 yields:
% 50.76/18.18 | (831) party_of_protocol(b) = all_333_2_717 & party_of_protocol(t) = all_333_1_716 & intruder_message(all_137_3_339) = all_333_3_718 & message(all_137_2_338) = all_333_0_715 & ( ~ (all_333_1_716 = 0) | ~ (all_333_2_717 = 0) | ~ (all_333_3_718 = 0) | all_333_0_715 = 0)
% 50.76/18.18 |
% 50.76/18.18 | Applying alpha-rule on (831) yields:
% 50.76/18.18 | (832) ~ (all_333_1_716 = 0) | ~ (all_333_2_717 = 0) | ~ (all_333_3_718 = 0) | all_333_0_715 = 0
% 50.76/18.18 | (833) intruder_message(all_137_3_339) = all_333_3_718
% 50.76/18.18 | (834) party_of_protocol(b) = all_333_2_717
% 50.76/18.18 | (835) party_of_protocol(t) = all_333_1_716
% 50.76/18.18 | (836) message(all_137_2_338) = all_333_0_715
% 50.76/18.18 |
% 50.76/18.18 | Instantiating (613) with all_339_0_723, all_339_1_724, all_339_2_725, all_339_3_726 yields:
% 50.76/18.18 | (837) party_of_protocol(all_13_13_59) = all_339_2_725 & party_of_protocol(b) = all_339_1_724 & intruder_message(all_13_3_49) = all_339_3_726 & message(all_143_10_363) = all_339_0_723 & ( ~ (all_339_1_724 = 0) | ~ (all_339_2_725 = 0) | ~ (all_339_3_726 = 0) | all_339_0_723 = 0)
% 50.76/18.18 |
% 50.76/18.18 | Applying alpha-rule on (837) yields:
% 50.76/18.18 | (838) ~ (all_339_1_724 = 0) | ~ (all_339_2_725 = 0) | ~ (all_339_3_726 = 0) | all_339_0_723 = 0
% 50.76/18.18 | (839) message(all_143_10_363) = all_339_0_723
% 50.76/18.18 | (840) intruder_message(all_13_3_49) = all_339_3_726
% 50.76/18.18 | (841) party_of_protocol(b) = all_339_1_724
% 50.76/18.18 | (842) party_of_protocol(all_13_13_59) = all_339_2_725
% 50.76/18.18 |
% 50.76/18.18 | Instantiating (610) with all_343_0_729, all_343_1_730, all_343_2_731, all_343_3_732 yields:
% 50.76/18.18 | (843) party_of_protocol(all_15_14_75) = all_343_2_731 & party_of_protocol(b) = all_343_1_730 & intruder_message(all_15_7_68) = all_343_3_732 & message(all_149_10_388) = all_343_0_729 & ( ~ (all_343_1_730 = 0) | ~ (all_343_2_731 = 0) | ~ (all_343_3_732 = 0) | all_343_0_729 = 0)
% 50.76/18.18 |
% 50.76/18.18 | Applying alpha-rule on (843) yields:
% 50.76/18.18 | (844) intruder_message(all_15_7_68) = all_343_3_732
% 50.76/18.18 | (845) party_of_protocol(b) = all_343_1_730
% 50.76/18.18 | (846) ~ (all_343_1_730 = 0) | ~ (all_343_2_731 = 0) | ~ (all_343_3_732 = 0) | all_343_0_729 = 0
% 50.76/18.18 | (847) party_of_protocol(all_15_14_75) = all_343_2_731
% 50.76/18.18 | (848) message(all_149_10_388) = all_343_0_729
% 50.76/18.18 |
% 50.76/18.18 | Instantiating (614) with all_347_0_736, all_347_1_737, all_347_2_738, all_347_3_739 yields:
% 50.76/18.18 | (849) party_of_protocol(all_11_13_45) = all_347_2_738 & party_of_protocol(b) = all_347_1_737 & intruder_message(all_131_6_319) = all_347_3_739 & message(all_131_5_318) = all_347_0_736 & ( ~ (all_347_1_737 = 0) | ~ (all_347_2_738 = 0) | ~ (all_347_3_739 = 0) | all_347_0_736 = 0)
% 50.76/18.18 |
% 50.76/18.18 | Applying alpha-rule on (849) yields:
% 50.76/18.18 | (850) party_of_protocol(b) = all_347_1_737
% 50.76/18.18 | (851) party_of_protocol(all_11_13_45) = all_347_2_738
% 50.76/18.18 | (852) intruder_message(all_131_6_319) = all_347_3_739
% 50.76/18.18 | (853) message(all_131_5_318) = all_347_0_736
% 50.76/18.18 | (854) ~ (all_347_1_737 = 0) | ~ (all_347_2_738 = 0) | ~ (all_347_3_739 = 0) | all_347_0_736 = 0
% 50.76/18.18 |
% 50.76/18.18 | Instantiating (612) with all_351_0_742, all_351_1_743, all_351_2_744, all_351_3_745 yields:
% 50.76/18.18 | (855) party_of_protocol(all_13_9_55) = all_351_2_744 & party_of_protocol(b) = all_351_1_743 & intruder_message(all_13_6_52) = all_351_3_745 & message(all_137_10_346) = all_351_0_742 & ( ~ (all_351_1_743 = 0) | ~ (all_351_2_744 = 0) | ~ (all_351_3_745 = 0) | all_351_0_742 = 0)
% 50.76/18.18 |
% 50.76/18.18 | Applying alpha-rule on (855) yields:
% 50.76/18.18 | (856) ~ (all_351_1_743 = 0) | ~ (all_351_2_744 = 0) | ~ (all_351_3_745 = 0) | all_351_0_742 = 0
% 50.76/18.18 | (857) intruder_message(all_13_6_52) = all_351_3_745
% 50.76/18.18 | (858) message(all_137_10_346) = all_351_0_742
% 50.76/18.18 | (859) party_of_protocol(b) = all_351_1_743
% 50.76/18.18 | (860) party_of_protocol(all_13_9_55) = all_351_2_744
% 50.76/18.18 |
% 50.76/18.18 | Instantiating (611) with all_355_0_748, all_355_1_749, all_355_2_750, all_355_3_751 yields:
% 50.76/18.18 | (861) party_of_protocol(all_15_15_76) = all_355_2_750 & party_of_protocol(b) = all_355_1_749 & intruder_message(all_15_4_65) = all_355_3_751 & message(all_145_10_374) = all_355_0_748 & ( ~ (all_355_1_749 = 0) | ~ (all_355_2_750 = 0) | ~ (all_355_3_751 = 0) | all_355_0_748 = 0)
% 50.76/18.18 |
% 50.76/18.18 | Applying alpha-rule on (861) yields:
% 50.76/18.18 | (862) party_of_protocol(all_15_15_76) = all_355_2_750
% 50.76/18.18 | (863) party_of_protocol(b) = all_355_1_749
% 50.76/18.18 | (864) message(all_145_10_374) = all_355_0_748
% 50.76/18.18 | (865) ~ (all_355_1_749 = 0) | ~ (all_355_2_750 = 0) | ~ (all_355_3_751 = 0) | all_355_0_748 = 0
% 50.76/18.18 | (866) intruder_message(all_15_4_65) = all_355_3_751
% 50.76/18.18 |
% 50.76/18.18 | Instantiating (617) with all_359_0_754, all_359_1_755, all_359_2_756, all_359_3_757 yields:
% 50.76/18.18 | (867) party_of_protocol(b) = all_359_2_756 & party_of_protocol(t) = all_359_1_755 & intruder_message(all_149_3_381) = all_359_3_757 & message(all_149_2_380) = all_359_0_754 & ( ~ (all_359_1_755 = 0) | ~ (all_359_2_756 = 0) | ~ (all_359_3_757 = 0) | all_359_0_754 = 0)
% 50.76/18.18 |
% 50.76/18.18 | Applying alpha-rule on (867) yields:
% 50.76/18.18 | (868) message(all_149_2_380) = all_359_0_754
% 50.76/18.18 | (869) ~ (all_359_1_755 = 0) | ~ (all_359_2_756 = 0) | ~ (all_359_3_757 = 0) | all_359_0_754 = 0
% 50.76/18.18 | (870) party_of_protocol(t) = all_359_1_755
% 50.76/18.18 | (871) intruder_message(all_149_3_381) = all_359_3_757
% 50.76/18.18 | (872) party_of_protocol(b) = all_359_2_756
% 50.76/18.18 |
% 50.76/18.18 | Instantiating (616) with all_361_0_758, all_361_1_759 yields:
% 50.76/18.18 | (873) intruder_message(all_0_3_3) = all_361_0_758 & message(all_63_10_193) = all_361_1_759 & ( ~ (all_361_1_759 = 0) | all_361_0_758 = 0)
% 50.76/18.19 |
% 50.76/18.19 | Applying alpha-rule on (873) yields:
% 50.76/18.19 | (874) intruder_message(all_0_3_3) = all_361_0_758
% 50.76/18.19 | (875) message(all_63_10_193) = all_361_1_759
% 50.76/18.19 | (876) ~ (all_361_1_759 = 0) | all_361_0_758 = 0
% 50.76/18.19 |
% 50.76/18.19 | Instantiating (615) with all_363_0_760, all_363_1_761, all_363_2_762, all_363_3_763 yields:
% 50.76/18.19 | (877) party_of_protocol(b) = all_363_1_761 & party_of_protocol(b) = all_363_2_762 & intruder_message(all_0_3_3) = all_363_3_763 & message(all_63_10_193) = all_363_0_760 & ( ~ (all_363_1_761 = 0) | ~ (all_363_2_762 = 0) | ~ (all_363_3_763 = 0) | all_363_0_760 = 0)
% 50.76/18.19 |
% 50.76/18.19 | Applying alpha-rule on (877) yields:
% 50.76/18.19 | (878) party_of_protocol(b) = all_363_2_762
% 50.76/18.19 | (879) intruder_message(all_0_3_3) = all_363_3_763
% 50.76/18.19 | (880) party_of_protocol(b) = all_363_1_761
% 50.76/18.19 | (881) message(all_63_10_193) = all_363_0_760
% 50.76/18.19 | (882) ~ (all_363_1_761 = 0) | ~ (all_363_2_762 = 0) | ~ (all_363_3_763 = 0) | all_363_0_760 = 0
% 50.76/18.19 |
% 50.76/18.19 | Instantiating (623) with all_365_0_764, all_365_1_765, all_365_2_766, all_365_3_767 yields:
% 50.76/18.19 | (883) party_of_protocol(b) = all_365_2_766 & party_of_protocol(t) = all_365_1_765 & intruder_message(all_61_3_175) = all_365_3_767 & message(all_61_2_174) = all_365_0_764 & ( ~ (all_365_1_765 = 0) | ~ (all_365_2_766 = 0) | ~ (all_365_3_767 = 0) | all_365_0_764 = 0)
% 50.76/18.19 |
% 50.76/18.19 | Applying alpha-rule on (883) yields:
% 50.76/18.19 | (884) party_of_protocol(t) = all_365_1_765
% 50.76/18.19 | (885) intruder_message(all_61_3_175) = all_365_3_767
% 50.76/18.19 | (886) party_of_protocol(b) = all_365_2_766
% 50.76/18.19 | (887) message(all_61_2_174) = all_365_0_764
% 50.76/18.19 | (888) ~ (all_365_1_765 = 0) | ~ (all_365_2_766 = 0) | ~ (all_365_3_767 = 0) | all_365_0_764 = 0
% 50.76/18.19 |
% 50.76/18.19 | Instantiating (609) with all_369_0_771, all_369_1_772, all_369_2_773, all_369_3_774, all_369_4_775, all_369_5_776, all_369_6_777, all_369_7_778, all_369_8_779, all_369_9_780, all_369_10_781 yields:
% 50.76/18.19 | (889) fresh_to_b(all_131_7_320) = all_369_8_779 & generate_b_nonce(all_131_7_320) = all_369_7_778 & generate_expiration_time(all_131_7_320) = all_369_6_777 & b_stored(all_131_6_319) = all_369_0_771 & triple(all_11_4_36, all_131_7_320, all_369_6_777) = all_369_5_776 & triple(b, all_369_7_778, all_369_4_775) = all_369_3_774 & encrypt(all_369_5_776, bt) = all_369_4_775 & sent(all_11_4_36, b, all_131_6_319) = all_369_10_781 & sent(b, t, all_369_3_774) = all_369_2_773 & message(all_369_2_773) = all_369_1_772 & message(all_369_10_781) = all_369_9_780 & ( ~ (all_369_8_779 = 0) | ~ (all_369_9_780 = 0) | (all_369_0_771 = 0 & all_369_1_772 = 0))
% 50.76/18.19 |
% 50.76/18.19 | Applying alpha-rule on (889) yields:
% 50.76/18.19 | (890) b_stored(all_131_6_319) = all_369_0_771
% 50.76/18.19 | (891) encrypt(all_369_5_776, bt) = all_369_4_775
% 50.76/18.19 | (892) sent(b, t, all_369_3_774) = all_369_2_773
% 50.76/18.19 | (893) message(all_369_10_781) = all_369_9_780
% 50.76/18.19 | (894) message(all_369_2_773) = all_369_1_772
% 50.76/18.19 | (895) fresh_to_b(all_131_7_320) = all_369_8_779
% 50.76/18.19 | (896) triple(b, all_369_7_778, all_369_4_775) = all_369_3_774
% 50.76/18.19 | (897) generate_expiration_time(all_131_7_320) = all_369_6_777
% 50.76/18.19 | (898) ~ (all_369_8_779 = 0) | ~ (all_369_9_780 = 0) | (all_369_0_771 = 0 & all_369_1_772 = 0)
% 50.76/18.19 | (899) sent(all_11_4_36, b, all_131_6_319) = all_369_10_781
% 50.76/18.19 | (900) triple(all_11_4_36, all_131_7_320, all_369_6_777) = all_369_5_776
% 50.76/18.19 | (901) generate_b_nonce(all_131_7_320) = all_369_7_778
% 50.76/18.19 |
% 50.76/18.19 | Instantiating (608) with all_371_0_782, all_371_1_783, all_371_2_784, all_371_3_785 yields:
% 50.76/18.19 | (902) intruder_message(all_61_5_177) = all_371_3_785 & intruder_message(all_61_6_178) = all_371_0_782 & intruder_message(an_a_nonce) = all_371_1_783 & intruder_message(a) = all_371_2_784 & ( ~ (all_371_3_785 = 0) | (all_371_0_782 = 0 & all_371_1_783 = 0 & all_371_2_784 = 0))
% 50.76/18.19 |
% 50.76/18.19 | Applying alpha-rule on (902) yields:
% 50.76/18.19 | (903) intruder_message(an_a_nonce) = all_371_1_783
% 50.76/18.19 | (904) intruder_message(all_61_5_177) = all_371_3_785
% 50.76/18.19 | (905) ~ (all_371_3_785 = 0) | (all_371_0_782 = 0 & all_371_1_783 = 0 & all_371_2_784 = 0)
% 50.76/18.19 | (906) intruder_message(all_61_6_178) = all_371_0_782
% 50.76/18.19 | (907) intruder_message(a) = all_371_2_784
% 50.76/18.19 |
% 50.76/18.19 | Instantiating (607) with all_373_0_786, all_373_1_787, all_373_2_788, all_373_3_789 yields:
% 50.76/18.19 | (908) intruder_message(all_61_5_177) = all_373_0_786 & intruder_message(all_61_6_178) = all_373_1_787 & intruder_message(an_a_nonce) = all_373_2_788 & intruder_message(a) = all_373_3_789 & ( ~ (all_373_1_787 = 0) | ~ (all_373_2_788 = 0) | ~ (all_373_3_789 = 0) | all_373_0_786 = 0)
% 50.76/18.19 |
% 50.76/18.19 | Applying alpha-rule on (908) yields:
% 50.76/18.19 | (909) intruder_message(a) = all_373_3_789
% 50.76/18.19 | (910) intruder_message(an_a_nonce) = all_373_2_788
% 50.76/18.19 | (911) ~ (all_373_1_787 = 0) | ~ (all_373_2_788 = 0) | ~ (all_373_3_789 = 0) | all_373_0_786 = 0
% 50.76/18.19 | (912) intruder_message(all_61_6_178) = all_373_1_787
% 50.76/18.19 | (913) intruder_message(all_61_5_177) = all_373_0_786
% 50.76/18.19 |
% 50.76/18.19 | Instantiating (606) with all_375_0_790, all_375_1_791, all_375_2_792, all_375_3_793, all_375_4_794, all_375_5_795, all_375_6_796, all_375_7_797, all_375_8_798, all_375_9_799 yields:
% 50.76/18.19 | (914) b_holds(all_375_1_791) = all_375_0_790 & generate_b_nonce(an_a_nonce) = all_375_8_798 & b_stored(all_375_3_793) = all_375_2_792 & encrypt(all_375_8_798, an_a_nonce) = all_375_7_797 & encrypt(all_61_5_177, bt) = all_375_9_799 & pair(all_375_9_799, all_375_7_797) = all_375_6_796 & pair(a, an_a_nonce) = all_375_3_793 & sent(a, b, all_375_6_796) = all_375_5_795 & message(all_375_5_795) = all_375_4_794 & key(an_a_nonce, a) = all_375_1_791 & ( ~ (all_375_2_792 = 0) | ~ (all_375_4_794 = 0) | all_375_0_790 = 0)
% 50.76/18.19 |
% 50.76/18.19 | Applying alpha-rule on (914) yields:
% 50.76/18.19 | (915) pair(all_375_9_799, all_375_7_797) = all_375_6_796
% 50.76/18.19 | (916) ~ (all_375_2_792 = 0) | ~ (all_375_4_794 = 0) | all_375_0_790 = 0
% 50.76/18.19 | (917) key(an_a_nonce, a) = all_375_1_791
% 50.76/18.19 | (918) b_holds(all_375_1_791) = all_375_0_790
% 50.76/18.19 | (919) message(all_375_5_795) = all_375_4_794
% 50.76/18.19 | (920) pair(a, an_a_nonce) = all_375_3_793
% 50.76/18.19 | (921) encrypt(all_375_8_798, an_a_nonce) = all_375_7_797
% 50.76/18.19 | (922) b_stored(all_375_3_793) = all_375_2_792
% 50.76/18.19 | (923) sent(a, b, all_375_6_796) = all_375_5_795
% 50.76/18.19 | (924) generate_b_nonce(an_a_nonce) = all_375_8_798
% 50.76/18.19 | (925) encrypt(all_61_5_177, bt) = all_375_9_799
% 50.76/18.19 |
% 50.76/18.19 | Instantiating formula (66) with b, all_363_2_762, all_363_1_761 and discharging atoms party_of_protocol(b) = all_363_1_761, party_of_protocol(b) = all_363_2_762, yields:
% 50.76/18.19 | (926) all_363_1_761 = all_363_2_762
% 50.76/18.19 |
% 50.76/18.19 | Instantiating formula (66) with b, all_359_2_756, all_363_2_762 and discharging atoms party_of_protocol(b) = all_363_2_762, party_of_protocol(b) = all_359_2_756, yields:
% 50.76/18.19 | (927) all_363_2_762 = all_359_2_756
% 50.76/18.19 |
% 50.76/18.19 | Instantiating formula (66) with b, all_355_1_749, all_365_2_766 and discharging atoms party_of_protocol(b) = all_365_2_766, party_of_protocol(b) = all_355_1_749, yields:
% 50.76/18.19 | (928) all_365_2_766 = all_355_1_749
% 50.76/18.19 |
% 50.76/18.19 | Instantiating formula (66) with b, all_355_1_749, all_359_2_756 and discharging atoms party_of_protocol(b) = all_359_2_756, party_of_protocol(b) = all_355_1_749, yields:
% 50.76/18.19 | (929) all_359_2_756 = all_355_1_749
% 50.76/18.19 |
% 50.76/18.19 | Instantiating formula (66) with b, all_347_1_737, all_365_2_766 and discharging atoms party_of_protocol(b) = all_365_2_766, party_of_protocol(b) = all_347_1_737, yields:
% 50.76/18.19 | (930) all_365_2_766 = all_347_1_737
% 50.76/18.19 |
% 50.76/18.19 | Instantiating formula (66) with b, all_343_1_730, all_351_1_743 and discharging atoms party_of_protocol(b) = all_351_1_743, party_of_protocol(b) = all_343_1_730, yields:
% 50.76/18.19 | (931) all_351_1_743 = all_343_1_730
% 50.76/18.19 |
% 50.76/18.19 | Instantiating formula (66) with b, all_339_1_724, all_365_2_766 and discharging atoms party_of_protocol(b) = all_365_2_766, party_of_protocol(b) = all_339_1_724, yields:
% 50.76/18.19 | (932) all_365_2_766 = all_339_1_724
% 50.76/18.19 |
% 50.76/18.19 | Instantiating formula (66) with b, all_333_2_717, all_365_2_766 and discharging atoms party_of_protocol(b) = all_365_2_766, party_of_protocol(b) = all_333_2_717, yields:
% 50.76/18.19 | (933) all_365_2_766 = all_333_2_717
% 50.76/18.19 |
% 50.76/18.19 | Instantiating formula (66) with b, all_333_2_717, all_343_1_730 and discharging atoms party_of_protocol(b) = all_343_1_730, party_of_protocol(b) = all_333_2_717, yields:
% 50.76/18.19 | (934) all_343_1_730 = all_333_2_717
% 50.76/18.19 |
% 50.76/18.19 | Instantiating formula (66) with b, all_331_2_713, all_351_1_743 and discharging atoms party_of_protocol(b) = all_351_1_743, party_of_protocol(b) = all_331_2_713, yields:
% 50.76/18.19 | (935) all_351_1_743 = all_331_2_713
% 50.76/18.19 |
% 50.76/18.19 | Instantiating formula (66) with b, all_329_2_709, 0 and discharging atoms party_of_protocol(b) = all_329_2_709, party_of_protocol(b) = 0, yields:
% 50.76/18.19 | (936) all_329_2_709 = 0
% 50.76/18.19 |
% 50.76/18.19 | Instantiating formula (66) with b, all_329_2_709, all_343_1_730 and discharging atoms party_of_protocol(b) = all_343_1_730, party_of_protocol(b) = all_329_2_709, yields:
% 50.76/18.19 | (937) all_343_1_730 = all_329_2_709
% 50.76/18.19 |
% 50.76/18.19 | Instantiating formula (66) with b, all_305_2_663, all_363_1_761 and discharging atoms party_of_protocol(b) = all_363_1_761, party_of_protocol(b) = all_305_2_663, yields:
% 50.76/18.19 | (938) all_363_1_761 = all_305_2_663
% 50.76/18.19 |
% 50.76/18.19 | Instantiating formula (66) with b, all_289_1_637, all_329_2_709 and discharging atoms party_of_protocol(b) = all_329_2_709, party_of_protocol(b) = all_289_1_637, yields:
% 50.76/18.19 | (939) all_329_2_709 = all_289_1_637
% 50.76/18.19 |
% 50.76/18.19 | Instantiating formula (66) with a, all_293_1_643, 0 and discharging atoms party_of_protocol(a) = all_293_1_643, party_of_protocol(a) = 0, yields:
% 50.76/18.19 | (940) all_293_1_643 = 0
% 50.76/18.19 |
% 50.76/18.19 | Instantiating formula (66) with t, all_365_1_765, 0 and discharging atoms party_of_protocol(t) = all_365_1_765, party_of_protocol(t) = 0, yields:
% 50.76/18.19 | (941) all_365_1_765 = 0
% 50.76/18.19 |
% 50.76/18.19 | Instantiating formula (66) with t, all_333_1_716, all_359_1_755 and discharging atoms party_of_protocol(t) = all_359_1_755, party_of_protocol(t) = all_333_1_716, yields:
% 50.76/18.19 | (942) all_359_1_755 = all_333_1_716
% 50.76/18.19 |
% 50.76/18.19 | Instantiating formula (66) with t, all_331_1_712, all_365_1_765 and discharging atoms party_of_protocol(t) = all_365_1_765, party_of_protocol(t) = all_331_1_712, yields:
% 50.76/18.19 | (943) all_365_1_765 = all_331_1_712
% 50.76/18.19 |
% 50.76/18.19 | Instantiating formula (66) with t, all_331_1_712, all_333_1_716 and discharging atoms party_of_protocol(t) = all_333_1_716, party_of_protocol(t) = all_331_1_712, yields:
% 50.76/18.19 | (944) all_333_1_716 = all_331_1_712
% 50.76/18.19 |
% 50.76/18.19 | Instantiating formula (66) with t, all_329_1_708, all_365_1_765 and discharging atoms party_of_protocol(t) = all_365_1_765, party_of_protocol(t) = all_329_1_708, yields:
% 50.76/18.19 | (945) all_365_1_765 = all_329_1_708
% 50.76/18.19 |
% 50.76/18.19 | Instantiating formula (66) with t, all_305_1_662, all_359_1_755 and discharging atoms party_of_protocol(t) = all_359_1_755, party_of_protocol(t) = all_305_1_662, yields:
% 50.76/18.19 | (946) all_359_1_755 = all_305_1_662
% 50.76/18.19 |
% 50.76/18.19 | Instantiating formula (31) with all_63_3_186, all_305_3_664, all_317_0_677 and discharging atoms intruder_message(all_63_3_186) = all_317_0_677, intruder_message(all_63_3_186) = all_305_3_664, yields:
% 50.76/18.19 | (947) all_317_0_677 = all_305_3_664
% 50.76/18.19 |
% 50.76/18.19 | Instantiating formula (31) with all_63_3_186, all_303_0_659, all_305_3_664 and discharging atoms intruder_message(all_63_3_186) = all_305_3_664, intruder_message(all_63_3_186) = all_303_0_659, yields:
% 50.76/18.19 | (948) all_305_3_664 = all_303_0_659
% 50.76/18.19 |
% 50.76/18.19 | Instantiating formula (31) with all_63_3_186, all_295_3_648, all_317_0_677 and discharging atoms intruder_message(all_63_3_186) = all_317_0_677, intruder_message(all_63_3_186) = all_295_3_648, yields:
% 50.76/18.19 | (949) all_317_0_677 = all_295_3_648
% 50.76/18.19 |
% 50.76/18.19 | Instantiating formula (31) with all_63_4_187, all_295_0_645, all_317_1_678 and discharging atoms intruder_message(all_63_4_187) = all_317_1_678, intruder_message(all_63_4_187) = all_295_0_645, yields:
% 50.76/18.19 | (950) all_317_1_678 = all_295_0_645
% 50.76/18.20 |
% 50.76/18.20 | Instantiating formula (31) with all_61_3_175, all_309_0_667, all_365_3_767 and discharging atoms intruder_message(all_61_3_175) = all_365_3_767, intruder_message(all_61_3_175) = all_309_0_667, yields:
% 50.76/18.20 | (951) all_365_3_767 = all_309_0_667
% 50.76/18.20 |
% 50.76/18.20 | Instantiating formula (31) with all_61_3_175, all_259_0_534, all_309_0_667 and discharging atoms intruder_message(all_61_3_175) = all_309_0_667, intruder_message(all_61_3_175) = all_259_0_534, yields:
% 50.76/18.20 | (952) all_309_0_667 = all_259_0_534
% 50.76/18.20 |
% 50.76/18.20 | Instantiating formula (31) with all_61_3_175, all_257_3_533, all_365_3_767 and discharging atoms intruder_message(all_61_3_175) = all_365_3_767, intruder_message(all_61_3_175) = all_257_3_533, yields:
% 50.76/18.20 | (953) all_365_3_767 = all_257_3_533
% 50.76/18.20 |
% 50.76/18.20 | Instantiating formula (31) with all_61_4_176, all_257_0_530, all_259_1_535 and discharging atoms intruder_message(all_61_4_176) = all_259_1_535, intruder_message(all_61_4_176) = all_257_0_530, yields:
% 50.76/18.20 | (954) all_259_1_535 = all_257_0_530
% 50.76/18.20 |
% 50.76/18.20 | Instantiating formula (31) with all_61_7_179, all_295_1_646, all_317_2_679 and discharging atoms intruder_message(all_61_7_179) = all_317_2_679, intruder_message(all_61_7_179) = all_295_1_646, yields:
% 50.76/18.20 | (955) all_317_2_679 = all_295_1_646
% 50.76/18.20 |
% 50.76/18.20 | Instantiating formula (31) with all_61_7_179, all_259_2_536, all_317_2_679 and discharging atoms intruder_message(all_61_7_179) = all_317_2_679, intruder_message(all_61_7_179) = all_259_2_536, yields:
% 50.76/18.20 | (956) all_317_2_679 = all_259_2_536
% 50.76/18.20 |
% 50.76/18.20 | Instantiating formula (31) with all_61_7_179, all_257_1_531, all_295_1_646 and discharging atoms intruder_message(all_61_7_179) = all_295_1_646, intruder_message(all_61_7_179) = all_257_1_531, yields:
% 50.76/18.20 | (957) all_295_1_646 = all_257_1_531
% 50.76/18.20 |
% 50.76/18.20 | Instantiating formula (31) with all_13_7_53, all_275_2_574, all_135_1_334 and discharging atoms intruder_message(all_13_7_53) = all_275_2_574, intruder_message(all_13_7_53) = all_135_1_334, yields:
% 50.76/18.20 | (958) all_275_2_574 = all_135_1_334
% 50.76/18.20 |
% 50.76/18.20 | Instantiating formula (31) with all_13_7_53, all_273_1_569, all_275_2_574 and discharging atoms intruder_message(all_13_7_53) = all_275_2_574, intruder_message(all_13_7_53) = all_273_1_569, yields:
% 50.76/18.20 | (959) all_275_2_574 = all_273_1_569
% 50.76/18.20 |
% 50.76/18.20 | Instantiating formula (31) with all_0_3_3, all_363_3_763, all_67_2_199 and discharging atoms intruder_message(all_0_3_3) = all_363_3_763, intruder_message(all_0_3_3) = all_67_2_199, yields:
% 50.76/18.20 | (960) all_363_3_763 = all_67_2_199
% 50.76/18.20 |
% 50.76/18.20 | Instantiating formula (31) with all_0_3_3, all_361_0_758, all_363_3_763 and discharging atoms intruder_message(all_0_3_3) = all_363_3_763, intruder_message(all_0_3_3) = all_361_0_758, yields:
% 50.76/18.20 | (961) all_363_3_763 = all_361_0_758
% 50.76/18.20 |
% 50.76/18.20 | Instantiating formula (31) with an_a_nonce, all_371_1_783, all_373_2_788 and discharging atoms intruder_message(an_a_nonce) = all_373_2_788, intruder_message(an_a_nonce) = all_371_1_783, yields:
% 50.76/18.20 | (962) all_373_2_788 = all_371_1_783
% 50.76/18.20 |
% 50.76/18.20 | Instantiating formula (31) with an_a_nonce, all_245_2_496, 0 and discharging atoms intruder_message(an_a_nonce) = all_245_2_496, intruder_message(an_a_nonce) = 0, yields:
% 50.76/18.20 | (963) all_245_2_496 = 0
% 50.76/18.20 |
% 50.76/18.20 | Instantiating formula (31) with an_a_nonce, all_245_2_496, all_371_1_783 and discharging atoms intruder_message(an_a_nonce) = all_371_1_783, intruder_message(an_a_nonce) = all_245_2_496, yields:
% 50.76/18.20 | (964) all_371_1_783 = all_245_2_496
% 50.76/18.20 |
% 50.76/18.20 | Instantiating formula (31) with an_a_nonce, all_243_1_491, all_373_2_788 and discharging atoms intruder_message(an_a_nonce) = all_373_2_788, intruder_message(an_a_nonce) = all_243_1_491, yields:
% 50.76/18.20 | (965) all_373_2_788 = all_243_1_491
% 50.76/18.20 |
% 50.76/18.20 | Instantiating formula (31) with b, all_321_2_693, all_325_2_701 and discharging atoms intruder_message(b) = all_325_2_701, intruder_message(b) = all_321_2_693, yields:
% 50.76/18.20 | (966) all_325_2_701 = all_321_2_693
% 50.76/18.20 |
% 50.76/18.20 | Instantiating formula (31) with b, all_321_2_693, all_323_3_698 and discharging atoms intruder_message(b) = all_323_3_698, intruder_message(b) = all_321_2_693, yields:
% 50.76/18.20 | (967) all_323_3_698 = all_321_2_693
% 50.76/18.20 |
% 50.76/18.20 | Instantiating formula (31) with b, all_317_3_680, all_327_3_706 and discharging atoms intruder_message(b) = all_327_3_706, intruder_message(b) = all_317_3_680, yields:
% 50.76/18.20 | (968) all_327_3_706 = all_317_3_680
% 50.76/18.20 |
% 50.76/18.20 | Instantiating formula (31) with b, all_317_3_680, all_325_2_701 and discharging atoms intruder_message(b) = all_325_2_701, intruder_message(b) = all_317_3_680, yields:
% 50.76/18.20 | (969) all_325_2_701 = all_317_3_680
% 50.76/18.20 |
% 50.76/18.20 | Instantiating formula (31) with b, all_315_3_676, all_325_2_701 and discharging atoms intruder_message(b) = all_325_2_701, intruder_message(b) = all_315_3_676, yields:
% 50.76/18.20 | (970) all_325_2_701 = all_315_3_676
% 50.76/18.20 |
% 50.76/18.20 | Instantiating formula (31) with b, all_297_2_651, all_315_3_676 and discharging atoms intruder_message(b) = all_315_3_676, intruder_message(b) = all_297_2_651, yields:
% 50.76/18.20 | (971) all_315_3_676 = all_297_2_651
% 50.76/18.20 |
% 50.76/18.20 | Instantiating formula (31) with b, all_295_2_647, all_325_2_701 and discharging atoms intruder_message(b) = all_325_2_701, intruder_message(b) = all_295_2_647, yields:
% 50.76/18.20 | (972) all_325_2_701 = all_295_2_647
% 50.76/18.20 |
% 50.76/18.20 | Instantiating formula (31) with b, all_259_3_537, all_67_1_198 and discharging atoms intruder_message(b) = all_259_3_537, intruder_message(b) = all_67_1_198, yields:
% 50.76/18.20 | (973) all_259_3_537 = all_67_1_198
% 50.76/18.20 |
% 50.76/18.20 | Instantiating formula (31) with b, all_259_3_537, all_317_3_680 and discharging atoms intruder_message(b) = all_317_3_680, intruder_message(b) = all_259_3_537, yields:
% 50.76/18.20 | (974) all_317_3_680 = all_259_3_537
% 50.76/18.20 |
% 50.76/18.20 | Instantiating formula (31) with b, all_257_2_532, all_323_3_698 and discharging atoms intruder_message(b) = all_323_3_698, intruder_message(b) = all_257_2_532, yields:
% 50.76/18.20 | (975) all_323_3_698 = all_257_2_532
% 50.76/18.20 |
% 50.76/18.20 | Instantiating formula (31) with b, all_255_3_529, all_317_3_680 and discharging atoms intruder_message(b) = all_317_3_680, intruder_message(b) = all_255_3_529, yields:
% 50.76/18.20 | (976) all_317_3_680 = all_255_3_529
% 50.76/18.20 |
% 50.76/18.20 | Instantiating formula (31) with b, all_253_2_524, all_325_2_701 and discharging atoms intruder_message(b) = all_325_2_701, intruder_message(b) = all_253_2_524, yields:
% 50.76/18.20 | (977) all_325_2_701 = all_253_2_524
% 50.76/18.20 |
% 50.76/18.20 | Instantiating formula (31) with b, all_245_3_497, all_327_3_706 and discharging atoms intruder_message(b) = all_327_3_706, intruder_message(b) = all_245_3_497, yields:
% 50.76/18.20 | (978) all_327_3_706 = all_245_3_497
% 50.76/18.20 |
% 50.76/18.20 | Instantiating formula (31) with b, all_243_2_492, all_315_3_676 and discharging atoms intruder_message(b) = all_315_3_676, intruder_message(b) = all_243_2_492, yields:
% 50.76/18.20 | (979) all_315_3_676 = all_243_2_492
% 50.76/18.20 |
% 50.76/18.20 | Instantiating formula (31) with a, all_373_3_789, 0 and discharging atoms intruder_message(a) = all_373_3_789, intruder_message(a) = 0, yields:
% 50.76/18.20 | (980) all_373_3_789 = 0
% 50.76/18.20 |
% 50.76/18.20 | Instantiating formula (31) with a, all_371_2_784, all_373_3_789 and discharging atoms intruder_message(a) = all_373_3_789, intruder_message(a) = all_371_2_784, yields:
% 50.76/18.20 | (981) all_373_3_789 = all_371_2_784
% 50.76/18.20 |
% 50.76/18.20 | Instantiating formula (29) with an_a_nonce, all_375_8_798, all_61_7_179 and discharging atoms generate_b_nonce(an_a_nonce) = all_375_8_798, generate_b_nonce(an_a_nonce) = all_61_7_179, yields:
% 50.76/18.20 | (982) all_375_8_798 = all_61_7_179
% 50.76/18.20 |
% 50.76/18.20 | Instantiating formula (29) with an_a_nonce, all_287_5_631, all_375_8_798 and discharging atoms generate_b_nonce(an_a_nonce) = all_375_8_798, generate_b_nonce(an_a_nonce) = all_287_5_631, yields:
% 50.76/18.20 | (983) all_375_8_798 = all_287_5_631
% 50.76/18.20 |
% 50.76/18.20 | Instantiating formula (29) with an_a_nonce, all_285_8_624, all_375_8_798 and discharging atoms generate_b_nonce(an_a_nonce) = all_375_8_798, generate_b_nonce(an_a_nonce) = all_285_8_624, yields:
% 50.76/18.20 | (984) all_375_8_798 = all_285_8_624
% 50.76/18.20 |
% 50.76/18.20 | Instantiating formula (8) with all_149_5_383, bt, all_319_4_685, all_149_4_382 and discharging atoms encrypt(all_149_5_383, bt) = all_319_4_685, encrypt(all_149_5_383, bt) = all_149_4_382, yields:
% 50.76/18.20 | (985) all_319_4_685 = all_149_4_382
% 50.76/18.20 |
% 50.76/18.20 | Instantiating formula (8) with all_149_5_383, bt, all_281_9_605, all_319_4_685 and discharging atoms encrypt(all_149_5_383, bt) = all_319_4_685, encrypt(all_149_5_383, bt) = all_281_9_605, yields:
% 50.76/18.20 | (986) all_319_4_685 = all_281_9_605
% 50.76/18.20 |
% 50.76/18.20 | Instantiating formula (8) with all_63_5_188, bt, all_287_4_630, all_63_4_187 and discharging atoms encrypt(all_63_5_188, bt) = all_287_4_630, encrypt(all_63_5_188, bt) = all_63_4_187, yields:
% 50.76/18.20 | (987) all_287_4_630 = all_63_4_187
% 50.76/18.20 |
% 50.76/18.20 | Instantiating formula (8) with all_63_5_188, bt, all_285_9_625, all_287_4_630 and discharging atoms encrypt(all_63_5_188, bt) = all_287_4_630, encrypt(all_63_5_188, bt) = all_285_9_625, yields:
% 50.76/18.20 | (988) all_287_4_630 = all_285_9_625
% 50.76/18.20 |
% 50.76/18.20 | Instantiating formula (8) with all_61_5_177, bt, all_375_9_799, all_61_4_176 and discharging atoms encrypt(all_61_5_177, bt) = all_375_9_799, encrypt(all_61_5_177, bt) = all_61_4_176, yields:
% 50.76/18.20 | (989) all_375_9_799 = all_61_4_176
% 50.76/18.20 |
% 50.76/18.20 | Instantiating formula (72) with a, an_a_nonce, all_375_3_793, all_0_2_2 and discharging atoms pair(a, an_a_nonce) = all_375_3_793, pair(a, an_a_nonce) = all_0_2_2, yields:
% 50.76/18.20 | (990) all_375_3_793 = all_0_2_2
% 50.76/18.20 |
% 50.76/18.20 | Instantiating formula (15) with all_63_2_185, all_305_0_661, all_63_1_184 and discharging atoms message(all_63_2_185) = all_305_0_661, message(all_63_2_185) = all_63_1_184, yields:
% 50.76/18.20 | (991) all_305_0_661 = all_63_1_184
% 50.76/18.20 |
% 50.76/18.20 | Instantiating formula (15) with all_63_2_185, all_303_1_660, all_305_0_661 and discharging atoms message(all_63_2_185) = all_305_0_661, message(all_63_2_185) = all_303_1_660, yields:
% 50.76/18.20 | (992) all_305_0_661 = all_303_1_660
% 50.76/18.20 |
% 50.76/18.20 | Instantiating formula (15) with all_63_10_193, all_363_0_760, all_63_9_192 and discharging atoms message(all_63_10_193) = all_363_0_760, message(all_63_10_193) = all_63_9_192, yields:
% 50.76/18.20 | (993) all_363_0_760 = all_63_9_192
% 50.76/18.20 |
% 50.76/18.20 | Instantiating formula (15) with all_63_10_193, all_361_1_759, all_363_0_760 and discharging atoms message(all_63_10_193) = all_363_0_760, message(all_63_10_193) = all_361_1_759, yields:
% 50.76/18.20 | (994) all_363_0_760 = all_361_1_759
% 50.76/18.20 |
% 50.76/18.20 | Instantiating formula (15) with all_61_2_174, all_365_0_764, 0 and discharging atoms message(all_61_2_174) = all_365_0_764, message(all_61_2_174) = 0, yields:
% 50.76/18.20 | (995) all_365_0_764 = 0
% 50.76/18.20 |
% 50.76/18.20 | Instantiating formula (15) with all_61_2_174, all_309_1_668, all_365_0_764 and discharging atoms message(all_61_2_174) = all_365_0_764, message(all_61_2_174) = all_309_1_668, yields:
% 50.76/18.20 | (996) all_365_0_764 = all_309_1_668
% 50.76/18.20 |
% 50.76/18.20 | Combining equations (982,983) yields a new equation:
% 50.76/18.20 | (997) all_287_5_631 = all_61_7_179
% 50.76/18.20 |
% 50.76/18.20 | Combining equations (984,983) yields a new equation:
% 50.76/18.20 | (998) all_287_5_631 = all_285_8_624
% 50.76/18.20 |
% 50.76/18.20 | Combining equations (962,965) yields a new equation:
% 50.76/18.20 | (999) all_371_1_783 = all_243_1_491
% 50.76/18.20 |
% 50.76/18.20 | Simplifying 999 yields:
% 50.76/18.20 | (1000) all_371_1_783 = all_243_1_491
% 50.76/18.20 |
% 50.76/18.20 | Combining equations (981,980) yields a new equation:
% 50.76/18.20 | (1001) all_371_2_784 = 0
% 50.76/18.20 |
% 50.76/18.20 | Simplifying 1001 yields:
% 50.76/18.20 | (1002) all_371_2_784 = 0
% 50.76/18.20 |
% 50.76/18.20 | Combining equations (964,1000) yields a new equation:
% 50.76/18.20 | (1003) all_245_2_496 = all_243_1_491
% 50.76/18.20 |
% 50.76/18.20 | Simplifying 1003 yields:
% 50.76/18.20 | (1004) all_245_2_496 = all_243_1_491
% 50.76/18.20 |
% 50.76/18.20 | Combining equations (995,996) yields a new equation:
% 50.76/18.20 | (1005) all_309_1_668 = 0
% 50.76/18.20 |
% 50.76/18.20 | Combining equations (941,945) yields a new equation:
% 50.76/18.20 | (1006) all_329_1_708 = 0
% 50.76/18.20 |
% 50.76/18.20 | Combining equations (943,945) yields a new equation:
% 50.76/18.20 | (1007) all_331_1_712 = all_329_1_708
% 50.76/18.20 |
% 50.76/18.20 | Simplifying 1007 yields:
% 50.76/18.20 | (1008) all_331_1_712 = all_329_1_708
% 50.76/18.20 |
% 50.76/18.20 | Combining equations (928,930) yields a new equation:
% 50.76/18.20 | (1009) all_355_1_749 = all_347_1_737
% 50.76/18.20 |
% 50.76/18.20 | Simplifying 1009 yields:
% 50.76/18.20 | (1010) all_355_1_749 = all_347_1_737
% 50.76/18.20 |
% 50.76/18.20 | Combining equations (933,930) yields a new equation:
% 50.76/18.20 | (1011) all_347_1_737 = all_333_2_717
% 50.76/18.20 |
% 50.76/18.20 | Combining equations (932,930) yields a new equation:
% 50.76/18.20 | (1012) all_347_1_737 = all_339_1_724
% 50.76/18.20 |
% 50.76/18.20 | Combining equations (951,953) yields a new equation:
% 50.76/18.20 | (1013) all_309_0_667 = all_257_3_533
% 50.76/18.20 |
% 50.76/18.20 | Simplifying 1013 yields:
% 50.76/18.20 | (1014) all_309_0_667 = all_257_3_533
% 50.76/18.20 |
% 50.76/18.20 | Combining equations (993,994) yields a new equation:
% 50.76/18.20 | (1015) all_361_1_759 = all_63_9_192
% 50.76/18.20 |
% 50.76/18.20 | Combining equations (926,938) yields a new equation:
% 50.76/18.20 | (1016) all_363_2_762 = all_305_2_663
% 50.76/18.20 |
% 50.76/18.20 | Simplifying 1016 yields:
% 50.76/18.20 | (1017) all_363_2_762 = all_305_2_663
% 50.76/18.20 |
% 50.76/18.20 | Combining equations (927,1017) yields a new equation:
% 50.76/18.20 | (1018) all_359_2_756 = all_305_2_663
% 50.76/18.20 |
% 50.76/18.20 | Simplifying 1018 yields:
% 50.76/18.20 | (1019) all_359_2_756 = all_305_2_663
% 50.76/18.20 |
% 50.76/18.20 | Combining equations (961,960) yields a new equation:
% 50.76/18.20 | (1020) all_361_0_758 = all_67_2_199
% 50.76/18.20 |
% 50.76/18.20 | Simplifying 1020 yields:
% 50.76/18.20 | (1021) all_361_0_758 = all_67_2_199
% 50.76/18.20 |
% 50.76/18.20 | Combining equations (942,946) yields a new equation:
% 50.76/18.20 | (1022) all_333_1_716 = all_305_1_662
% 50.76/18.20 |
% 50.76/18.20 | Simplifying 1022 yields:
% 50.76/18.20 | (1023) all_333_1_716 = all_305_1_662
% 50.76/18.20 |
% 50.76/18.20 | Combining equations (929,1019) yields a new equation:
% 50.76/18.20 | (1024) all_355_1_749 = all_305_2_663
% 50.76/18.20 |
% 50.76/18.20 | Simplifying 1024 yields:
% 50.76/18.20 | (1025) all_355_1_749 = all_305_2_663
% 50.76/18.20 |
% 50.76/18.20 | Combining equations (1010,1025) yields a new equation:
% 50.76/18.20 | (1026) all_347_1_737 = all_305_2_663
% 50.76/18.20 |
% 50.76/18.20 | Simplifying 1026 yields:
% 50.76/18.20 | (1027) all_347_1_737 = all_305_2_663
% 50.76/18.20 |
% 50.76/18.20 | Combining equations (931,935) yields a new equation:
% 50.76/18.20 | (1028) all_343_1_730 = all_331_2_713
% 50.76/18.20 |
% 50.76/18.20 | Simplifying 1028 yields:
% 50.76/18.20 | (1029) all_343_1_730 = all_331_2_713
% 50.76/18.20 |
% 50.76/18.20 | Combining equations (1011,1012) yields a new equation:
% 50.76/18.20 | (1030) all_339_1_724 = all_333_2_717
% 50.76/18.20 |
% 50.76/18.20 | Combining equations (1027,1012) yields a new equation:
% 50.76/18.20 | (1031) all_339_1_724 = all_305_2_663
% 50.76/18.21 |
% 50.76/18.21 | Combining equations (934,1029) yields a new equation:
% 50.76/18.21 | (1032) all_333_2_717 = all_331_2_713
% 50.76/18.21 |
% 50.76/18.21 | Simplifying 1032 yields:
% 50.76/18.21 | (1033) all_333_2_717 = all_331_2_713
% 50.76/18.21 |
% 50.76/18.21 | Combining equations (937,1029) yields a new equation:
% 50.76/18.21 | (1034) all_331_2_713 = all_329_2_709
% 50.76/18.21 |
% 50.76/18.21 | Combining equations (1030,1031) yields a new equation:
% 50.76/18.21 | (1035) all_333_2_717 = all_305_2_663
% 50.76/18.21 |
% 50.76/18.21 | Simplifying 1035 yields:
% 50.76/18.21 | (1036) all_333_2_717 = all_305_2_663
% 50.76/18.21 |
% 50.76/18.21 | Combining equations (944,1023) yields a new equation:
% 50.76/18.21 | (1037) all_331_1_712 = all_305_1_662
% 50.76/18.21 |
% 50.76/18.21 | Simplifying 1037 yields:
% 50.76/18.21 | (1038) all_331_1_712 = all_305_1_662
% 50.76/18.21 |
% 50.76/18.21 | Combining equations (1033,1036) yields a new equation:
% 50.76/18.21 | (1039) all_331_2_713 = all_305_2_663
% 50.76/18.21 |
% 50.76/18.21 | Simplifying 1039 yields:
% 50.76/18.21 | (1040) all_331_2_713 = all_305_2_663
% 50.76/18.21 |
% 50.76/18.21 | Combining equations (1008,1038) yields a new equation:
% 50.76/18.21 | (1041) all_329_1_708 = all_305_1_662
% 50.76/18.21 |
% 50.76/18.21 | Simplifying 1041 yields:
% 50.76/18.21 | (1042) all_329_1_708 = all_305_1_662
% 50.76/18.21 |
% 50.76/18.21 | Combining equations (1034,1040) yields a new equation:
% 50.76/18.21 | (1043) all_329_2_709 = all_305_2_663
% 50.76/18.21 |
% 50.76/18.21 | Simplifying 1043 yields:
% 50.76/18.21 | (1044) all_329_2_709 = all_305_2_663
% 50.76/18.21 |
% 50.76/18.21 | Combining equations (1006,1042) yields a new equation:
% 50.76/18.21 | (1045) all_305_1_662 = 0
% 50.76/18.21 |
% 50.76/18.21 | Combining equations (939,1044) yields a new equation:
% 50.76/18.21 | (1046) all_305_2_663 = all_289_1_637
% 50.76/18.21 |
% 50.76/18.21 | Combining equations (936,1044) yields a new equation:
% 50.76/18.21 | (1047) all_305_2_663 = 0
% 50.76/18.21 |
% 50.76/18.21 | Combining equations (968,978) yields a new equation:
% 50.76/18.21 | (1048) all_317_3_680 = all_245_3_497
% 50.76/18.21 |
% 50.76/18.21 | Simplifying 1048 yields:
% 50.76/18.21 | (1049) all_317_3_680 = all_245_3_497
% 50.76/18.21 |
% 50.76/18.21 | Combining equations (969,972) yields a new equation:
% 50.76/18.21 | (1050) all_317_3_680 = all_295_2_647
% 50.76/18.21 |
% 50.76/18.21 | Simplifying 1050 yields:
% 50.76/18.21 | (1051) all_317_3_680 = all_295_2_647
% 50.76/18.21 |
% 50.76/18.21 | Combining equations (970,972) yields a new equation:
% 50.76/18.21 | (1052) all_315_3_676 = all_295_2_647
% 50.76/18.21 |
% 50.76/18.21 | Simplifying 1052 yields:
% 50.76/18.21 | (1053) all_315_3_676 = all_295_2_647
% 50.76/18.21 |
% 50.76/18.21 | Combining equations (977,972) yields a new equation:
% 50.76/18.21 | (1054) all_295_2_647 = all_253_2_524
% 50.76/18.21 |
% 50.76/18.21 | Combining equations (966,972) yields a new equation:
% 50.76/18.21 | (1055) all_321_2_693 = all_295_2_647
% 50.76/18.21 |
% 50.76/18.21 | Simplifying 1055 yields:
% 50.76/18.21 | (1056) all_321_2_693 = all_295_2_647
% 50.76/18.21 |
% 50.76/18.21 | Combining equations (967,975) yields a new equation:
% 50.76/18.21 | (1057) all_321_2_693 = all_257_2_532
% 50.76/18.21 |
% 50.76/18.21 | Simplifying 1057 yields:
% 50.76/18.21 | (1058) all_321_2_693 = all_257_2_532
% 50.76/18.21 |
% 50.76/18.21 | Combining equations (1056,1058) yields a new equation:
% 50.76/18.21 | (1059) all_295_2_647 = all_257_2_532
% 50.76/18.21 |
% 50.76/18.21 | Simplifying 1059 yields:
% 50.76/18.21 | (1060) all_295_2_647 = all_257_2_532
% 50.76/18.21 |
% 50.76/18.21 | Combining equations (985,986) yields a new equation:
% 50.76/18.21 | (1061) all_281_9_605 = all_149_4_382
% 50.76/18.21 |
% 50.76/18.21 | Combining equations (947,949) yields a new equation:
% 50.76/18.21 | (1062) all_305_3_664 = all_295_3_648
% 50.76/18.21 |
% 50.76/18.21 | Simplifying 1062 yields:
% 50.76/18.21 | (1063) all_305_3_664 = all_295_3_648
% 50.76/18.21 |
% 50.76/18.21 | Combining equations (955,956) yields a new equation:
% 50.76/18.21 | (1064) all_295_1_646 = all_259_2_536
% 50.76/18.21 |
% 50.76/18.21 | Simplifying 1064 yields:
% 50.76/18.21 | (1065) all_295_1_646 = all_259_2_536
% 50.76/18.21 |
% 50.76/18.21 | Combining equations (1049,976) yields a new equation:
% 50.76/18.21 | (1066) all_255_3_529 = all_245_3_497
% 50.76/18.21 |
% 50.76/18.21 | Combining equations (1051,976) yields a new equation:
% 50.76/18.21 | (1067) all_295_2_647 = all_255_3_529
% 50.76/18.21 |
% 50.76/18.21 | Simplifying 1067 yields:
% 50.76/18.21 | (1068) all_295_2_647 = all_255_3_529
% 50.76/18.21 |
% 50.76/18.21 | Combining equations (974,976) yields a new equation:
% 50.76/18.21 | (1069) all_259_3_537 = all_255_3_529
% 50.76/18.21 |
% 50.76/18.21 | Simplifying 1069 yields:
% 50.76/18.21 | (1070) all_259_3_537 = all_255_3_529
% 50.76/18.21 |
% 50.76/18.21 | Combining equations (979,971) yields a new equation:
% 50.76/18.21 | (1071) all_297_2_651 = all_243_2_492
% 50.76/18.21 |
% 50.76/18.21 | Combining equations (1053,971) yields a new equation:
% 50.76/18.21 | (1072) all_297_2_651 = all_295_2_647
% 50.76/18.21 |
% 50.76/18.21 | Combining equations (952,1014) yields a new equation:
% 50.76/18.21 | (1073) all_259_0_534 = all_257_3_533
% 50.76/18.21 |
% 50.76/18.21 | Simplifying 1073 yields:
% 50.76/18.21 | (1074) all_259_0_534 = all_257_3_533
% 50.76/18.21 |
% 50.76/18.21 | Combining equations (992,991) yields a new equation:
% 50.76/18.21 | (1075) all_303_1_660 = all_63_1_184
% 50.76/18.21 |
% 50.76/18.21 | Simplifying 1075 yields:
% 50.76/18.21 | (1076) all_303_1_660 = all_63_1_184
% 50.76/18.21 |
% 50.76/18.21 | Combining equations (1047,1046) yields a new equation:
% 50.76/18.21 | (1077) all_289_1_637 = 0
% 50.76/18.21 |
% 50.76/18.21 | Combining equations (1063,948) yields a new equation:
% 50.76/18.21 | (1078) all_303_0_659 = all_295_3_648
% 50.76/18.21 |
% 50.76/18.21 | Combining equations (1072,1071) yields a new equation:
% 50.76/18.21 | (1079) all_295_2_647 = all_243_2_492
% 50.76/18.21 |
% 50.76/18.21 | Simplifying 1079 yields:
% 50.76/18.21 | (1080) all_295_2_647 = all_243_2_492
% 50.76/18.21 |
% 50.76/18.21 | Combining equations (957,1065) yields a new equation:
% 50.76/18.21 | (1081) all_259_2_536 = all_257_1_531
% 50.76/18.21 |
% 50.76/18.21 | Combining equations (1054,1060) yields a new equation:
% 50.76/18.21 | (1082) all_257_2_532 = all_253_2_524
% 50.76/18.21 |
% 50.76/18.21 | Combining equations (1080,1060) yields a new equation:
% 50.76/18.21 | (1083) all_257_2_532 = all_243_2_492
% 50.76/18.21 |
% 50.76/18.21 | Combining equations (1068,1060) yields a new equation:
% 50.76/18.21 | (1084) all_257_2_532 = all_255_3_529
% 50.76/18.21 |
% 50.76/18.21 | Combining equations (988,987) yields a new equation:
% 50.76/18.21 | (1085) all_285_9_625 = all_63_4_187
% 50.76/18.21 |
% 50.76/18.21 | Simplifying 1085 yields:
% 50.76/18.21 | (1086) all_285_9_625 = all_63_4_187
% 50.76/18.21 |
% 50.76/18.21 | Combining equations (997,998) yields a new equation:
% 50.76/18.21 | (1087) all_285_8_624 = all_61_7_179
% 50.76/18.21 |
% 50.76/18.21 | Combining equations (958,959) yields a new equation:
% 50.76/18.21 | (1088) all_273_1_569 = all_135_1_334
% 50.76/18.21 |
% 50.76/18.21 | Combining equations (1070,973) yields a new equation:
% 50.76/18.21 | (1089) all_255_3_529 = all_67_1_198
% 50.76/18.21 |
% 50.76/18.21 | Simplifying 1089 yields:
% 50.76/18.21 | (1090) all_255_3_529 = all_67_1_198
% 50.76/18.21 |
% 50.76/18.21 | Combining equations (1084,1082) yields a new equation:
% 50.76/18.21 | (1091) all_255_3_529 = all_253_2_524
% 50.76/18.21 |
% 50.76/18.21 | Simplifying 1091 yields:
% 50.76/18.21 | (1092) all_255_3_529 = all_253_2_524
% 50.76/18.21 |
% 50.76/18.21 | Combining equations (1083,1082) yields a new equation:
% 50.76/18.21 | (1093) all_253_2_524 = all_243_2_492
% 50.76/18.21 |
% 50.76/18.21 | Combining equations (1092,1066) yields a new equation:
% 50.76/18.21 | (1094) all_253_2_524 = all_245_3_497
% 50.76/18.21 |
% 50.76/18.21 | Simplifying 1094 yields:
% 50.76/18.21 | (1095) all_253_2_524 = all_245_3_497
% 50.76/18.21 |
% 50.76/18.21 | Combining equations (1090,1066) yields a new equation:
% 50.76/18.21 | (1096) all_245_3_497 = all_67_1_198
% 50.76/18.21 |
% 50.76/18.21 | Combining equations (1095,1093) yields a new equation:
% 50.76/18.21 | (1097) all_245_3_497 = all_243_2_492
% 50.76/18.21 |
% 50.76/18.21 | Simplifying 1097 yields:
% 50.76/18.21 | (1098) all_245_3_497 = all_243_2_492
% 50.76/18.21 |
% 50.76/18.21 | Combining equations (963,1004) yields a new equation:
% 50.76/18.21 | (1099) all_243_1_491 = 0
% 50.76/18.21 |
% 50.76/18.21 | Combining equations (1096,1098) yields a new equation:
% 50.76/18.21 | (1100) all_243_2_492 = all_67_1_198
% 50.76/18.21 |
% 50.76/18.21 | Combining equations (1100,1093) yields a new equation:
% 50.76/18.21 | (1101) all_253_2_524 = all_67_1_198
% 50.76/18.21 |
% 50.76/18.21 | Combining equations (1101,1082) yields a new equation:
% 50.76/18.21 | (1102) all_257_2_532 = all_67_1_198
% 50.76/18.21 |
% 50.76/18.21 | Combining equations (1087,998) yields a new equation:
% 50.76/18.21 | (997) all_287_5_631 = all_61_7_179
% 50.76/18.21 |
% 50.76/18.21 | Combining equations (1077,1046) yields a new equation:
% 50.76/18.21 | (1047) all_305_2_663 = 0
% 50.76/18.21 |
% 50.76/18.21 | Combining equations (1047,1017) yields a new equation:
% 50.76/18.21 | (1105) all_363_2_762 = 0
% 50.76/18.21 |
% 50.76/18.21 | Combining equations (1047,938) yields a new equation:
% 50.76/18.21 | (1106) all_363_1_761 = 0
% 50.76/18.21 |
% 50.76/18.21 | Combining equations (1015,994) yields a new equation:
% 50.76/18.21 | (993) all_363_0_760 = all_63_9_192
% 50.76/18.21 |
% 50.76/18.21 | Combining equations (997,983) yields a new equation:
% 50.76/18.21 | (982) all_375_8_798 = all_61_7_179
% 50.76/18.21 |
% 50.76/18.21 | From (1077) and (737) follows:
% 50.76/18.21 | (10) party_of_protocol(b) = 0
% 50.76/18.21 |
% 50.76/18.21 | From (940) and (742) follows:
% 50.76/18.21 | (43) party_of_protocol(a) = 0
% 50.76/18.21 |
% 50.76/18.21 | From (1045) and (763) follows:
% 50.76/18.21 | (34) party_of_protocol(t) = 0
% 50.76/18.21 |
% 50.76/18.21 | From (1078) and (758) follows:
% 50.76/18.21 | (749) intruder_message(all_63_3_186) = all_295_3_648
% 50.76/18.21 |
% 50.76/18.21 | From (950) and (781) follows:
% 50.76/18.21 | (750) intruder_message(all_63_4_187) = all_295_0_645
% 50.76/18.21 |
% 50.76/18.21 | From (1074) and (662) follows:
% 50.76/18.21 | (653) intruder_message(all_61_3_175) = all_257_3_533
% 50.76/18.21 |
% 50.76/18.21 | From (954) and (660) follows:
% 50.76/18.21 | (652) intruder_message(all_61_4_176) = all_257_0_530
% 50.76/18.21 |
% 50.76/18.21 | From (1081) and (659) follows:
% 50.76/18.21 | (656) intruder_message(all_61_7_179) = all_257_1_531
% 50.76/18.22 |
% 50.76/18.22 | From (1088) and (676) follows:
% 50.76/18.22 | (375) intruder_message(all_13_7_53) = all_135_1_334
% 50.76/18.22 |
% 50.76/18.22 | From (1021) and (874) follows:
% 50.76/18.22 | (273) intruder_message(all_0_3_3) = all_67_2_199
% 50.76/18.22 |
% 50.76/18.22 | From (1099) and (629) follows:
% 50.76/18.22 | (566) intruder_message(an_a_nonce) = 0
% 50.76/18.22 |
% 50.76/18.22 | From (1100) and (628) follows:
% 50.76/18.22 | (275) intruder_message(b) = all_67_1_198
% 50.76/18.22 |
% 50.76/18.22 | From (1002) and (907) follows:
% 50.76/18.22 | (567) intruder_message(a) = 0
% 50.76/18.22 |
% 50.76/18.22 | From (990) and (922) follows:
% 50.76/18.22 | (1122) b_stored(all_0_2_2) = all_375_2_792
% 50.76/18.22 |
% 50.76/18.22 | From (982) and (921) follows:
% 50.76/18.22 | (1123) encrypt(all_61_7_179, an_a_nonce) = all_375_7_797
% 50.76/18.22 |
% 50.76/18.22 | From (1087) and (712) follows:
% 50.76/18.22 | (1124) encrypt(all_61_7_179, an_a_nonce) = all_285_7_623
% 50.76/18.22 |
% 50.76/18.22 | From (989) and (915) follows:
% 50.76/18.22 | (1125) pair(all_61_4_176, all_375_7_797) = all_375_6_796
% 50.76/18.22 |
% 50.76/18.22 | From (1086) and (717) follows:
% 50.76/18.22 | (1126) pair(all_63_4_187, all_285_7_623) = all_285_6_622
% 50.76/18.22 |
% 50.76/18.22 | From (1061) and (702) follows:
% 50.76/18.22 | (1127) pair(all_149_4_382, all_281_7_603) = all_281_6_602
% 50.76/18.22 |
% 50.76/18.22 +-Applying beta-rule and splitting (770), into two cases.
% 50.76/18.22 |-Branch one:
% 50.76/18.22 | (1128) ~ (all_309_1_668 = 0)
% 50.76/18.22 |
% 50.76/18.22 | Equations (1005) can reduce 1128 to:
% 50.76/18.22 | (551) $false
% 50.76/18.22 |
% 50.76/18.22 |-The branch is then unsatisfiable
% 50.76/18.22 |-Branch two:
% 50.76/18.22 | (1005) all_309_1_668 = 0
% 50.76/18.22 | (1131) all_309_0_667 = 0
% 50.76/18.22 |
% 50.76/18.22 | Combining equations (1014,1131) yields a new equation:
% 50.76/18.22 | (1132) all_257_3_533 = 0
% 50.76/18.22 |
% 50.76/18.22 | Simplifying 1132 yields:
% 50.76/18.22 | (1133) all_257_3_533 = 0
% 50.76/18.22 |
% 50.76/18.22 | From (1133) and (653) follows:
% 50.76/18.22 | (1134) intruder_message(all_61_3_175) = 0
% 50.76/18.22 |
% 50.76/18.22 +-Applying beta-rule and splitting (655), into two cases.
% 50.76/18.22 |-Branch one:
% 50.76/18.22 | (1135) ~ (all_257_3_533 = 0)
% 50.76/18.22 |
% 50.76/18.22 | Equations (1133) can reduce 1135 to:
% 50.76/18.22 | (551) $false
% 50.76/18.22 |
% 50.76/18.22 |-The branch is then unsatisfiable
% 50.76/18.22 |-Branch two:
% 50.76/18.22 | (1133) all_257_3_533 = 0
% 50.76/18.22 | (1138) all_257_0_530 = 0 & all_257_1_531 = 0 & all_257_2_532 = 0
% 50.76/18.22 |
% 50.76/18.22 | Applying alpha-rule on (1138) yields:
% 50.76/18.22 | (1139) all_257_0_530 = 0
% 50.76/18.22 | (1140) all_257_1_531 = 0
% 50.76/18.22 | (1141) all_257_2_532 = 0
% 50.76/18.22 |
% 50.76/18.22 | Combining equations (1102,1141) yields a new equation:
% 50.76/18.22 | (1142) all_67_1_198 = 0
% 50.76/18.22 |
% 50.76/18.22 | Simplifying 1142 yields:
% 50.76/18.22 | (1143) all_67_1_198 = 0
% 50.76/18.22 |
% 50.76/18.22 | Combining equations (1143,492) yields a new equation:
% 50.76/18.22 | (1144) all_77_2_214 = 0
% 50.76/18.22 |
% 50.76/18.22 | From (1139) and (652) follows:
% 50.76/18.22 | (1145) intruder_message(all_61_4_176) = 0
% 50.76/18.22 |
% 50.76/18.22 | From (1140) and (656) follows:
% 50.76/18.22 | (1146) intruder_message(all_61_7_179) = 0
% 50.76/18.22 |
% 50.76/18.22 | From (1143) and (275) follows:
% 50.76/18.22 | (1147) intruder_message(b) = 0
% 50.76/18.22 |
% 50.76/18.22 +-Applying beta-rule and splitting (293), into two cases.
% 50.76/18.22 |-Branch one:
% 50.76/18.22 | (1148) ~ (all_77_1_213 = 0)
% 50.76/18.22 |
% 50.76/18.22 | Equations (565) can reduce 1148 to:
% 50.76/18.22 | (551) $false
% 50.76/18.22 |
% 50.76/18.22 |-The branch is then unsatisfiable
% 50.76/18.22 |-Branch two:
% 50.76/18.22 | (565) all_77_1_213 = 0
% 50.76/18.22 | (1151) ~ (all_77_2_214 = 0) | all_77_0_212 = 0
% 50.76/18.22 |
% 50.76/18.22 +-Applying beta-rule and splitting (1151), into two cases.
% 50.76/18.22 |-Branch one:
% 50.76/18.22 | (1152) ~ (all_77_2_214 = 0)
% 50.76/18.22 |
% 50.76/18.22 | Equations (1144) can reduce 1152 to:
% 50.76/18.22 | (551) $false
% 50.76/18.22 |
% 50.76/18.22 |-The branch is then unsatisfiable
% 50.76/18.22 |-Branch two:
% 50.76/18.22 | (1144) all_77_2_214 = 0
% 50.76/18.22 | (1155) all_77_0_212 = 0
% 50.76/18.22 |
% 50.76/18.22 | Combining equations (1155,468) yields a new equation:
% 50.76/18.22 | (1156) all_67_2_199 = 0
% 50.76/18.22 |
% 50.76/18.22 | Combining equations (1156,960) yields a new equation:
% 50.76/18.22 | (1157) all_363_3_763 = 0
% 50.76/18.22 |
% 50.76/18.22 | From (1156) and (273) follows:
% 50.76/18.22 | (1158) intruder_message(all_0_3_3) = 0
% 50.76/18.22 |
% 50.76/18.22 +-Applying beta-rule and splitting (882), into two cases.
% 50.76/18.22 |-Branch one:
% 50.76/18.22 | (1159) ~ (all_363_1_761 = 0)
% 50.76/18.22 |
% 50.76/18.22 | Equations (1106) can reduce 1159 to:
% 50.76/18.22 | (551) $false
% 50.76/18.22 |
% 50.76/18.22 |-The branch is then unsatisfiable
% 50.76/18.22 |-Branch two:
% 50.76/18.22 | (1106) all_363_1_761 = 0
% 50.76/18.22 | (1162) ~ (all_363_2_762 = 0) | ~ (all_363_3_763 = 0) | all_363_0_760 = 0
% 50.76/18.22 |
% 50.76/18.22 +-Applying beta-rule and splitting (1162), into two cases.
% 50.76/18.22 |-Branch one:
% 50.76/18.22 | (1163) ~ (all_363_2_762 = 0)
% 50.76/18.22 |
% 50.76/18.22 | Equations (1105) can reduce 1163 to:
% 50.76/18.22 | (551) $false
% 50.76/18.22 |
% 50.76/18.22 |-The branch is then unsatisfiable
% 50.76/18.22 |-Branch two:
% 50.76/18.22 | (1105) all_363_2_762 = 0
% 50.76/18.22 | (1166) ~ (all_363_3_763 = 0) | all_363_0_760 = 0
% 50.76/18.22 |
% 50.76/18.22 +-Applying beta-rule and splitting (1166), into two cases.
% 50.76/18.22 |-Branch one:
% 50.76/18.23 | (1167) ~ (all_363_3_763 = 0)
% 50.76/18.23 |
% 50.76/18.23 | Equations (1157) can reduce 1167 to:
% 50.76/18.23 | (551) $false
% 50.76/18.23 |
% 50.76/18.23 |-The branch is then unsatisfiable
% 50.76/18.23 |-Branch two:
% 50.76/18.23 | (1157) all_363_3_763 = 0
% 50.76/18.23 | (1170) all_363_0_760 = 0
% 50.76/18.23 |
% 50.76/18.23 | Combining equations (1170,993) yields a new equation:
% 50.76/18.23 | (1171) all_63_9_192 = 0
% 50.76/18.23 |
% 50.76/18.23 +-Applying beta-rule and splitting (266), into two cases.
% 50.76/18.23 |-Branch one:
% 50.76/18.23 | (1172) ~ (all_63_8_191 = 0)
% 50.76/18.23 |
% 50.76/18.23 | Equations (476) can reduce 1172 to:
% 50.76/18.23 | (551) $false
% 50.76/18.23 |
% 50.76/18.23 |-The branch is then unsatisfiable
% 50.76/18.23 |-Branch two:
% 50.76/18.23 | (476) all_63_8_191 = 0
% 50.76/18.23 | (1175) ~ (all_63_9_192 = 0) | (all_63_0_183 = 0 & all_63_1_184 = 0)
% 50.76/18.23 |
% 50.76/18.23 +-Applying beta-rule and splitting (1175), into two cases.
% 50.76/18.23 |-Branch one:
% 50.76/18.23 | (1176) ~ (all_63_9_192 = 0)
% 50.76/18.23 |
% 50.76/18.23 | Equations (1171) can reduce 1176 to:
% 50.76/18.23 | (551) $false
% 50.76/18.23 |
% 50.76/18.23 |-The branch is then unsatisfiable
% 50.76/18.23 |-Branch two:
% 50.76/18.23 | (1171) all_63_9_192 = 0
% 50.76/18.23 | (1179) all_63_0_183 = 0 & all_63_1_184 = 0
% 50.76/18.23 |
% 50.76/18.23 | Applying alpha-rule on (1179) yields:
% 50.76/18.23 | (1180) all_63_0_183 = 0
% 50.76/18.23 | (1181) all_63_1_184 = 0
% 50.76/18.23 |
% 50.76/18.23 | Combining equations (1181,1076) yields a new equation:
% 50.76/18.23 | (1182) all_303_1_660 = 0
% 50.76/18.23 |
% 50.76/18.23 +-Applying beta-rule and splitting (760), into two cases.
% 50.76/18.23 |-Branch one:
% 50.76/18.23 | (1183) ~ (all_303_1_660 = 0)
% 50.76/18.23 |
% 50.76/18.23 | Equations (1182) can reduce 1183 to:
% 50.76/18.23 | (551) $false
% 50.76/18.23 |
% 50.76/18.23 |-The branch is then unsatisfiable
% 50.76/18.23 |-Branch two:
% 50.76/18.23 | (1182) all_303_1_660 = 0
% 51.17/18.23 | (1186) all_303_0_659 = 0
% 51.17/18.23 |
% 51.17/18.23 | Combining equations (1078,1186) yields a new equation:
% 51.17/18.23 | (1187) all_295_3_648 = 0
% 51.17/18.23 |
% 51.17/18.23 | Simplifying 1187 yields:
% 51.17/18.23 | (1188) all_295_3_648 = 0
% 51.17/18.23 |
% 51.17/18.23 | From (1188) and (749) follows:
% 51.17/18.23 | (1189) intruder_message(all_63_3_186) = 0
% 51.17/18.23 |
% 51.17/18.23 +-Applying beta-rule and splitting (748), into two cases.
% 51.17/18.23 |-Branch one:
% 51.17/18.23 | (1190) ~ (all_295_3_648 = 0)
% 51.17/18.23 |
% 51.17/18.23 | Equations (1188) can reduce 1190 to:
% 51.17/18.23 | (551) $false
% 51.17/18.23 |
% 51.17/18.23 |-The branch is then unsatisfiable
% 51.17/18.23 |-Branch two:
% 51.17/18.23 | (1188) all_295_3_648 = 0
% 51.17/18.23 | (1193) all_295_0_645 = 0 & all_295_1_646 = 0 & all_295_2_647 = 0
% 51.17/18.23 |
% 51.17/18.23 | Applying alpha-rule on (1193) yields:
% 51.17/18.23 | (1194) all_295_0_645 = 0
% 51.17/18.23 | (1195) all_295_1_646 = 0
% 51.17/18.23 | (1196) all_295_2_647 = 0
% 51.17/18.23 |
% 51.17/18.23 | From (1194) and (750) follows:
% 51.17/18.23 | (1197) intruder_message(all_63_4_187) = 0
% 51.17/18.23 |
% 51.17/18.23 | Instantiating formula (64) with all_0_2_2, all_375_2_792, 0 and discharging atoms b_stored(all_0_2_2) = all_375_2_792, b_stored(all_0_2_2) = 0, yields:
% 51.17/18.23 | (1198) all_375_2_792 = 0
% 51.17/18.23 |
% 51.17/18.23 | Instantiating formula (8) with all_61_7_179, an_a_nonce, all_285_7_623, all_375_7_797 and discharging atoms encrypt(all_61_7_179, an_a_nonce) = all_375_7_797, encrypt(all_61_7_179, an_a_nonce) = all_285_7_623, yields:
% 51.17/18.23 | (1199) all_375_7_797 = all_285_7_623
% 51.17/18.23 |
% 51.17/18.23 | From (1199) and (1123) follows:
% 51.17/18.23 | (1124) encrypt(all_61_7_179, an_a_nonce) = all_285_7_623
% 51.17/18.23 |
% 51.17/18.23 | From (1199) and (1125) follows:
% 51.17/18.23 | (1201) pair(all_61_4_176, all_285_7_623) = all_375_6_796
% 51.17/18.23 |
% 51.17/18.23 +-Applying beta-rule and splitting (165), into two cases.
% 51.17/18.23 |-Branch one:
% 51.17/18.23 | (1202) all_19_4_93 = 0
% 51.17/18.23 |
% 51.17/18.23 | From (1202) and (134) follows:
% 51.17/18.23 | (1203) intruder_message(all_19_5_94) = 0
% 51.17/18.23 |
% 51.17/18.23 +-Applying beta-rule and splitting (167), into two cases.
% 51.17/18.23 |-Branch one:
% 51.17/18.23 | (1204) all_17_0_80 = 0
% 51.17/18.23 |
% 51.17/18.23 | From (1204) and (128) follows:
% 51.17/18.23 | (1205) intruder_message(all_17_1_81) = 0
% 51.17/18.23 |
% 51.17/18.23 | Instantiating formula (19) with all_19_5_94, a, all_19_7_96, all_19_8_97 and discharging atoms party_of_protocol(a) = 0, intruder_message(all_19_5_94) = 0, encrypt(all_19_8_97, all_19_7_96) = all_19_5_94, yields:
% 51.17/18.23 | (1206) ? [v0] : ? [v1] : ? [v2] : (intruder_holds(v0) = v1 & intruder_message(all_19_7_96) = v2 & key(all_19_7_96, a) = v0 & ( ~ (v1 = 0) | v2 = 0))
% 51.17/18.23 |
% 51.17/18.23 | Instantiating formula (19) with all_17_1_81, a, all_17_7_87, all_17_8_88 and discharging atoms party_of_protocol(a) = 0, intruder_message(all_17_1_81) = 0, encrypt(all_17_8_88, all_17_7_87) = all_17_1_81, yields:
% 51.17/18.23 | (1207) ? [v0] : ? [v1] : ? [v2] : (intruder_holds(v0) = v1 & intruder_message(all_17_7_87) = v2 & key(all_17_7_87, a) = v0 & ( ~ (v1 = 0) | v2 = 0))
% 51.17/18.23 |
% 51.17/18.23 | Instantiating formula (40) with all_369_3_774, all_369_4_775, all_369_7_778, b and discharging atoms triple(b, all_369_7_778, all_369_4_775) = all_369_3_774, yields:
% 51.17/18.23 | (1208) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (intruder_message(all_369_3_774) = v3 & intruder_message(all_369_4_775) = v2 & intruder_message(all_369_7_778) = v1 & intruder_message(b) = v0 & ( ~ (v2 = 0) | ~ (v1 = 0) | ~ (v0 = 0) | v3 = 0))
% 51.17/18.23 |
% 51.17/18.23 | Instantiating formula (68) with all_369_3_774, all_369_4_775, all_369_7_778, b and discharging atoms triple(b, all_369_7_778, all_369_4_775) = all_369_3_774, yields:
% 51.17/18.23 | (1209) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (intruder_message(all_369_3_774) = v0 & intruder_message(all_369_4_775) = v3 & intruder_message(all_369_7_778) = v2 & intruder_message(b) = v1 & ( ~ (v0 = 0) | (v3 = 0 & v2 = 0 & v1 = 0)))
% 51.17/18.23 |
% 51.17/18.23 | Instantiating formula (70) with all_285_6_622, all_285_7_623, all_63_4_187 and discharging atoms pair(all_63_4_187, all_285_7_623) = all_285_6_622, yields:
% 51.17/18.23 | (1210) ? [v0] : ? [v1] : ? [v2] : ? [v3] : ? [v4] : ? [v5] : ? [v6] : ? [v7] : ? [v8] : ? [v9] : ? [v10] : (fresh_to_b(all_285_7_623) = v2 & generate_b_nonce(all_285_7_623) = v3 & generate_expiration_time(all_285_7_623) = v4 & b_stored(all_285_6_622) = v10 & triple(all_63_4_187, all_285_7_623, v4) = v5 & triple(b, v3, v6) = v7 & encrypt(v5, bt) = v6 & sent(all_63_4_187, b, all_285_6_622) = v0 & sent(b, t, v7) = v8 & message(v8) = v9 & message(v0) = v1 & ( ~ (v2 = 0) | ~ (v1 = 0) | (v10 = 0 & v9 = 0)))
% 51.17/18.23 |
% 51.17/18.23 | Instantiating formula (12) with all_285_6_622, all_285_7_623, all_63_4_187 and discharging atoms pair(all_63_4_187, all_285_7_623) = all_285_6_622, yields:
% 51.17/18.23 | (1211) ? [v0] : ? [v1] : ? [v2] : (intruder_message(all_285_6_622) = v2 & intruder_message(all_285_7_623) = v1 & intruder_message(all_63_4_187) = v0 & ( ~ (v1 = 0) | ~ (v0 = 0) | v2 = 0))
% 51.17/18.23 |
% 51.17/18.23 | Instantiating formula (56) with all_285_6_622, all_285_7_623, all_63_4_187 and discharging atoms pair(all_63_4_187, all_285_7_623) = all_285_6_622, yields:
% 51.17/18.23 | (1212) ? [v0] : ? [v1] : ? [v2] : (intruder_message(all_285_6_622) = v0 & intruder_message(all_285_7_623) = v2 & intruder_message(all_63_4_187) = v1 & ( ~ (v0 = 0) | (v2 = 0 & v1 = 0)))
% 51.17/18.23 |
% 51.17/18.23 | Instantiating formula (70) with all_375_6_796, all_285_7_623, all_61_4_176 and discharging atoms pair(all_61_4_176, all_285_7_623) = all_375_6_796, yields:
% 51.17/18.23 | (1213) ? [v0] : ? [v1] : ? [v2] : ? [v3] : ? [v4] : ? [v5] : ? [v6] : ? [v7] : ? [v8] : ? [v9] : ? [v10] : (fresh_to_b(all_285_7_623) = v2 & generate_b_nonce(all_285_7_623) = v3 & generate_expiration_time(all_285_7_623) = v4 & b_stored(all_375_6_796) = v10 & triple(all_61_4_176, all_285_7_623, v4) = v5 & triple(b, v3, v6) = v7 & encrypt(v5, bt) = v6 & sent(all_61_4_176, b, all_375_6_796) = v0 & sent(b, t, v7) = v8 & message(v8) = v9 & message(v0) = v1 & ( ~ (v2 = 0) | ~ (v1 = 0) | (v10 = 0 & v9 = 0)))
% 51.17/18.23 |
% 51.17/18.23 | Instantiating formula (12) with all_375_6_796, all_285_7_623, all_61_4_176 and discharging atoms pair(all_61_4_176, all_285_7_623) = all_375_6_796, yields:
% 51.17/18.23 | (1214) ? [v0] : ? [v1] : ? [v2] : (intruder_message(all_375_6_796) = v2 & intruder_message(all_285_7_623) = v1 & intruder_message(all_61_4_176) = v0 & ( ~ (v1 = 0) | ~ (v0 = 0) | v2 = 0))
% 51.17/18.23 |
% 51.17/18.23 | Instantiating formula (56) with all_375_6_796, all_285_7_623, all_61_4_176 and discharging atoms pair(all_61_4_176, all_285_7_623) = all_375_6_796, yields:
% 51.17/18.23 | (1215) ? [v0] : ? [v1] : ? [v2] : (intruder_message(all_375_6_796) = v0 & intruder_message(all_285_7_623) = v2 & intruder_message(all_61_4_176) = v1 & ( ~ (v0 = 0) | (v2 = 0 & v1 = 0)))
% 51.17/18.23 |
% 51.17/18.23 | Instantiating formula (73) with all_281_5_601, b, all_15_14_75, all_281_6_602 and discharging atoms sent(all_15_14_75, b, all_281_6_602) = all_281_5_601, yields:
% 51.17/18.23 | (1216) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (party_of_protocol(all_15_14_75) = v1 & party_of_protocol(b) = v2 & intruder_message(all_281_6_602) = v0 & message(all_281_5_601) = v3 & ( ~ (v2 = 0) | ~ (v1 = 0) | ~ (v0 = 0) | v3 = 0))
% 51.17/18.23 |
% 51.17/18.23 | Instantiating formula (73) with all_269_5_559, b, all_15_15_76, all_269_6_560 and discharging atoms sent(all_15_15_76, b, all_269_6_560) = all_269_5_559, yields:
% 51.17/18.23 | (1217) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (party_of_protocol(all_15_15_76) = v1 & party_of_protocol(b) = v2 & intruder_message(all_269_6_560) = v0 & message(all_269_5_559) = v3 & ( ~ (v2 = 0) | ~ (v1 = 0) | ~ (v0 = 0) | v3 = 0))
% 51.17/18.23 |
% 51.17/18.23 | Instantiating formula (73) with all_277_5_581, b, all_13_9_55, all_277_6_582 and discharging atoms sent(all_13_9_55, b, all_277_6_582) = all_277_5_581, yields:
% 51.17/18.23 | (1218) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (party_of_protocol(all_13_9_55) = v1 & party_of_protocol(b) = v2 & intruder_message(all_277_6_582) = v0 & message(all_277_5_581) = v3 & ( ~ (v2 = 0) | ~ (v1 = 0) | ~ (v0 = 0) | v3 = 0))
% 51.17/18.23 |
% 51.17/18.23 | Instantiating formula (73) with all_369_10_781, b, all_11_4_36, all_131_6_319 and discharging atoms sent(all_11_4_36, b, all_131_6_319) = all_369_10_781, yields:
% 51.17/18.23 | (1219) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (party_of_protocol(all_11_4_36) = v1 & party_of_protocol(b) = v2 & intruder_message(all_131_6_319) = v0 & message(all_369_10_781) = v3 & ( ~ (v2 = 0) | ~ (v1 = 0) | ~ (v0 = 0) | v3 = 0))
% 51.17/18.23 |
% 51.17/18.23 | Instantiating formula (73) with all_285_5_621, b, b, all_285_6_622 and discharging atoms sent(b, b, all_285_6_622) = all_285_5_621, yields:
% 51.17/18.23 | (1220) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (party_of_protocol(b) = v2 & party_of_protocol(b) = v1 & intruder_message(all_285_6_622) = v0 & message(all_285_5_621) = v3 & ( ~ (v2 = 0) | ~ (v1 = 0) | ~ (v0 = 0) | v3 = 0))
% 51.17/18.23 |
% 51.17/18.23 | Instantiating formula (73) with all_369_2_773, t, b, all_369_3_774 and discharging atoms sent(b, t, all_369_3_774) = all_369_2_773, yields:
% 51.17/18.23 | (1221) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (party_of_protocol(b) = v1 & party_of_protocol(t) = v2 & intruder_message(all_369_3_774) = v0 & message(all_369_2_773) = v3 & ( ~ (v2 = 0) | ~ (v1 = 0) | ~ (v0 = 0) | v3 = 0))
% 51.17/18.23 |
% 51.17/18.23 | Instantiating formula (73) with all_375_5_795, b, a, all_375_6_796 and discharging atoms sent(a, b, all_375_6_796) = all_375_5_795, yields:
% 51.17/18.23 | (1222) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (party_of_protocol(b) = v2 & party_of_protocol(a) = v1 & intruder_message(all_375_6_796) = v0 & message(all_375_5_795) = v3 & ( ~ (v2 = 0) | ~ (v1 = 0) | ~ (v0 = 0) | v3 = 0))
% 51.17/18.23 |
% 51.17/18.23 | Instantiating formula (4) with all_375_5_795, all_375_6_796, b, a and discharging atoms sent(a, b, all_375_6_796) = all_375_5_795, yields:
% 51.17/18.23 | (1223) ? [v0] : ? [v1] : (intruder_message(all_375_6_796) = v1 & message(all_375_5_795) = v0 & ( ~ (v0 = 0) | v1 = 0))
% 51.17/18.23 |
% 51.17/18.23 | Instantiating formula (57) with all_277_1_577, all_13_9_55, all_13_7_53 and discharging atoms key(all_13_7_53, all_13_9_55) = all_277_1_577, yields:
% 51.17/18.24 | (1224) ? [v0] : ? [v1] : ? [v2] : (intruder_holds(all_277_1_577) = v2 & party_of_protocol(all_13_9_55) = v1 & intruder_message(all_13_7_53) = v0 & ( ~ (v1 = 0) | ~ (v0 = 0) | v2 = 0))
% 51.17/18.24 |
% 51.17/18.24 | Instantiating formula (39) with all_285_1_617, an_a_nonce and discharging atoms key(an_a_nonce, b) = all_285_1_617, yields:
% 51.17/18.24 | (1225) ? [v0] : ? [v1] : ? [v2] : (intruder_holds(all_285_1_617) = v0 & b_holds(v1) = v2 & key(an_a_nonce, a) = v1 & ( ~ (v2 = 0) | ~ (v0 = 0)))
% 51.17/18.24 |
% 51.17/18.24 | Instantiating formula (57) with all_285_1_617, b, an_a_nonce and discharging atoms key(an_a_nonce, b) = all_285_1_617, yields:
% 51.17/18.24 | (1226) ? [v0] : ? [v1] : ? [v2] : (intruder_holds(all_285_1_617) = v2 & party_of_protocol(b) = v1 & intruder_message(an_a_nonce) = v0 & ( ~ (v1 = 0) | ~ (v0 = 0) | v2 = 0))
% 51.17/18.24 |
% 51.17/18.24 | Instantiating formula (62) with all_375_1_791, an_a_nonce and discharging atoms key(an_a_nonce, a) = all_375_1_791, yields:
% 51.17/18.24 | (1227) ? [v0] : ? [v1] : ? [v2] : (intruder_holds(v0) = v1 & b_holds(all_375_1_791) = v2 & key(an_a_nonce, b) = v0 & ( ~ (v2 = 0) | ~ (v1 = 0)))
% 51.17/18.24 |
% 51.17/18.24 | Instantiating formula (57) with all_375_1_791, a, an_a_nonce and discharging atoms key(an_a_nonce, a) = all_375_1_791, yields:
% 51.17/18.24 | (1228) ? [v0] : ? [v1] : ? [v2] : (intruder_holds(all_375_1_791) = v2 & party_of_protocol(a) = v1 & intruder_message(an_a_nonce) = v0 & ( ~ (v1 = 0) | ~ (v0 = 0) | v2 = 0))
% 51.17/18.24 |
% 51.17/18.24 | Instantiating (1206) with all_745_0_803, all_745_1_804, all_745_2_805 yields:
% 51.17/18.24 | (1229) intruder_holds(all_745_2_805) = all_745_1_804 & intruder_message(all_19_7_96) = all_745_0_803 & key(all_19_7_96, a) = all_745_2_805 & ( ~ (all_745_1_804 = 0) | all_745_0_803 = 0)
% 51.17/18.24 |
% 51.17/18.24 | Applying alpha-rule on (1229) yields:
% 51.17/18.24 | (1230) intruder_holds(all_745_2_805) = all_745_1_804
% 51.17/18.24 | (1231) intruder_message(all_19_7_96) = all_745_0_803
% 51.17/18.24 | (1232) key(all_19_7_96, a) = all_745_2_805
% 51.17/18.24 | (1233) ~ (all_745_1_804 = 0) | all_745_0_803 = 0
% 51.17/18.24 |
% 51.17/18.24 | Instantiating (1228) with all_753_0_815, all_753_1_816, all_753_2_817 yields:
% 51.17/18.24 | (1234) intruder_holds(all_375_1_791) = all_753_0_815 & party_of_protocol(a) = all_753_1_816 & intruder_message(an_a_nonce) = all_753_2_817 & ( ~ (all_753_1_816 = 0) | ~ (all_753_2_817 = 0) | all_753_0_815 = 0)
% 51.17/18.24 |
% 51.17/18.24 | Applying alpha-rule on (1234) yields:
% 51.17/18.24 | (1235) intruder_holds(all_375_1_791) = all_753_0_815
% 51.17/18.24 | (1236) party_of_protocol(a) = all_753_1_816
% 51.17/18.24 | (1237) intruder_message(an_a_nonce) = all_753_2_817
% 51.17/18.24 | (1238) ~ (all_753_1_816 = 0) | ~ (all_753_2_817 = 0) | all_753_0_815 = 0
% 51.17/18.24 |
% 51.17/18.24 | Instantiating (1226) with all_755_0_818, all_755_1_819, all_755_2_820 yields:
% 51.17/18.24 | (1239) intruder_holds(all_285_1_617) = all_755_0_818 & party_of_protocol(b) = all_755_1_819 & intruder_message(an_a_nonce) = all_755_2_820 & ( ~ (all_755_1_819 = 0) | ~ (all_755_2_820 = 0) | all_755_0_818 = 0)
% 51.17/18.24 |
% 51.17/18.24 | Applying alpha-rule on (1239) yields:
% 51.17/18.24 | (1240) intruder_holds(all_285_1_617) = all_755_0_818
% 51.17/18.24 | (1241) party_of_protocol(b) = all_755_1_819
% 51.17/18.24 | (1242) intruder_message(an_a_nonce) = all_755_2_820
% 51.17/18.24 | (1243) ~ (all_755_1_819 = 0) | ~ (all_755_2_820 = 0) | all_755_0_818 = 0
% 51.17/18.24 |
% 51.17/18.24 | Instantiating (1225) with all_757_0_821, all_757_1_822, all_757_2_823 yields:
% 51.17/18.24 | (1244) intruder_holds(all_285_1_617) = all_757_2_823 & b_holds(all_757_1_822) = all_757_0_821 & key(an_a_nonce, a) = all_757_1_822 & ( ~ (all_757_0_821 = 0) | ~ (all_757_2_823 = 0))
% 51.17/18.24 |
% 51.17/18.24 | Applying alpha-rule on (1244) yields:
% 51.17/18.24 | (1245) intruder_holds(all_285_1_617) = all_757_2_823
% 51.17/18.24 | (1246) b_holds(all_757_1_822) = all_757_0_821
% 51.17/18.24 | (1247) key(an_a_nonce, a) = all_757_1_822
% 51.17/18.24 | (1248) ~ (all_757_0_821 = 0) | ~ (all_757_2_823 = 0)
% 51.17/18.24 |
% 51.17/18.24 | Instantiating (1227) with all_759_0_824, all_759_1_825, all_759_2_826 yields:
% 51.17/18.24 | (1249) intruder_holds(all_759_2_826) = all_759_1_825 & b_holds(all_375_1_791) = all_759_0_824 & key(an_a_nonce, b) = all_759_2_826 & ( ~ (all_759_0_824 = 0) | ~ (all_759_1_825 = 0))
% 51.17/18.24 |
% 51.17/18.24 | Applying alpha-rule on (1249) yields:
% 51.17/18.24 | (1250) intruder_holds(all_759_2_826) = all_759_1_825
% 51.17/18.24 | (1251) b_holds(all_375_1_791) = all_759_0_824
% 51.17/18.24 | (1252) key(an_a_nonce, b) = all_759_2_826
% 51.17/18.24 | (1253) ~ (all_759_0_824 = 0) | ~ (all_759_1_825 = 0)
% 51.17/18.24 |
% 51.17/18.24 | Instantiating (1222) with all_763_0_830, all_763_1_831, all_763_2_832, all_763_3_833 yields:
% 51.17/18.24 | (1254) party_of_protocol(b) = all_763_1_831 & party_of_protocol(a) = all_763_2_832 & intruder_message(all_375_6_796) = all_763_3_833 & message(all_375_5_795) = all_763_0_830 & ( ~ (all_763_1_831 = 0) | ~ (all_763_2_832 = 0) | ~ (all_763_3_833 = 0) | all_763_0_830 = 0)
% 51.17/18.24 |
% 51.17/18.24 | Applying alpha-rule on (1254) yields:
% 51.17/18.24 | (1255) party_of_protocol(b) = all_763_1_831
% 51.17/18.24 | (1256) intruder_message(all_375_6_796) = all_763_3_833
% 51.17/18.24 | (1257) party_of_protocol(a) = all_763_2_832
% 51.17/18.24 | (1258) ~ (all_763_1_831 = 0) | ~ (all_763_2_832 = 0) | ~ (all_763_3_833 = 0) | all_763_0_830 = 0
% 51.17/18.24 | (1259) message(all_375_5_795) = all_763_0_830
% 51.17/18.24 |
% 51.17/18.24 | Instantiating (1223) with all_779_0_870, all_779_1_871 yields:
% 51.17/18.24 | (1260) intruder_message(all_375_6_796) = all_779_0_870 & message(all_375_5_795) = all_779_1_871 & ( ~ (all_779_1_871 = 0) | all_779_0_870 = 0)
% 51.17/18.24 |
% 51.17/18.24 | Applying alpha-rule on (1260) yields:
% 51.17/18.24 | (1261) intruder_message(all_375_6_796) = all_779_0_870
% 51.17/18.24 | (1262) message(all_375_5_795) = all_779_1_871
% 51.17/18.24 | (1263) ~ (all_779_1_871 = 0) | all_779_0_870 = 0
% 51.17/18.24 |
% 51.17/18.24 | Instantiating (1219) with all_781_0_872, all_781_1_873, all_781_2_874, all_781_3_875 yields:
% 51.17/18.24 | (1264) party_of_protocol(all_11_4_36) = all_781_2_874 & party_of_protocol(b) = all_781_1_873 & intruder_message(all_131_6_319) = all_781_3_875 & message(all_369_10_781) = all_781_0_872 & ( ~ (all_781_1_873 = 0) | ~ (all_781_2_874 = 0) | ~ (all_781_3_875 = 0) | all_781_0_872 = 0)
% 51.17/18.24 |
% 51.17/18.24 | Applying alpha-rule on (1264) yields:
% 51.17/18.24 | (1265) ~ (all_781_1_873 = 0) | ~ (all_781_2_874 = 0) | ~ (all_781_3_875 = 0) | all_781_0_872 = 0
% 51.17/18.24 | (1266) party_of_protocol(b) = all_781_1_873
% 51.17/18.24 | (1267) message(all_369_10_781) = all_781_0_872
% 51.17/18.24 | (1268) intruder_message(all_131_6_319) = all_781_3_875
% 51.17/18.24 | (1269) party_of_protocol(all_11_4_36) = all_781_2_874
% 51.17/18.24 |
% 51.17/18.24 | Instantiating (1218) with all_783_0_876, all_783_1_877, all_783_2_878, all_783_3_879 yields:
% 51.17/18.24 | (1270) party_of_protocol(all_13_9_55) = all_783_2_878 & party_of_protocol(b) = all_783_1_877 & intruder_message(all_277_6_582) = all_783_3_879 & message(all_277_5_581) = all_783_0_876 & ( ~ (all_783_1_877 = 0) | ~ (all_783_2_878 = 0) | ~ (all_783_3_879 = 0) | all_783_0_876 = 0)
% 51.17/18.24 |
% 51.17/18.24 | Applying alpha-rule on (1270) yields:
% 51.17/18.24 | (1271) message(all_277_5_581) = all_783_0_876
% 51.17/18.24 | (1272) party_of_protocol(b) = all_783_1_877
% 51.17/18.24 | (1273) party_of_protocol(all_13_9_55) = all_783_2_878
% 51.17/18.24 | (1274) intruder_message(all_277_6_582) = all_783_3_879
% 51.17/18.24 | (1275) ~ (all_783_1_877 = 0) | ~ (all_783_2_878 = 0) | ~ (all_783_3_879 = 0) | all_783_0_876 = 0
% 51.17/18.24 |
% 51.17/18.24 | Instantiating (1221) with all_789_0_884, all_789_1_885, all_789_2_886, all_789_3_887 yields:
% 51.17/18.24 | (1276) party_of_protocol(b) = all_789_2_886 & party_of_protocol(t) = all_789_1_885 & intruder_message(all_369_3_774) = all_789_3_887 & message(all_369_2_773) = all_789_0_884 & ( ~ (all_789_1_885 = 0) | ~ (all_789_2_886 = 0) | ~ (all_789_3_887 = 0) | all_789_0_884 = 0)
% 51.17/18.24 |
% 51.17/18.24 | Applying alpha-rule on (1276) yields:
% 51.17/18.24 | (1277) party_of_protocol(t) = all_789_1_885
% 51.17/18.24 | (1278) intruder_message(all_369_3_774) = all_789_3_887
% 51.17/18.24 | (1279) message(all_369_2_773) = all_789_0_884
% 51.17/18.24 | (1280) ~ (all_789_1_885 = 0) | ~ (all_789_2_886 = 0) | ~ (all_789_3_887 = 0) | all_789_0_884 = 0
% 51.17/18.24 | (1281) party_of_protocol(b) = all_789_2_886
% 51.17/18.24 |
% 51.17/18.24 | Instantiating (1220) with all_793_0_890, all_793_1_891, all_793_2_892, all_793_3_893 yields:
% 51.17/18.24 | (1282) party_of_protocol(b) = all_793_1_891 & party_of_protocol(b) = all_793_2_892 & intruder_message(all_285_6_622) = all_793_3_893 & message(all_285_5_621) = all_793_0_890 & ( ~ (all_793_1_891 = 0) | ~ (all_793_2_892 = 0) | ~ (all_793_3_893 = 0) | all_793_0_890 = 0)
% 51.17/18.24 |
% 51.17/18.24 | Applying alpha-rule on (1282) yields:
% 51.17/18.24 | (1283) message(all_285_5_621) = all_793_0_890
% 51.17/18.24 | (1284) ~ (all_793_1_891 = 0) | ~ (all_793_2_892 = 0) | ~ (all_793_3_893 = 0) | all_793_0_890 = 0
% 51.17/18.24 | (1285) intruder_message(all_285_6_622) = all_793_3_893
% 51.17/18.24 | (1286) party_of_protocol(b) = all_793_1_891
% 51.17/18.24 | (1287) party_of_protocol(b) = all_793_2_892
% 51.17/18.24 |
% 51.17/18.24 | Instantiating (1217) with all_797_0_896, all_797_1_897, all_797_2_898, all_797_3_899 yields:
% 51.17/18.24 | (1288) party_of_protocol(all_15_15_76) = all_797_2_898 & party_of_protocol(b) = all_797_1_897 & intruder_message(all_269_6_560) = all_797_3_899 & message(all_269_5_559) = all_797_0_896 & ( ~ (all_797_1_897 = 0) | ~ (all_797_2_898 = 0) | ~ (all_797_3_899 = 0) | all_797_0_896 = 0)
% 51.17/18.24 |
% 51.17/18.24 | Applying alpha-rule on (1288) yields:
% 51.17/18.24 | (1289) intruder_message(all_269_6_560) = all_797_3_899
% 51.17/18.24 | (1290) party_of_protocol(b) = all_797_1_897
% 51.17/18.24 | (1291) message(all_269_5_559) = all_797_0_896
% 51.17/18.24 | (1292) party_of_protocol(all_15_15_76) = all_797_2_898
% 51.17/18.24 | (1293) ~ (all_797_1_897 = 0) | ~ (all_797_2_898 = 0) | ~ (all_797_3_899 = 0) | all_797_0_896 = 0
% 51.17/18.24 |
% 51.17/18.24 | Instantiating (1209) with all_807_0_911, all_807_1_912, all_807_2_913, all_807_3_914 yields:
% 51.17/18.24 | (1294) intruder_message(all_369_3_774) = all_807_3_914 & intruder_message(all_369_4_775) = all_807_0_911 & intruder_message(all_369_7_778) = all_807_1_912 & intruder_message(b) = all_807_2_913 & ( ~ (all_807_3_914 = 0) | (all_807_0_911 = 0 & all_807_1_912 = 0 & all_807_2_913 = 0))
% 51.17/18.24 |
% 51.17/18.24 | Applying alpha-rule on (1294) yields:
% 51.17/18.24 | (1295) intruder_message(all_369_4_775) = all_807_0_911
% 51.17/18.24 | (1296) intruder_message(all_369_7_778) = all_807_1_912
% 51.17/18.24 | (1297) intruder_message(all_369_3_774) = all_807_3_914
% 51.17/18.24 | (1298) intruder_message(b) = all_807_2_913
% 51.17/18.25 | (1299) ~ (all_807_3_914 = 0) | (all_807_0_911 = 0 & all_807_1_912 = 0 & all_807_2_913 = 0)
% 51.17/18.25 |
% 51.17/18.25 | Instantiating (1208) with all_809_0_915, all_809_1_916, all_809_2_917, all_809_3_918 yields:
% 51.17/18.25 | (1300) intruder_message(all_369_3_774) = all_809_0_915 & intruder_message(all_369_4_775) = all_809_1_916 & intruder_message(all_369_7_778) = all_809_2_917 & intruder_message(b) = all_809_3_918 & ( ~ (all_809_1_916 = 0) | ~ (all_809_2_917 = 0) | ~ (all_809_3_918 = 0) | all_809_0_915 = 0)
% 51.17/18.25 |
% 51.17/18.25 | Applying alpha-rule on (1300) yields:
% 51.17/18.25 | (1301) intruder_message(all_369_3_774) = all_809_0_915
% 51.17/18.25 | (1302) ~ (all_809_1_916 = 0) | ~ (all_809_2_917 = 0) | ~ (all_809_3_918 = 0) | all_809_0_915 = 0
% 51.17/18.25 | (1303) intruder_message(all_369_7_778) = all_809_2_917
% 51.17/18.25 | (1304) intruder_message(b) = all_809_3_918
% 51.17/18.25 | (1305) intruder_message(all_369_4_775) = all_809_1_916
% 51.17/18.25 |
% 51.17/18.25 | Instantiating (1224) with all_813_0_930, all_813_1_931, all_813_2_932 yields:
% 51.17/18.25 | (1306) intruder_holds(all_277_1_577) = all_813_0_930 & party_of_protocol(all_13_9_55) = all_813_1_931 & intruder_message(all_13_7_53) = all_813_2_932 & ( ~ (all_813_1_931 = 0) | ~ (all_813_2_932 = 0) | all_813_0_930 = 0)
% 51.17/18.25 |
% 51.17/18.25 | Applying alpha-rule on (1306) yields:
% 51.17/18.25 | (1307) intruder_holds(all_277_1_577) = all_813_0_930
% 51.17/18.25 | (1308) party_of_protocol(all_13_9_55) = all_813_1_931
% 51.17/18.25 | (1309) intruder_message(all_13_7_53) = all_813_2_932
% 51.17/18.25 | (1310) ~ (all_813_1_931 = 0) | ~ (all_813_2_932 = 0) | all_813_0_930 = 0
% 51.17/18.25 |
% 51.17/18.25 | Instantiating (1216) with all_821_0_950, all_821_1_951, all_821_2_952, all_821_3_953 yields:
% 51.17/18.25 | (1311) party_of_protocol(all_15_14_75) = all_821_2_952 & party_of_protocol(b) = all_821_1_951 & intruder_message(all_281_6_602) = all_821_3_953 & message(all_281_5_601) = all_821_0_950 & ( ~ (all_821_1_951 = 0) | ~ (all_821_2_952 = 0) | ~ (all_821_3_953 = 0) | all_821_0_950 = 0)
% 51.17/18.25 |
% 51.17/18.25 | Applying alpha-rule on (1311) yields:
% 51.17/18.25 | (1312) ~ (all_821_1_951 = 0) | ~ (all_821_2_952 = 0) | ~ (all_821_3_953 = 0) | all_821_0_950 = 0
% 51.17/18.25 | (1313) message(all_281_5_601) = all_821_0_950
% 51.17/18.25 | (1314) party_of_protocol(b) = all_821_1_951
% 51.17/18.25 | (1315) intruder_message(all_281_6_602) = all_821_3_953
% 51.17/18.25 | (1316) party_of_protocol(all_15_14_75) = all_821_2_952
% 51.17/18.25 |
% 51.17/18.25 | Instantiating (1215) with all_823_0_954, all_823_1_955, all_823_2_956 yields:
% 51.17/18.25 | (1317) intruder_message(all_375_6_796) = all_823_2_956 & intruder_message(all_285_7_623) = all_823_0_954 & intruder_message(all_61_4_176) = all_823_1_955 & ( ~ (all_823_2_956 = 0) | (all_823_0_954 = 0 & all_823_1_955 = 0))
% 51.17/18.25 |
% 51.17/18.25 | Applying alpha-rule on (1317) yields:
% 51.17/18.25 | (1318) intruder_message(all_375_6_796) = all_823_2_956
% 51.17/18.25 | (1319) intruder_message(all_285_7_623) = all_823_0_954
% 51.17/18.25 | (1320) intruder_message(all_61_4_176) = all_823_1_955
% 51.17/18.25 | (1321) ~ (all_823_2_956 = 0) | (all_823_0_954 = 0 & all_823_1_955 = 0)
% 51.17/18.25 |
% 51.17/18.25 | Instantiating (1214) with all_825_0_957, all_825_1_958, all_825_2_959 yields:
% 51.17/18.25 | (1322) intruder_message(all_375_6_796) = all_825_0_957 & intruder_message(all_285_7_623) = all_825_1_958 & intruder_message(all_61_4_176) = all_825_2_959 & ( ~ (all_825_1_958 = 0) | ~ (all_825_2_959 = 0) | all_825_0_957 = 0)
% 51.17/18.25 |
% 51.17/18.25 | Applying alpha-rule on (1322) yields:
% 51.17/18.25 | (1323) intruder_message(all_375_6_796) = all_825_0_957
% 51.17/18.25 | (1324) intruder_message(all_285_7_623) = all_825_1_958
% 51.17/18.25 | (1325) intruder_message(all_61_4_176) = all_825_2_959
% 51.17/18.25 | (1326) ~ (all_825_1_958 = 0) | ~ (all_825_2_959 = 0) | all_825_0_957 = 0
% 51.17/18.25 |
% 51.17/18.25 | Instantiating (1212) with all_827_0_960, all_827_1_961, all_827_2_962 yields:
% 51.17/18.25 | (1327) intruder_message(all_285_6_622) = all_827_2_962 & intruder_message(all_285_7_623) = all_827_0_960 & intruder_message(all_63_4_187) = all_827_1_961 & ( ~ (all_827_2_962 = 0) | (all_827_0_960 = 0 & all_827_1_961 = 0))
% 51.17/18.25 |
% 51.17/18.25 | Applying alpha-rule on (1327) yields:
% 51.17/18.25 | (1328) intruder_message(all_285_6_622) = all_827_2_962
% 51.17/18.25 | (1329) intruder_message(all_285_7_623) = all_827_0_960
% 51.17/18.25 | (1330) intruder_message(all_63_4_187) = all_827_1_961
% 51.17/18.25 | (1331) ~ (all_827_2_962 = 0) | (all_827_0_960 = 0 & all_827_1_961 = 0)
% 51.17/18.25 |
% 51.17/18.25 | Instantiating (1211) with all_829_0_963, all_829_1_964, all_829_2_965 yields:
% 51.17/18.25 | (1332) intruder_message(all_285_6_622) = all_829_0_963 & intruder_message(all_285_7_623) = all_829_1_964 & intruder_message(all_63_4_187) = all_829_2_965 & ( ~ (all_829_1_964 = 0) | ~ (all_829_2_965 = 0) | all_829_0_963 = 0)
% 51.17/18.25 |
% 51.17/18.25 | Applying alpha-rule on (1332) yields:
% 51.17/18.25 | (1333) intruder_message(all_285_6_622) = all_829_0_963
% 51.17/18.25 | (1334) intruder_message(all_285_7_623) = all_829_1_964
% 51.17/18.25 | (1335) intruder_message(all_63_4_187) = all_829_2_965
% 51.17/18.25 | (1336) ~ (all_829_1_964 = 0) | ~ (all_829_2_965 = 0) | all_829_0_963 = 0
% 51.17/18.25 |
% 51.17/18.25 | Instantiating (1207) with all_833_0_969, all_833_1_970, all_833_2_971 yields:
% 51.17/18.25 | (1337) intruder_holds(all_833_2_971) = all_833_1_970 & intruder_message(all_17_7_87) = all_833_0_969 & key(all_17_7_87, a) = all_833_2_971 & ( ~ (all_833_1_970 = 0) | all_833_0_969 = 0)
% 51.17/18.25 |
% 51.17/18.25 | Applying alpha-rule on (1337) yields:
% 51.17/18.25 | (1338) intruder_holds(all_833_2_971) = all_833_1_970
% 51.17/18.25 | (1339) intruder_message(all_17_7_87) = all_833_0_969
% 51.17/18.25 | (1340) key(all_17_7_87, a) = all_833_2_971
% 51.17/18.25 | (1341) ~ (all_833_1_970 = 0) | all_833_0_969 = 0
% 51.17/18.25 |
% 51.17/18.25 | Instantiating (1213) with all_835_0_972, all_835_1_973, all_835_2_974, all_835_3_975, all_835_4_976, all_835_5_977, all_835_6_978, all_835_7_979, all_835_8_980, all_835_9_981, all_835_10_982 yields:
% 51.17/18.25 | (1342) fresh_to_b(all_285_7_623) = all_835_8_980 & generate_b_nonce(all_285_7_623) = all_835_7_979 & generate_expiration_time(all_285_7_623) = all_835_6_978 & b_stored(all_375_6_796) = all_835_0_972 & triple(all_61_4_176, all_285_7_623, all_835_6_978) = all_835_5_977 & triple(b, all_835_7_979, all_835_4_976) = all_835_3_975 & encrypt(all_835_5_977, bt) = all_835_4_976 & sent(all_61_4_176, b, all_375_6_796) = all_835_10_982 & sent(b, t, all_835_3_975) = all_835_2_974 & message(all_835_2_974) = all_835_1_973 & message(all_835_10_982) = all_835_9_981 & ( ~ (all_835_8_980 = 0) | ~ (all_835_9_981 = 0) | (all_835_0_972 = 0 & all_835_1_973 = 0))
% 51.17/18.25 |
% 51.17/18.25 | Applying alpha-rule on (1342) yields:
% 51.17/18.25 | (1343) generate_expiration_time(all_285_7_623) = all_835_6_978
% 51.17/18.25 | (1344) message(all_835_2_974) = all_835_1_973
% 51.17/18.25 | (1345) ~ (all_835_8_980 = 0) | ~ (all_835_9_981 = 0) | (all_835_0_972 = 0 & all_835_1_973 = 0)
% 51.17/18.25 | (1346) message(all_835_10_982) = all_835_9_981
% 51.17/18.25 | (1347) triple(b, all_835_7_979, all_835_4_976) = all_835_3_975
% 51.17/18.25 | (1348) triple(all_61_4_176, all_285_7_623, all_835_6_978) = all_835_5_977
% 51.17/18.25 | (1349) encrypt(all_835_5_977, bt) = all_835_4_976
% 51.17/18.25 | (1350) fresh_to_b(all_285_7_623) = all_835_8_980
% 51.17/18.25 | (1351) sent(b, t, all_835_3_975) = all_835_2_974
% 51.17/18.25 | (1352) b_stored(all_375_6_796) = all_835_0_972
% 51.17/18.25 | (1353) sent(all_61_4_176, b, all_375_6_796) = all_835_10_982
% 51.17/18.25 | (1354) generate_b_nonce(all_285_7_623) = all_835_7_979
% 51.17/18.25 |
% 51.17/18.25 | Instantiating (1210) with all_837_0_983, all_837_1_984, all_837_2_985, all_837_3_986, all_837_4_987, all_837_5_988, all_837_6_989, all_837_7_990, all_837_8_991, all_837_9_992, all_837_10_993 yields:
% 51.17/18.25 | (1355) fresh_to_b(all_285_7_623) = all_837_8_991 & generate_b_nonce(all_285_7_623) = all_837_7_990 & generate_expiration_time(all_285_7_623) = all_837_6_989 & b_stored(all_285_6_622) = all_837_0_983 & triple(all_63_4_187, all_285_7_623, all_837_6_989) = all_837_5_988 & triple(b, all_837_7_990, all_837_4_987) = all_837_3_986 & encrypt(all_837_5_988, bt) = all_837_4_987 & sent(all_63_4_187, b, all_285_6_622) = all_837_10_993 & sent(b, t, all_837_3_986) = all_837_2_985 & message(all_837_2_985) = all_837_1_984 & message(all_837_10_993) = all_837_9_992 & ( ~ (all_837_8_991 = 0) | ~ (all_837_9_992 = 0) | (all_837_0_983 = 0 & all_837_1_984 = 0))
% 51.17/18.25 |
% 51.17/18.25 | Applying alpha-rule on (1355) yields:
% 51.17/18.25 | (1356) message(all_837_2_985) = all_837_1_984
% 51.17/18.25 | (1357) encrypt(all_837_5_988, bt) = all_837_4_987
% 51.17/18.25 | (1358) generate_b_nonce(all_285_7_623) = all_837_7_990
% 51.17/18.25 | (1359) b_stored(all_285_6_622) = all_837_0_983
% 51.17/18.25 | (1360) message(all_837_10_993) = all_837_9_992
% 51.17/18.25 | (1361) triple(all_63_4_187, all_285_7_623, all_837_6_989) = all_837_5_988
% 51.17/18.25 | (1362) sent(b, t, all_837_3_986) = all_837_2_985
% 51.17/18.25 | (1363) ~ (all_837_8_991 = 0) | ~ (all_837_9_992 = 0) | (all_837_0_983 = 0 & all_837_1_984 = 0)
% 51.17/18.25 | (1364) generate_expiration_time(all_285_7_623) = all_837_6_989
% 51.17/18.25 | (1365) fresh_to_b(all_285_7_623) = all_837_8_991
% 51.17/18.25 | (1366) triple(b, all_837_7_990, all_837_4_987) = all_837_3_986
% 51.17/18.25 | (1367) sent(all_63_4_187, b, all_285_6_622) = all_837_10_993
% 51.17/18.25 |
% 51.17/18.25 | Instantiating formula (37) with all_285_1_617, all_755_0_818, all_757_2_823 and discharging atoms intruder_holds(all_285_1_617) = all_757_2_823, intruder_holds(all_285_1_617) = all_755_0_818, yields:
% 51.17/18.25 | (1368) all_757_2_823 = all_755_0_818
% 51.17/18.25 |
% 51.17/18.25 | Instantiating formula (66) with b, all_797_1_897, 0 and discharging atoms party_of_protocol(b) = all_797_1_897, party_of_protocol(b) = 0, yields:
% 51.17/18.25 | (1369) all_797_1_897 = 0
% 51.17/18.25 |
% 51.17/18.25 | Instantiating formula (66) with b, all_793_1_891, all_821_1_951 and discharging atoms party_of_protocol(b) = all_821_1_951, party_of_protocol(b) = all_793_1_891, yields:
% 51.17/18.25 | (1370) all_821_1_951 = all_793_1_891
% 51.17/18.25 |
% 51.17/18.25 | Instantiating formula (66) with b, all_793_1_891, all_797_1_897 and discharging atoms party_of_protocol(b) = all_797_1_897, party_of_protocol(b) = all_793_1_891, yields:
% 51.17/18.25 | (1371) all_797_1_897 = all_793_1_891
% 51.17/18.25 |
% 51.17/18.25 | Instantiating formula (66) with b, all_793_2_892, all_821_1_951 and discharging atoms party_of_protocol(b) = all_821_1_951, party_of_protocol(b) = all_793_2_892, yields:
% 51.17/18.25 | (1372) all_821_1_951 = all_793_2_892
% 51.17/18.25 |
% 51.17/18.25 | Instantiating formula (66) with b, all_789_2_886, all_793_2_892 and discharging atoms party_of_protocol(b) = all_793_2_892, party_of_protocol(b) = all_789_2_886, yields:
% 51.17/18.25 | (1373) all_793_2_892 = all_789_2_886
% 51.17/18.25 |
% 51.17/18.25 | Instantiating formula (66) with b, all_783_1_877, all_821_1_951 and discharging atoms party_of_protocol(b) = all_821_1_951, party_of_protocol(b) = all_783_1_877, yields:
% 51.17/18.25 | (1374) all_821_1_951 = all_783_1_877
% 51.17/18.25 |
% 51.17/18.25 | Instantiating formula (66) with b, all_781_1_873, all_793_2_892 and discharging atoms party_of_protocol(b) = all_793_2_892, party_of_protocol(b) = all_781_1_873, yields:
% 51.17/18.25 | (1375) all_793_2_892 = all_781_1_873
% 51.17/18.25 |
% 51.17/18.25 | Instantiating formula (66) with b, all_763_1_831, all_821_1_951 and discharging atoms party_of_protocol(b) = all_821_1_951, party_of_protocol(b) = all_763_1_831, yields:
% 51.17/18.25 | (1376) all_821_1_951 = all_763_1_831
% 51.17/18.25 |
% 51.17/18.25 | Instantiating formula (66) with b, all_755_1_819, all_763_1_831 and discharging atoms party_of_protocol(b) = all_763_1_831, party_of_protocol(b) = all_755_1_819, yields:
% 51.17/18.25 | (1377) all_763_1_831 = all_755_1_819
% 51.17/18.26 |
% 51.17/18.26 | Instantiating formula (66) with a, all_763_2_832, 0 and discharging atoms party_of_protocol(a) = all_763_2_832, party_of_protocol(a) = 0, yields:
% 51.17/18.26 | (1378) all_763_2_832 = 0
% 51.17/18.26 |
% 51.17/18.26 | Instantiating formula (66) with a, all_753_1_816, all_763_2_832 and discharging atoms party_of_protocol(a) = all_763_2_832, party_of_protocol(a) = all_753_1_816, yields:
% 51.17/18.26 | (1379) all_763_2_832 = all_753_1_816
% 51.17/18.26 |
% 51.17/18.26 | Instantiating formula (66) with t, all_789_1_885, 0 and discharging atoms party_of_protocol(t) = all_789_1_885, party_of_protocol(t) = 0, yields:
% 51.17/18.26 | (1380) all_789_1_885 = 0
% 51.17/18.26 |
% 51.17/18.26 | Instantiating formula (31) with all_375_6_796, all_763_3_833, all_825_0_957 and discharging atoms intruder_message(all_375_6_796) = all_825_0_957, intruder_message(all_375_6_796) = all_763_3_833, yields:
% 51.17/18.26 | (1381) all_825_0_957 = all_763_3_833
% 51.17/18.26 |
% 51.17/18.26 | Instantiating formula (31) with all_285_7_623, all_827_0_960, all_829_1_964 and discharging atoms intruder_message(all_285_7_623) = all_829_1_964, intruder_message(all_285_7_623) = all_827_0_960, yields:
% 51.17/18.26 | (1382) all_829_1_964 = all_827_0_960
% 51.17/18.26 |
% 51.17/18.26 | Instantiating formula (31) with all_285_7_623, all_825_1_958, all_827_0_960 and discharging atoms intruder_message(all_285_7_623) = all_827_0_960, intruder_message(all_285_7_623) = all_825_1_958, yields:
% 51.17/18.26 | (1383) all_827_0_960 = all_825_1_958
% 51.17/18.26 |
% 51.17/18.26 | Instantiating formula (31) with all_285_7_623, all_823_0_954, all_829_1_964 and discharging atoms intruder_message(all_285_7_623) = all_829_1_964, intruder_message(all_285_7_623) = all_823_0_954, yields:
% 51.17/18.26 | (1384) all_829_1_964 = all_823_0_954
% 51.17/18.26 |
% 51.17/18.26 | Instantiating formula (31) with all_63_4_187, all_829_2_965, 0 and discharging atoms intruder_message(all_63_4_187) = all_829_2_965, intruder_message(all_63_4_187) = 0, yields:
% 51.17/18.26 | (1385) all_829_2_965 = 0
% 51.17/18.26 |
% 51.17/18.26 | Instantiating formula (31) with all_63_4_187, all_827_1_961, all_829_2_965 and discharging atoms intruder_message(all_63_4_187) = all_829_2_965, intruder_message(all_63_4_187) = all_827_1_961, yields:
% 51.17/18.26 | (1386) all_829_2_965 = all_827_1_961
% 51.17/18.26 |
% 51.17/18.26 | Instantiating formula (31) with all_61_4_176, all_825_2_959, 0 and discharging atoms intruder_message(all_61_4_176) = all_825_2_959, intruder_message(all_61_4_176) = 0, yields:
% 51.17/18.26 | (1387) all_825_2_959 = 0
% 51.17/18.26 |
% 51.17/18.26 | Instantiating formula (31) with all_61_4_176, all_823_1_955, all_825_2_959 and discharging atoms intruder_message(all_61_4_176) = all_825_2_959, intruder_message(all_61_4_176) = all_823_1_955, yields:
% 51.17/18.26 | (1388) all_825_2_959 = all_823_1_955
% 51.17/18.26 |
% 51.17/18.26 | Instantiating formula (31) with all_13_7_53, all_813_2_932, all_135_1_334 and discharging atoms intruder_message(all_13_7_53) = all_813_2_932, intruder_message(all_13_7_53) = all_135_1_334, yields:
% 51.17/18.26 | (1389) all_813_2_932 = all_135_1_334
% 51.17/18.26 |
% 51.17/18.26 | Instantiating formula (31) with an_a_nonce, all_755_2_820, 0 and discharging atoms intruder_message(an_a_nonce) = all_755_2_820, intruder_message(an_a_nonce) = 0, yields:
% 51.17/18.26 | (1390) all_755_2_820 = 0
% 51.17/18.26 |
% 51.17/18.26 | Instantiating formula (31) with an_a_nonce, all_753_2_817, all_755_2_820 and discharging atoms intruder_message(an_a_nonce) = all_755_2_820, intruder_message(an_a_nonce) = all_753_2_817, yields:
% 51.17/18.26 | (1391) all_755_2_820 = all_753_2_817
% 51.17/18.26 |
% 51.17/18.26 | Instantiating formula (31) with b, all_809_3_918, 0 and discharging atoms intruder_message(b) = all_809_3_918, intruder_message(b) = 0, yields:
% 51.17/18.26 | (1392) all_809_3_918 = 0
% 51.17/18.26 |
% 51.17/18.26 | Instantiating formula (31) with b, all_807_2_913, all_809_3_918 and discharging atoms intruder_message(b) = all_809_3_918, intruder_message(b) = all_807_2_913, yields:
% 51.17/18.26 | (1393) all_809_3_918 = all_807_2_913
% 51.17/18.26 |
% 51.17/18.26 | Instantiating formula (26) with all_375_1_791, all_759_0_824, all_375_0_790 and discharging atoms b_holds(all_375_1_791) = all_759_0_824, b_holds(all_375_1_791) = all_375_0_790, yields:
% 51.17/18.26 | (1394) all_759_0_824 = all_375_0_790
% 51.17/18.26 |
% 51.17/18.26 | Instantiating formula (18) with all_285_7_623, all_835_6_978, all_837_6_989 and discharging atoms generate_expiration_time(all_285_7_623) = all_837_6_989, generate_expiration_time(all_285_7_623) = all_835_6_978, yields:
% 51.17/18.26 | (1395) all_837_6_989 = all_835_6_978
% 51.17/18.26 |
% 51.17/18.26 | Instantiating formula (15) with all_375_5_795, all_779_1_871, all_375_4_794 and discharging atoms message(all_375_5_795) = all_779_1_871, message(all_375_5_795) = all_375_4_794, yields:
% 51.17/18.26 | (1396) all_779_1_871 = all_375_4_794
% 51.17/18.26 |
% 51.17/18.26 | Instantiating formula (15) with all_375_5_795, all_763_0_830, all_779_1_871 and discharging atoms message(all_375_5_795) = all_779_1_871, message(all_375_5_795) = all_763_0_830, yields:
% 51.17/18.26 | (1397) all_779_1_871 = all_763_0_830
% 51.17/18.26 |
% 51.17/18.26 | Instantiating formula (55) with an_a_nonce, b, all_759_2_826, all_285_1_617 and discharging atoms key(an_a_nonce, b) = all_759_2_826, key(an_a_nonce, b) = all_285_1_617, yields:
% 51.17/18.26 | (1398) all_759_2_826 = all_285_1_617
% 51.17/18.26 |
% 51.17/18.26 | Instantiating formula (55) with an_a_nonce, a, all_757_1_822, all_375_1_791 and discharging atoms key(an_a_nonce, a) = all_757_1_822, key(an_a_nonce, a) = all_375_1_791, yields:
% 51.17/18.26 | (1399) all_757_1_822 = all_375_1_791
% 51.17/18.26 |
% 51.17/18.26 | Combining equations (1382,1384) yields a new equation:
% 51.17/18.26 | (1400) all_827_0_960 = all_823_0_954
% 51.17/18.26 |
% 51.17/18.26 | Simplifying 1400 yields:
% 51.17/18.26 | (1401) all_827_0_960 = all_823_0_954
% 51.17/18.26 |
% 51.17/18.26 | Combining equations (1385,1386) yields a new equation:
% 51.17/18.26 | (1402) all_827_1_961 = 0
% 51.17/18.26 |
% 51.17/18.26 | Combining equations (1383,1401) yields a new equation:
% 51.17/18.26 | (1403) all_825_1_958 = all_823_0_954
% 51.17/18.26 |
% 51.17/18.26 | Simplifying 1403 yields:
% 51.17/18.26 | (1404) all_825_1_958 = all_823_0_954
% 51.17/18.26 |
% 51.17/18.26 | Combining equations (1388,1387) yields a new equation:
% 51.17/18.26 | (1405) all_823_1_955 = 0
% 51.17/18.26 |
% 51.17/18.26 | Simplifying 1405 yields:
% 51.17/18.26 | (1406) all_823_1_955 = 0
% 51.17/18.26 |
% 51.17/18.26 | Combining equations (1370,1374) yields a new equation:
% 51.17/18.26 | (1407) all_793_1_891 = all_783_1_877
% 51.17/18.26 |
% 51.17/18.26 | Simplifying 1407 yields:
% 51.17/18.26 | (1408) all_793_1_891 = all_783_1_877
% 51.17/18.26 |
% 51.17/18.26 | Combining equations (1372,1374) yields a new equation:
% 51.17/18.26 | (1409) all_793_2_892 = all_783_1_877
% 51.17/18.26 |
% 51.17/18.26 | Simplifying 1409 yields:
% 51.17/18.26 | (1410) all_793_2_892 = all_783_1_877
% 51.17/18.26 |
% 51.17/18.26 | Combining equations (1376,1374) yields a new equation:
% 51.17/18.26 | (1411) all_783_1_877 = all_763_1_831
% 51.17/18.26 |
% 51.17/18.26 | Combining equations (1392,1393) yields a new equation:
% 51.17/18.26 | (1412) all_807_2_913 = 0
% 51.17/18.26 |
% 51.17/18.26 | Combining equations (1371,1369) yields a new equation:
% 51.17/18.26 | (1413) all_793_1_891 = 0
% 51.17/18.26 |
% 51.17/18.26 | Simplifying 1413 yields:
% 51.17/18.26 | (1414) all_793_1_891 = 0
% 51.17/18.26 |
% 51.17/18.26 | Combining equations (1408,1414) yields a new equation:
% 51.17/18.26 | (1415) all_783_1_877 = 0
% 51.17/18.26 |
% 51.17/18.26 | Simplifying 1415 yields:
% 51.17/18.26 | (1416) all_783_1_877 = 0
% 51.17/18.26 |
% 51.17/18.26 | Combining equations (1410,1373) yields a new equation:
% 51.17/18.26 | (1417) all_789_2_886 = all_783_1_877
% 51.17/18.26 |
% 51.17/18.26 | Combining equations (1375,1373) yields a new equation:
% 51.17/18.26 | (1418) all_789_2_886 = all_781_1_873
% 51.17/18.26 |
% 51.17/18.26 | Combining equations (1417,1418) yields a new equation:
% 51.17/18.26 | (1419) all_783_1_877 = all_781_1_873
% 51.17/18.26 |
% 51.17/18.26 | Simplifying 1419 yields:
% 51.17/18.26 | (1420) all_783_1_877 = all_781_1_873
% 51.17/18.26 |
% 51.17/18.26 | Combining equations (1411,1420) yields a new equation:
% 51.17/18.26 | (1421) all_781_1_873 = all_763_1_831
% 51.17/18.26 |
% 51.17/18.26 | Combining equations (1416,1420) yields a new equation:
% 51.17/18.26 | (1422) all_781_1_873 = 0
% 51.17/18.26 |
% 51.17/18.26 | Combining equations (1421,1422) yields a new equation:
% 51.17/18.26 | (1423) all_763_1_831 = 0
% 51.17/18.26 |
% 51.17/18.26 | Simplifying 1423 yields:
% 51.17/18.26 | (1424) all_763_1_831 = 0
% 51.17/18.26 |
% 51.17/18.26 | Combining equations (1397,1396) yields a new equation:
% 51.17/18.26 | (1425) all_763_0_830 = all_375_4_794
% 51.17/18.26 |
% 51.17/18.26 | Simplifying 1425 yields:
% 51.17/18.26 | (1426) all_763_0_830 = all_375_4_794
% 51.17/18.26 |
% 51.17/18.26 | Combining equations (1377,1424) yields a new equation:
% 51.17/18.26 | (1427) all_755_1_819 = 0
% 51.17/18.26 |
% 51.17/18.26 | Simplifying 1427 yields:
% 51.17/18.26 | (1428) all_755_1_819 = 0
% 51.17/18.26 |
% 51.17/18.26 | Combining equations (1379,1378) yields a new equation:
% 51.17/18.26 | (1429) all_753_1_816 = 0
% 51.17/18.26 |
% 51.17/18.26 | Simplifying 1429 yields:
% 51.17/18.26 | (1430) all_753_1_816 = 0
% 51.17/18.26 |
% 51.17/18.26 | Combining equations (1390,1391) yields a new equation:
% 51.17/18.26 | (1431) all_753_2_817 = 0
% 51.17/18.26 |
% 51.17/18.26 | Combining equations (1431,1391) yields a new equation:
% 51.17/18.26 | (1390) all_755_2_820 = 0
% 51.17/18.26 |
% 51.17/18.26 | From (1398) and (1250) follows:
% 51.17/18.26 | (1433) intruder_holds(all_285_1_617) = all_759_1_825
% 51.17/18.26 |
% 51.17/18.26 | From (1368) and (1245) follows:
% 51.17/18.26 | (1240) intruder_holds(all_285_1_617) = all_755_0_818
% 51.17/18.26 |
% 51.17/18.26 | From (1428) and (1241) follows:
% 51.17/18.26 | (10) party_of_protocol(b) = 0
% 51.17/18.26 |
% 51.17/18.26 | From (1430) and (1236) follows:
% 51.17/18.26 | (43) party_of_protocol(a) = 0
% 51.17/18.26 |
% 51.17/18.26 | From (1380) and (1277) follows:
% 51.17/18.26 | (34) party_of_protocol(t) = 0
% 51.17/18.26 |
% 51.17/18.26 | From (1404) and (1324) follows:
% 51.17/18.26 | (1319) intruder_message(all_285_7_623) = all_823_0_954
% 51.17/18.26 |
% 51.17/18.26 | From (1402) and (1330) follows:
% 51.17/18.26 | (1197) intruder_message(all_63_4_187) = 0
% 51.17/18.26 |
% 51.17/18.26 | From (1406) and (1320) follows:
% 51.17/18.26 | (1145) intruder_message(all_61_4_176) = 0
% 51.17/18.26 |
% 51.17/18.26 | From (1389) and (1309) follows:
% 51.17/18.26 | (375) intruder_message(all_13_7_53) = all_135_1_334
% 51.17/18.26 |
% 51.17/18.26 | From (1431) and (1237) follows:
% 51.17/18.26 | (566) intruder_message(an_a_nonce) = 0
% 51.17/18.26 |
% 51.17/18.26 | From (1412) and (1298) follows:
% 51.17/18.26 | (1147) intruder_message(b) = 0
% 51.17/18.26 |
% 51.17/18.26 | From (1399) and (1246) follows:
% 51.17/18.26 | (1444) b_holds(all_375_1_791) = all_757_0_821
% 51.17/18.26 |
% 51.17/18.26 | From (1394) and (1251) follows:
% 51.17/18.26 | (918) b_holds(all_375_1_791) = all_375_0_790
% 51.17/18.26 |
% 51.17/18.26 | From (1395) and (1361) follows:
% 51.17/18.26 | (1446) triple(all_63_4_187, all_285_7_623, all_835_6_978) = all_837_5_988
% 51.17/18.26 |
% 51.17/18.26 | From (1398) and (1252) follows:
% 51.17/18.26 | (716) key(an_a_nonce, b) = all_285_1_617
% 51.17/18.26 |
% 51.17/18.26 | From (1399) and (1247) follows:
% 51.17/18.26 | (917) key(an_a_nonce, a) = all_375_1_791
% 51.17/18.26 |
% 51.17/18.26 +-Applying beta-rule and splitting (1243), into two cases.
% 51.17/18.26 |-Branch one:
% 51.17/18.26 | (1449) ~ (all_755_1_819 = 0)
% 51.17/18.26 |
% 51.17/18.26 | Equations (1428) can reduce 1449 to:
% 51.17/18.26 | (551) $false
% 51.17/18.26 |
% 51.17/18.26 |-The branch is then unsatisfiable
% 51.17/18.26 |-Branch two:
% 51.17/18.26 | (1428) all_755_1_819 = 0
% 51.17/18.26 | (1452) ~ (all_755_2_820 = 0) | all_755_0_818 = 0
% 51.17/18.26 |
% 51.17/18.26 +-Applying beta-rule and splitting (1238), into two cases.
% 51.17/18.26 |-Branch one:
% 51.17/18.26 | (1453) ~ (all_753_1_816 = 0)
% 51.17/18.26 |
% 51.17/18.26 | Equations (1430) can reduce 1453 to:
% 51.17/18.26 | (551) $false
% 51.17/18.26 |
% 51.17/18.26 |-The branch is then unsatisfiable
% 51.17/18.26 |-Branch two:
% 51.17/18.26 | (1430) all_753_1_816 = 0
% 51.17/18.26 | (1456) ~ (all_753_2_817 = 0) | all_753_0_815 = 0
% 51.17/18.27 |
% 51.17/18.27 +-Applying beta-rule and splitting (1456), into two cases.
% 51.17/18.27 |-Branch one:
% 51.17/18.27 | (1457) ~ (all_753_2_817 = 0)
% 51.17/18.27 |
% 51.17/18.27 | Equations (1431) can reduce 1457 to:
% 51.17/18.27 | (551) $false
% 51.17/18.27 |
% 51.17/18.27 |-The branch is then unsatisfiable
% 51.17/18.27 |-Branch two:
% 51.17/18.27 | (1431) all_753_2_817 = 0
% 51.17/18.27 | (1460) all_753_0_815 = 0
% 51.17/18.27 |
% 51.17/18.27 | From (1460) and (1235) follows:
% 51.17/18.27 | (1461) intruder_holds(all_375_1_791) = 0
% 51.17/18.27 |
% 51.17/18.27 +-Applying beta-rule and splitting (1452), into two cases.
% 51.17/18.27 |-Branch one:
% 51.17/18.27 | (1462) ~ (all_755_2_820 = 0)
% 51.17/18.27 |
% 51.17/18.27 | Equations (1390) can reduce 1462 to:
% 51.17/18.27 | (551) $false
% 51.17/18.27 |
% 51.17/18.27 |-The branch is then unsatisfiable
% 51.17/18.27 |-Branch two:
% 51.17/18.27 | (1390) all_755_2_820 = 0
% 51.17/18.27 | (1465) all_755_0_818 = 0
% 51.17/18.27 |
% 51.17/18.27 | Combining equations (1465,1368) yields a new equation:
% 51.17/18.27 | (1466) all_757_2_823 = 0
% 51.17/18.27 |
% 51.17/18.27 | From (1465) and (1240) follows:
% 51.17/18.27 | (1467) intruder_holds(all_285_1_617) = 0
% 51.17/18.27 |
% 51.17/18.27 +-Applying beta-rule and splitting (1248), into two cases.
% 51.17/18.27 |-Branch one:
% 51.17/18.27 | (1468) ~ (all_757_0_821 = 0)
% 51.17/18.27 |
% 51.17/18.27 | Instantiating formula (37) with all_285_1_617, 0, all_759_1_825 and discharging atoms intruder_holds(all_285_1_617) = all_759_1_825, intruder_holds(all_285_1_617) = 0, yields:
% 51.17/18.27 | (1469) all_759_1_825 = 0
% 51.17/18.27 |
% 51.17/18.27 | Instantiating formula (26) with all_375_1_791, all_757_0_821, all_375_0_790 and discharging atoms b_holds(all_375_1_791) = all_757_0_821, b_holds(all_375_1_791) = all_375_0_790, yields:
% 51.17/18.27 | (1470) all_757_0_821 = all_375_0_790
% 51.17/18.27 |
% 51.17/18.27 | Equations (1470) can reduce 1468 to:
% 51.17/18.27 | (1471) ~ (all_375_0_790 = 0)
% 51.17/18.27 |
% 51.17/18.27 | From (1469) and (1433) follows:
% 51.17/18.27 | (1467) intruder_holds(all_285_1_617) = 0
% 51.17/18.27 |
% 51.17/18.27 +-Applying beta-rule and splitting (916), into two cases.
% 51.17/18.27 |-Branch one:
% 51.17/18.27 | (1473) ~ (all_375_2_792 = 0)
% 51.17/18.27 |
% 51.17/18.27 | Equations (1198) can reduce 1473 to:
% 51.17/18.27 | (551) $false
% 51.17/18.27 |
% 51.17/18.27 |-The branch is then unsatisfiable
% 51.17/18.27 |-Branch two:
% 51.17/18.27 | (1198) all_375_2_792 = 0
% 51.17/18.27 | (1476) ~ (all_375_4_794 = 0) | all_375_0_790 = 0
% 51.17/18.27 |
% 51.17/18.27 +-Applying beta-rule and splitting (1476), into two cases.
% 51.17/18.27 |-Branch one:
% 51.17/18.27 | (1477) ~ (all_375_4_794 = 0)
% 51.17/18.27 |
% 51.17/18.27 +-Applying beta-rule and splitting (1258), into two cases.
% 51.17/18.27 |-Branch one:
% 51.17/18.27 | (1478) ~ (all_763_1_831 = 0)
% 51.17/18.27 |
% 51.17/18.27 | Equations (1424) can reduce 1478 to:
% 51.17/18.27 | (551) $false
% 51.17/18.27 |
% 51.17/18.27 |-The branch is then unsatisfiable
% 51.17/18.27 |-Branch two:
% 51.17/18.27 | (1424) all_763_1_831 = 0
% 51.17/18.27 | (1481) ~ (all_763_2_832 = 0) | ~ (all_763_3_833 = 0) | all_763_0_830 = 0
% 51.17/18.27 |
% 51.17/18.27 +-Applying beta-rule and splitting (1481), into two cases.
% 51.17/18.27 |-Branch one:
% 51.17/18.27 | (1482) ~ (all_763_2_832 = 0)
% 51.17/18.27 |
% 51.17/18.27 | Equations (1378) can reduce 1482 to:
% 51.17/18.27 | (551) $false
% 51.17/18.27 |
% 51.17/18.27 |-The branch is then unsatisfiable
% 51.17/18.27 |-Branch two:
% 51.17/18.27 | (1378) all_763_2_832 = 0
% 51.17/18.27 | (1485) ~ (all_763_3_833 = 0) | all_763_0_830 = 0
% 51.17/18.27 |
% 51.17/18.27 +-Applying beta-rule and splitting (1485), into two cases.
% 51.17/18.27 |-Branch one:
% 51.17/18.27 | (1486) ~ (all_763_3_833 = 0)
% 51.17/18.27 |
% 51.17/18.27 +-Applying beta-rule and splitting (1326), into two cases.
% 51.17/18.27 |-Branch one:
% 51.17/18.27 | (1487) ~ (all_825_1_958 = 0)
% 51.17/18.27 |
% 51.17/18.27 | Equations (1404) can reduce 1487 to:
% 51.17/18.27 | (1488) ~ (all_823_0_954 = 0)
% 51.17/18.27 |
% 51.17/18.27 +-Applying beta-rule and splitting (377), into two cases.
% 51.17/18.27 |-Branch one:
% 51.17/18.27 | (1489) ~ (all_135_1_334 = 0)
% 51.17/18.27 |
% 51.17/18.27 +-Applying beta-rule and splitting (583), into two cases.
% 51.17/18.27 |-Branch one:
% 51.17/18.27 | (1490) all_135_1_334 = 0
% 51.17/18.27 |
% 51.17/18.27 | Equations (1490) can reduce 1489 to:
% 51.17/18.27 | (551) $false
% 51.17/18.27 |
% 51.17/18.27 |-The branch is then unsatisfiable
% 51.17/18.27 |-Branch two:
% 51.17/18.27 | (1489) ~ (all_135_1_334 = 0)
% 51.17/18.27 | (1493) ? [v0] : ? [v1] : ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_13_8_54) = v0 & key(all_13_14_60, a) = v1 & ( ~ (v2 = 0) | ~ (v0 = 0)))
% 51.17/18.27 |
% 51.17/18.27 | Instantiating (1493) with all_952_0_1011, all_952_1_1012, all_952_2_1013 yields:
% 51.17/18.27 | (1494) intruder_holds(all_952_1_1012) = all_952_0_1011 & intruder_message(all_13_8_54) = all_952_2_1013 & key(all_13_14_60, a) = all_952_1_1012 & ( ~ (all_952_0_1011 = 0) | ~ (all_952_2_1013 = 0))
% 51.17/18.27 |
% 51.17/18.27 | Applying alpha-rule on (1494) yields:
% 51.17/18.27 | (1495) intruder_holds(all_952_1_1012) = all_952_0_1011
% 51.17/18.27 | (1496) intruder_message(all_13_8_54) = all_952_2_1013
% 51.17/18.27 | (1497) key(all_13_14_60, a) = all_952_1_1012
% 51.17/18.27 | (1498) ~ (all_952_0_1011 = 0) | ~ (all_952_2_1013 = 0)
% 51.17/18.27 |
% 51.17/18.27 | Instantiating formula (63) with all_375_1_791, a, an_a_nonce, all_63_3_186 and discharging atoms intruder_holds(all_375_1_791) = 0, intruder_message(all_63_3_186) = 0, key(an_a_nonce, a) = all_375_1_791, yields:
% 51.17/18.27 | (1499) ? [v0] : ? [v1] : ? [v2] : (party_of_protocol(a) = v0 & intruder_message(v1) = v2 & encrypt(all_63_3_186, an_a_nonce) = v1 & ( ~ (v0 = 0) | v2 = 0))
% 51.17/18.27 |
% 51.17/18.27 | Instantiating formula (63) with all_375_1_791, a, an_a_nonce, all_63_4_187 and discharging atoms intruder_holds(all_375_1_791) = 0, intruder_message(all_63_4_187) = 0, key(an_a_nonce, a) = all_375_1_791, yields:
% 51.17/18.27 | (1500) ? [v0] : ? [v1] : ? [v2] : (party_of_protocol(a) = v0 & intruder_message(v1) = v2 & encrypt(all_63_4_187, an_a_nonce) = v1 & ( ~ (v0 = 0) | v2 = 0))
% 51.17/18.27 |
% 51.17/18.27 | Instantiating formula (63) with all_375_1_791, a, an_a_nonce, all_61_3_175 and discharging atoms intruder_holds(all_375_1_791) = 0, intruder_message(all_61_3_175) = 0, key(an_a_nonce, a) = all_375_1_791, yields:
% 51.17/18.27 | (1501) ? [v0] : ? [v1] : ? [v2] : (party_of_protocol(a) = v0 & intruder_message(v1) = v2 & encrypt(all_61_3_175, an_a_nonce) = v1 & ( ~ (v0 = 0) | v2 = 0))
% 51.17/18.27 |
% 51.17/18.27 | Instantiating formula (63) with all_375_1_791, a, an_a_nonce, all_61_4_176 and discharging atoms intruder_holds(all_375_1_791) = 0, intruder_message(all_61_4_176) = 0, key(an_a_nonce, a) = all_375_1_791, yields:
% 51.17/18.27 | (1502) ? [v0] : ? [v1] : ? [v2] : (party_of_protocol(a) = v0 & intruder_message(v1) = v2 & encrypt(all_61_4_176, an_a_nonce) = v1 & ( ~ (v0 = 0) | v2 = 0))
% 51.17/18.27 |
% 51.17/18.27 | Instantiating formula (63) with all_375_1_791, a, an_a_nonce, all_61_7_179 and discharging atoms intruder_holds(all_375_1_791) = 0, intruder_message(all_61_7_179) = 0, key(an_a_nonce, a) = all_375_1_791, yields:
% 51.17/18.27 | (1503) ? [v0] : ? [v1] : ? [v2] : (party_of_protocol(a) = v0 & intruder_message(v1) = v2 & encrypt(all_61_7_179, an_a_nonce) = v1 & ( ~ (v0 = 0) | v2 = 0))
% 51.17/18.27 |
% 51.17/18.27 | Instantiating formula (63) with all_375_1_791, a, an_a_nonce, all_19_5_94 and discharging atoms intruder_holds(all_375_1_791) = 0, intruder_message(all_19_5_94) = 0, key(an_a_nonce, a) = all_375_1_791, yields:
% 51.17/18.27 | (1504) ? [v0] : ? [v1] : ? [v2] : (party_of_protocol(a) = v0 & intruder_message(v1) = v2 & encrypt(all_19_5_94, an_a_nonce) = v1 & ( ~ (v0 = 0) | v2 = 0))
% 51.17/18.27 |
% 51.17/18.27 | Instantiating formula (63) with all_375_1_791, a, an_a_nonce, all_17_1_81 and discharging atoms intruder_holds(all_375_1_791) = 0, intruder_message(all_17_1_81) = 0, key(an_a_nonce, a) = all_375_1_791, yields:
% 51.17/18.27 | (1505) ? [v0] : ? [v1] : ? [v2] : (party_of_protocol(a) = v0 & intruder_message(v1) = v2 & encrypt(all_17_1_81, an_a_nonce) = v1 & ( ~ (v0 = 0) | v2 = 0))
% 51.17/18.27 |
% 51.17/18.27 | Instantiating formula (63) with all_375_1_791, a, an_a_nonce, all_0_2_2 and discharging atoms intruder_holds(all_375_1_791) = 0, intruder_message(all_0_2_2) = 0, key(an_a_nonce, a) = all_375_1_791, yields:
% 51.17/18.27 | (1506) ? [v0] : ? [v1] : ? [v2] : (party_of_protocol(a) = v0 & intruder_message(v1) = v2 & encrypt(all_0_2_2, an_a_nonce) = v1 & ( ~ (v0 = 0) | v2 = 0))
% 51.17/18.27 |
% 51.17/18.27 | Instantiating formula (63) with all_375_1_791, a, an_a_nonce, all_0_3_3 and discharging atoms intruder_holds(all_375_1_791) = 0, intruder_message(all_0_3_3) = 0, key(an_a_nonce, a) = all_375_1_791, yields:
% 51.17/18.27 | (1507) ? [v0] : ? [v1] : ? [v2] : (party_of_protocol(a) = v0 & intruder_message(v1) = v2 & encrypt(all_0_3_3, an_a_nonce) = v1 & ( ~ (v0 = 0) | v2 = 0))
% 51.17/18.27 |
% 51.17/18.27 | Instantiating formula (63) with all_375_1_791, a, an_a_nonce, an_a_nonce and discharging atoms intruder_holds(all_375_1_791) = 0, intruder_message(an_a_nonce) = 0, key(an_a_nonce, a) = all_375_1_791, yields:
% 51.17/18.27 | (1508) ? [v0] : ? [v1] : ? [v2] : (party_of_protocol(a) = v0 & intruder_message(v1) = v2 & encrypt(an_a_nonce, an_a_nonce) = v1 & ( ~ (v0 = 0) | v2 = 0))
% 51.17/18.27 |
% 51.17/18.27 | Instantiating formula (63) with all_375_1_791, a, an_a_nonce, b and discharging atoms intruder_holds(all_375_1_791) = 0, intruder_message(b) = 0, key(an_a_nonce, a) = all_375_1_791, yields:
% 51.17/18.27 | (1509) ? [v0] : ? [v1] : ? [v2] : (party_of_protocol(a) = v0 & intruder_message(v1) = v2 & encrypt(b, an_a_nonce) = v1 & ( ~ (v0 = 0) | v2 = 0))
% 51.17/18.27 |
% 51.17/18.27 | Instantiating formula (63) with all_375_1_791, a, an_a_nonce, a and discharging atoms intruder_holds(all_375_1_791) = 0, intruder_message(a) = 0, key(an_a_nonce, a) = all_375_1_791, yields:
% 51.17/18.27 | (1510) ? [v0] : ? [v1] : ? [v2] : (party_of_protocol(a) = v0 & intruder_message(v1) = v2 & encrypt(a, an_a_nonce) = v1 & ( ~ (v0 = 0) | v2 = 0))
% 51.17/18.27 |
% 51.17/18.27 | Instantiating formula (63) with all_285_1_617, b, an_a_nonce, all_61_7_179 and discharging atoms intruder_holds(all_285_1_617) = 0, intruder_message(all_61_7_179) = 0, key(an_a_nonce, b) = all_285_1_617, yields:
% 51.17/18.27 | (1511) ? [v0] : ? [v1] : ? [v2] : (party_of_protocol(b) = v0 & intruder_message(v1) = v2 & encrypt(all_61_7_179, an_a_nonce) = v1 & ( ~ (v0 = 0) | v2 = 0))
% 51.17/18.27 |
% 51.17/18.27 | Instantiating formula (45) with all_823_0_954, all_285_7_623, all_375_1_791, a, an_a_nonce, all_61_7_179 and discharging atoms intruder_holds(all_375_1_791) = 0, intruder_message(all_285_7_623) = all_823_0_954, encrypt(all_61_7_179, an_a_nonce) = all_285_7_623, key(an_a_nonce, a) = all_375_1_791, yields:
% 51.17/18.27 | (1512) all_823_0_954 = 0 | ? [v0] : ? [v1] : (party_of_protocol(a) = v1 & intruder_message(all_61_7_179) = v0 & ( ~ (v1 = 0) | ~ (v0 = 0)))
% 51.17/18.27 |
% 51.17/18.27 | Instantiating formula (45) with all_823_0_954, all_285_7_623, all_285_1_617, b, an_a_nonce, all_61_7_179 and discharging atoms intruder_holds(all_285_1_617) = 0, intruder_message(all_285_7_623) = all_823_0_954, encrypt(all_61_7_179, an_a_nonce) = all_285_7_623, key(an_a_nonce, b) = all_285_1_617, yields:
% 51.17/18.27 | (1513) all_823_0_954 = 0 | ? [v0] : ? [v1] : (party_of_protocol(b) = v1 & intruder_message(all_61_7_179) = v0 & ( ~ (v1 = 0) | ~ (v0 = 0)))
% 51.17/18.27 |
% 51.17/18.27 | Instantiating formula (7) with all_823_0_954, all_285_7_623, b, an_a_nonce, all_61_7_179 and discharging atoms party_of_protocol(b) = 0, intruder_message(all_285_7_623) = all_823_0_954, encrypt(all_61_7_179, an_a_nonce) = all_285_7_623, yields:
% 51.17/18.27 | (1514) all_823_0_954 = 0 | ? [v0] : ? [v1] : ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_61_7_179) = v0 & key(an_a_nonce, b) = v1 & ( ~ (v2 = 0) | ~ (v0 = 0)))
% 51.17/18.27 |
% 51.17/18.27 | Instantiating formula (7) with all_823_0_954, all_285_7_623, a, an_a_nonce, all_61_7_179 and discharging atoms party_of_protocol(a) = 0, intruder_message(all_285_7_623) = all_823_0_954, encrypt(all_61_7_179, an_a_nonce) = all_285_7_623, yields:
% 51.17/18.28 | (1515) all_823_0_954 = 0 | ? [v0] : ? [v1] : ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_61_7_179) = v0 & key(an_a_nonce, a) = v1 & ( ~ (v2 = 0) | ~ (v0 = 0)))
% 51.17/18.28 |
% 51.17/18.28 | Instantiating formula (7) with all_823_0_954, all_285_7_623, t, an_a_nonce, all_61_7_179 and discharging atoms party_of_protocol(t) = 0, intruder_message(all_285_7_623) = all_823_0_954, encrypt(all_61_7_179, an_a_nonce) = all_285_7_623, yields:
% 51.17/18.28 | (1516) all_823_0_954 = 0 | ? [v0] : ? [v1] : ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_61_7_179) = v0 & key(an_a_nonce, t) = v1 & ( ~ (v2 = 0) | ~ (v0 = 0)))
% 51.17/18.28 |
% 51.17/18.28 | Instantiating formula (40) with all_837_5_988, all_835_6_978, all_285_7_623, all_63_4_187 and discharging atoms triple(all_63_4_187, all_285_7_623, all_835_6_978) = all_837_5_988, yields:
% 51.17/18.28 | (1517) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (intruder_message(all_837_5_988) = v3 & intruder_message(all_835_6_978) = v2 & intruder_message(all_285_7_623) = v1 & intruder_message(all_63_4_187) = v0 & ( ~ (v2 = 0) | ~ (v1 = 0) | ~ (v0 = 0) | v3 = 0))
% 51.17/18.28 |
% 51.17/18.28 | Instantiating formula (68) with all_837_5_988, all_835_6_978, all_285_7_623, all_63_4_187 and discharging atoms triple(all_63_4_187, all_285_7_623, all_835_6_978) = all_837_5_988, yields:
% 51.17/18.28 | (1518) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (intruder_message(all_837_5_988) = v0 & intruder_message(all_835_6_978) = v3 & intruder_message(all_285_7_623) = v2 & intruder_message(all_63_4_187) = v1 & ( ~ (v0 = 0) | (v3 = 0 & v2 = 0 & v1 = 0)))
% 51.17/18.28 |
% 51.17/18.28 | Instantiating formula (40) with all_835_5_977, all_835_6_978, all_285_7_623, all_61_4_176 and discharging atoms triple(all_61_4_176, all_285_7_623, all_835_6_978) = all_835_5_977, yields:
% 51.17/18.28 | (1519) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (intruder_message(all_835_5_977) = v3 & intruder_message(all_835_6_978) = v2 & intruder_message(all_285_7_623) = v1 & intruder_message(all_61_4_176) = v0 & ( ~ (v2 = 0) | ~ (v1 = 0) | ~ (v0 = 0) | v3 = 0))
% 51.17/18.28 |
% 51.17/18.28 | Instantiating formula (68) with all_835_5_977, all_835_6_978, all_285_7_623, all_61_4_176 and discharging atoms triple(all_61_4_176, all_285_7_623, all_835_6_978) = all_835_5_977, yields:
% 51.17/18.28 | (1520) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (intruder_message(all_835_5_977) = v0 & intruder_message(all_835_6_978) = v3 & intruder_message(all_285_7_623) = v2 & intruder_message(all_61_4_176) = v1 & ( ~ (v0 = 0) | (v3 = 0 & v2 = 0 & v1 = 0)))
% 51.17/18.28 |
% 51.17/18.28 | Instantiating formula (57) with all_745_2_805, a, all_19_7_96 and discharging atoms key(all_19_7_96, a) = all_745_2_805, yields:
% 51.17/18.28 | (1521) ? [v0] : ? [v1] : ? [v2] : (intruder_holds(all_745_2_805) = v2 & party_of_protocol(a) = v1 & intruder_message(all_19_7_96) = v0 & ( ~ (v1 = 0) | ~ (v0 = 0) | v2 = 0))
% 51.17/18.28 |
% 51.17/18.28 | Instantiating formula (57) with all_833_2_971, a, all_17_7_87 and discharging atoms key(all_17_7_87, a) = all_833_2_971, yields:
% 51.17/18.28 | (1522) ? [v0] : ? [v1] : ? [v2] : (intruder_holds(all_833_2_971) = v2 & party_of_protocol(a) = v1 & intruder_message(all_17_7_87) = v0 & ( ~ (v1 = 0) | ~ (v0 = 0) | v2 = 0))
% 51.17/18.28 |
% 51.17/18.28 | Instantiating formula (57) with all_952_1_1012, a, all_13_14_60 and discharging atoms key(all_13_14_60, a) = all_952_1_1012, yields:
% 51.17/18.28 | (1523) ? [v0] : ? [v1] : ? [v2] : (intruder_holds(all_952_1_1012) = v2 & party_of_protocol(a) = v1 & intruder_message(all_13_14_60) = v0 & ( ~ (v1 = 0) | ~ (v0 = 0) | v2 = 0))
% 51.17/18.28 |
% 51.17/18.28 | Instantiating (1510) with all_1279_0_1464, all_1279_1_1465, all_1279_2_1466 yields:
% 51.17/18.28 | (1524) party_of_protocol(a) = all_1279_2_1466 & intruder_message(all_1279_1_1465) = all_1279_0_1464 & encrypt(a, an_a_nonce) = all_1279_1_1465 & ( ~ (all_1279_2_1466 = 0) | all_1279_0_1464 = 0)
% 51.17/18.28 |
% 51.17/18.28 | Applying alpha-rule on (1524) yields:
% 51.17/18.28 | (1525) party_of_protocol(a) = all_1279_2_1466
% 51.17/18.28 | (1526) intruder_message(all_1279_1_1465) = all_1279_0_1464
% 51.17/18.28 | (1527) encrypt(a, an_a_nonce) = all_1279_1_1465
% 51.17/18.28 | (1528) ~ (all_1279_2_1466 = 0) | all_1279_0_1464 = 0
% 51.17/18.28 |
% 51.17/18.28 | Instantiating (1508) with all_1281_0_1467, all_1281_1_1468, all_1281_2_1469 yields:
% 51.17/18.28 | (1529) party_of_protocol(a) = all_1281_2_1469 & intruder_message(all_1281_1_1468) = all_1281_0_1467 & encrypt(an_a_nonce, an_a_nonce) = all_1281_1_1468 & ( ~ (all_1281_2_1469 = 0) | all_1281_0_1467 = 0)
% 51.17/18.28 |
% 51.17/18.28 | Applying alpha-rule on (1529) yields:
% 51.17/18.28 | (1530) party_of_protocol(a) = all_1281_2_1469
% 51.17/18.28 | (1531) intruder_message(all_1281_1_1468) = all_1281_0_1467
% 51.17/18.28 | (1532) encrypt(an_a_nonce, an_a_nonce) = all_1281_1_1468
% 51.17/18.28 | (1533) ~ (all_1281_2_1469 = 0) | all_1281_0_1467 = 0
% 51.17/18.28 |
% 51.17/18.28 | Instantiating (1507) with all_1283_0_1470, all_1283_1_1471, all_1283_2_1472 yields:
% 51.17/18.28 | (1534) party_of_protocol(a) = all_1283_2_1472 & intruder_message(all_1283_1_1471) = all_1283_0_1470 & encrypt(all_0_3_3, an_a_nonce) = all_1283_1_1471 & ( ~ (all_1283_2_1472 = 0) | all_1283_0_1470 = 0)
% 51.17/18.28 |
% 51.17/18.28 | Applying alpha-rule on (1534) yields:
% 51.17/18.28 | (1535) party_of_protocol(a) = all_1283_2_1472
% 51.17/18.28 | (1536) intruder_message(all_1283_1_1471) = all_1283_0_1470
% 51.17/18.28 | (1537) encrypt(all_0_3_3, an_a_nonce) = all_1283_1_1471
% 51.17/18.28 | (1538) ~ (all_1283_2_1472 = 0) | all_1283_0_1470 = 0
% 51.17/18.28 |
% 51.17/18.28 | Instantiating (1509) with all_1285_0_1473, all_1285_1_1474, all_1285_2_1475 yields:
% 51.17/18.28 | (1539) party_of_protocol(a) = all_1285_2_1475 & intruder_message(all_1285_1_1474) = all_1285_0_1473 & encrypt(b, an_a_nonce) = all_1285_1_1474 & ( ~ (all_1285_2_1475 = 0) | all_1285_0_1473 = 0)
% 51.17/18.28 |
% 51.17/18.28 | Applying alpha-rule on (1539) yields:
% 51.17/18.28 | (1540) party_of_protocol(a) = all_1285_2_1475
% 51.17/18.28 | (1541) intruder_message(all_1285_1_1474) = all_1285_0_1473
% 51.17/18.28 | (1542) encrypt(b, an_a_nonce) = all_1285_1_1474
% 51.17/18.28 | (1543) ~ (all_1285_2_1475 = 0) | all_1285_0_1473 = 0
% 51.17/18.28 |
% 51.17/18.28 | Instantiating (1523) with all_1303_0_1500, all_1303_1_1501, all_1303_2_1502 yields:
% 51.17/18.28 | (1544) intruder_holds(all_952_1_1012) = all_1303_0_1500 & party_of_protocol(a) = all_1303_1_1501 & intruder_message(all_13_14_60) = all_1303_2_1502 & ( ~ (all_1303_1_1501 = 0) | ~ (all_1303_2_1502 = 0) | all_1303_0_1500 = 0)
% 51.17/18.28 |
% 51.17/18.28 | Applying alpha-rule on (1544) yields:
% 51.17/18.28 | (1545) intruder_holds(all_952_1_1012) = all_1303_0_1500
% 51.17/18.28 | (1546) party_of_protocol(a) = all_1303_1_1501
% 51.17/18.28 | (1547) intruder_message(all_13_14_60) = all_1303_2_1502
% 51.17/18.28 | (1548) ~ (all_1303_1_1501 = 0) | ~ (all_1303_2_1502 = 0) | all_1303_0_1500 = 0
% 51.17/18.28 |
% 51.17/18.28 | Instantiating (1519) with all_1311_0_1515, all_1311_1_1516, all_1311_2_1517, all_1311_3_1518 yields:
% 51.17/18.28 | (1549) intruder_message(all_835_5_977) = all_1311_0_1515 & intruder_message(all_835_6_978) = all_1311_1_1516 & intruder_message(all_285_7_623) = all_1311_2_1517 & intruder_message(all_61_4_176) = all_1311_3_1518 & ( ~ (all_1311_1_1516 = 0) | ~ (all_1311_2_1517 = 0) | ~ (all_1311_3_1518 = 0) | all_1311_0_1515 = 0)
% 51.17/18.28 |
% 51.17/18.28 | Applying alpha-rule on (1549) yields:
% 51.17/18.28 | (1550) intruder_message(all_61_4_176) = all_1311_3_1518
% 51.17/18.28 | (1551) intruder_message(all_835_6_978) = all_1311_1_1516
% 51.17/18.28 | (1552) intruder_message(all_285_7_623) = all_1311_2_1517
% 51.17/18.28 | (1553) ~ (all_1311_1_1516 = 0) | ~ (all_1311_2_1517 = 0) | ~ (all_1311_3_1518 = 0) | all_1311_0_1515 = 0
% 51.17/18.28 | (1554) intruder_message(all_835_5_977) = all_1311_0_1515
% 51.17/18.28 |
% 51.17/18.28 | Instantiating (1518) with all_1325_0_1555, all_1325_1_1556, all_1325_2_1557, all_1325_3_1558 yields:
% 51.17/18.28 | (1555) intruder_message(all_837_5_988) = all_1325_3_1558 & intruder_message(all_835_6_978) = all_1325_0_1555 & intruder_message(all_285_7_623) = all_1325_1_1556 & intruder_message(all_63_4_187) = all_1325_2_1557 & ( ~ (all_1325_3_1558 = 0) | (all_1325_0_1555 = 0 & all_1325_1_1556 = 0 & all_1325_2_1557 = 0))
% 51.17/18.28 |
% 51.17/18.28 | Applying alpha-rule on (1555) yields:
% 51.17/18.28 | (1556) intruder_message(all_835_6_978) = all_1325_0_1555
% 51.17/18.28 | (1557) intruder_message(all_63_4_187) = all_1325_2_1557
% 51.17/18.28 | (1558) ~ (all_1325_3_1558 = 0) | (all_1325_0_1555 = 0 & all_1325_1_1556 = 0 & all_1325_2_1557 = 0)
% 51.17/18.28 | (1559) intruder_message(all_837_5_988) = all_1325_3_1558
% 51.17/18.28 | (1560) intruder_message(all_285_7_623) = all_1325_1_1556
% 51.17/18.28 |
% 51.17/18.28 | Instantiating (1517) with all_1327_0_1559, all_1327_1_1560, all_1327_2_1561, all_1327_3_1562 yields:
% 51.17/18.28 | (1561) intruder_message(all_837_5_988) = all_1327_0_1559 & intruder_message(all_835_6_978) = all_1327_1_1560 & intruder_message(all_285_7_623) = all_1327_2_1561 & intruder_message(all_63_4_187) = all_1327_3_1562 & ( ~ (all_1327_1_1560 = 0) | ~ (all_1327_2_1561 = 0) | ~ (all_1327_3_1562 = 0) | all_1327_0_1559 = 0)
% 51.17/18.28 |
% 51.17/18.28 | Applying alpha-rule on (1561) yields:
% 51.17/18.28 | (1562) intruder_message(all_835_6_978) = all_1327_1_1560
% 51.17/18.28 | (1563) intruder_message(all_837_5_988) = all_1327_0_1559
% 51.17/18.28 | (1564) intruder_message(all_285_7_623) = all_1327_2_1561
% 51.17/18.28 | (1565) intruder_message(all_63_4_187) = all_1327_3_1562
% 51.17/18.28 | (1566) ~ (all_1327_1_1560 = 0) | ~ (all_1327_2_1561 = 0) | ~ (all_1327_3_1562 = 0) | all_1327_0_1559 = 0
% 51.17/18.28 |
% 51.17/18.28 | Instantiating (1520) with all_1333_0_1583, all_1333_1_1584, all_1333_2_1585, all_1333_3_1586 yields:
% 51.17/18.28 | (1567) intruder_message(all_835_5_977) = all_1333_3_1586 & intruder_message(all_835_6_978) = all_1333_0_1583 & intruder_message(all_285_7_623) = all_1333_1_1584 & intruder_message(all_61_4_176) = all_1333_2_1585 & ( ~ (all_1333_3_1586 = 0) | (all_1333_0_1583 = 0 & all_1333_1_1584 = 0 & all_1333_2_1585 = 0))
% 51.17/18.28 |
% 51.17/18.28 | Applying alpha-rule on (1567) yields:
% 51.17/18.28 | (1568) intruder_message(all_835_5_977) = all_1333_3_1586
% 51.17/18.28 | (1569) intruder_message(all_835_6_978) = all_1333_0_1583
% 51.17/18.28 | (1570) ~ (all_1333_3_1586 = 0) | (all_1333_0_1583 = 0 & all_1333_1_1584 = 0 & all_1333_2_1585 = 0)
% 51.17/18.28 | (1571) intruder_message(all_61_4_176) = all_1333_2_1585
% 51.17/18.28 | (1572) intruder_message(all_285_7_623) = all_1333_1_1584
% 51.17/18.28 |
% 51.17/18.28 | Instantiating (1522) with all_1337_0_1590, all_1337_1_1591, all_1337_2_1592 yields:
% 51.17/18.28 | (1573) intruder_holds(all_833_2_971) = all_1337_0_1590 & party_of_protocol(a) = all_1337_1_1591 & intruder_message(all_17_7_87) = all_1337_2_1592 & ( ~ (all_1337_1_1591 = 0) | ~ (all_1337_2_1592 = 0) | all_1337_0_1590 = 0)
% 51.17/18.28 |
% 51.17/18.28 | Applying alpha-rule on (1573) yields:
% 51.17/18.28 | (1574) intruder_holds(all_833_2_971) = all_1337_0_1590
% 51.17/18.28 | (1575) party_of_protocol(a) = all_1337_1_1591
% 51.17/18.28 | (1576) intruder_message(all_17_7_87) = all_1337_2_1592
% 51.17/18.28 | (1577) ~ (all_1337_1_1591 = 0) | ~ (all_1337_2_1592 = 0) | all_1337_0_1590 = 0
% 51.17/18.29 |
% 51.17/18.29 | Instantiating (1521) with all_1369_0_1646, all_1369_1_1647, all_1369_2_1648 yields:
% 51.17/18.29 | (1578) intruder_holds(all_745_2_805) = all_1369_0_1646 & party_of_protocol(a) = all_1369_1_1647 & intruder_message(all_19_7_96) = all_1369_2_1648 & ( ~ (all_1369_1_1647 = 0) | ~ (all_1369_2_1648 = 0) | all_1369_0_1646 = 0)
% 51.17/18.29 |
% 51.17/18.29 | Applying alpha-rule on (1578) yields:
% 51.17/18.29 | (1579) intruder_holds(all_745_2_805) = all_1369_0_1646
% 51.17/18.29 | (1580) party_of_protocol(a) = all_1369_1_1647
% 51.17/18.29 | (1581) intruder_message(all_19_7_96) = all_1369_2_1648
% 51.17/18.29 | (1582) ~ (all_1369_1_1647 = 0) | ~ (all_1369_2_1648 = 0) | all_1369_0_1646 = 0
% 51.17/18.29 |
% 51.17/18.29 | Instantiating (1506) with all_1423_0_1765, all_1423_1_1766, all_1423_2_1767 yields:
% 51.17/18.29 | (1583) party_of_protocol(a) = all_1423_2_1767 & intruder_message(all_1423_1_1766) = all_1423_0_1765 & encrypt(all_0_2_2, an_a_nonce) = all_1423_1_1766 & ( ~ (all_1423_2_1767 = 0) | all_1423_0_1765 = 0)
% 51.17/18.29 |
% 51.17/18.29 | Applying alpha-rule on (1583) yields:
% 51.17/18.29 | (1584) party_of_protocol(a) = all_1423_2_1767
% 51.17/18.29 | (1585) intruder_message(all_1423_1_1766) = all_1423_0_1765
% 51.17/18.29 | (1586) encrypt(all_0_2_2, an_a_nonce) = all_1423_1_1766
% 51.17/18.29 | (1587) ~ (all_1423_2_1767 = 0) | all_1423_0_1765 = 0
% 51.17/18.29 |
% 51.17/18.29 | Instantiating (1505) with all_1425_0_1768, all_1425_1_1769, all_1425_2_1770 yields:
% 51.17/18.29 | (1588) party_of_protocol(a) = all_1425_2_1770 & intruder_message(all_1425_1_1769) = all_1425_0_1768 & encrypt(all_17_1_81, an_a_nonce) = all_1425_1_1769 & ( ~ (all_1425_2_1770 = 0) | all_1425_0_1768 = 0)
% 51.17/18.29 |
% 51.17/18.29 | Applying alpha-rule on (1588) yields:
% 51.17/18.29 | (1589) party_of_protocol(a) = all_1425_2_1770
% 51.17/18.29 | (1590) intruder_message(all_1425_1_1769) = all_1425_0_1768
% 51.17/18.29 | (1591) encrypt(all_17_1_81, an_a_nonce) = all_1425_1_1769
% 51.17/18.29 | (1592) ~ (all_1425_2_1770 = 0) | all_1425_0_1768 = 0
% 51.17/18.29 |
% 51.17/18.29 | Instantiating (1511) with all_1431_0_1777, all_1431_1_1778, all_1431_2_1779 yields:
% 51.17/18.29 | (1593) party_of_protocol(b) = all_1431_2_1779 & intruder_message(all_1431_1_1778) = all_1431_0_1777 & encrypt(all_61_7_179, an_a_nonce) = all_1431_1_1778 & ( ~ (all_1431_2_1779 = 0) | all_1431_0_1777 = 0)
% 51.17/18.29 |
% 51.17/18.29 | Applying alpha-rule on (1593) yields:
% 51.17/18.29 | (1594) party_of_protocol(b) = all_1431_2_1779
% 51.17/18.29 | (1595) intruder_message(all_1431_1_1778) = all_1431_0_1777
% 51.17/18.29 | (1596) encrypt(all_61_7_179, an_a_nonce) = all_1431_1_1778
% 51.17/18.29 | (1597) ~ (all_1431_2_1779 = 0) | all_1431_0_1777 = 0
% 51.17/18.29 |
% 51.17/18.29 | Instantiating (1502) with all_1433_0_1780, all_1433_1_1781, all_1433_2_1782 yields:
% 51.17/18.29 | (1598) party_of_protocol(a) = all_1433_2_1782 & intruder_message(all_1433_1_1781) = all_1433_0_1780 & encrypt(all_61_4_176, an_a_nonce) = all_1433_1_1781 & ( ~ (all_1433_2_1782 = 0) | all_1433_0_1780 = 0)
% 51.17/18.29 |
% 51.17/18.29 | Applying alpha-rule on (1598) yields:
% 51.17/18.29 | (1599) party_of_protocol(a) = all_1433_2_1782
% 51.17/18.29 | (1600) intruder_message(all_1433_1_1781) = all_1433_0_1780
% 51.17/18.29 | (1601) encrypt(all_61_4_176, an_a_nonce) = all_1433_1_1781
% 51.17/18.29 | (1602) ~ (all_1433_2_1782 = 0) | all_1433_0_1780 = 0
% 51.17/18.29 |
% 51.17/18.29 | Instantiating (1501) with all_1435_0_1783, all_1435_1_1784, all_1435_2_1785 yields:
% 51.17/18.29 | (1603) party_of_protocol(a) = all_1435_2_1785 & intruder_message(all_1435_1_1784) = all_1435_0_1783 & encrypt(all_61_3_175, an_a_nonce) = all_1435_1_1784 & ( ~ (all_1435_2_1785 = 0) | all_1435_0_1783 = 0)
% 51.17/18.29 |
% 51.17/18.29 | Applying alpha-rule on (1603) yields:
% 51.17/18.29 | (1604) party_of_protocol(a) = all_1435_2_1785
% 51.17/18.29 | (1605) intruder_message(all_1435_1_1784) = all_1435_0_1783
% 51.17/18.29 | (1606) encrypt(all_61_3_175, an_a_nonce) = all_1435_1_1784
% 51.17/18.29 | (1607) ~ (all_1435_2_1785 = 0) | all_1435_0_1783 = 0
% 51.17/18.29 |
% 51.17/18.29 | Instantiating (1500) with all_1437_0_1786, all_1437_1_1787, all_1437_2_1788 yields:
% 51.17/18.29 | (1608) party_of_protocol(a) = all_1437_2_1788 & intruder_message(all_1437_1_1787) = all_1437_0_1786 & encrypt(all_63_4_187, an_a_nonce) = all_1437_1_1787 & ( ~ (all_1437_2_1788 = 0) | all_1437_0_1786 = 0)
% 51.17/18.29 |
% 51.17/18.29 | Applying alpha-rule on (1608) yields:
% 51.17/18.29 | (1609) party_of_protocol(a) = all_1437_2_1788
% 51.17/18.29 | (1610) intruder_message(all_1437_1_1787) = all_1437_0_1786
% 51.17/18.29 | (1611) encrypt(all_63_4_187, an_a_nonce) = all_1437_1_1787
% 51.17/18.29 | (1612) ~ (all_1437_2_1788 = 0) | all_1437_0_1786 = 0
% 51.17/18.29 |
% 51.17/18.29 | Instantiating (1499) with all_1439_0_1789, all_1439_1_1790, all_1439_2_1791 yields:
% 51.17/18.29 | (1613) party_of_protocol(a) = all_1439_2_1791 & intruder_message(all_1439_1_1790) = all_1439_0_1789 & encrypt(all_63_3_186, an_a_nonce) = all_1439_1_1790 & ( ~ (all_1439_2_1791 = 0) | all_1439_0_1789 = 0)
% 51.17/18.29 |
% 51.17/18.29 | Applying alpha-rule on (1613) yields:
% 51.17/18.29 | (1614) party_of_protocol(a) = all_1439_2_1791
% 51.17/18.29 | (1615) intruder_message(all_1439_1_1790) = all_1439_0_1789
% 51.17/18.29 | (1616) encrypt(all_63_3_186, an_a_nonce) = all_1439_1_1790
% 51.17/18.29 | (1617) ~ (all_1439_2_1791 = 0) | all_1439_0_1789 = 0
% 51.17/18.29 |
% 51.17/18.29 | Instantiating (1504) with all_1441_0_1792, all_1441_1_1793, all_1441_2_1794 yields:
% 51.17/18.29 | (1618) party_of_protocol(a) = all_1441_2_1794 & intruder_message(all_1441_1_1793) = all_1441_0_1792 & encrypt(all_19_5_94, an_a_nonce) = all_1441_1_1793 & ( ~ (all_1441_2_1794 = 0) | all_1441_0_1792 = 0)
% 51.17/18.29 |
% 51.17/18.29 | Applying alpha-rule on (1618) yields:
% 51.17/18.29 | (1619) party_of_protocol(a) = all_1441_2_1794
% 51.17/18.29 | (1620) intruder_message(all_1441_1_1793) = all_1441_0_1792
% 51.17/18.29 | (1621) encrypt(all_19_5_94, an_a_nonce) = all_1441_1_1793
% 51.17/18.29 | (1622) ~ (all_1441_2_1794 = 0) | all_1441_0_1792 = 0
% 51.17/18.29 |
% 51.17/18.29 | Instantiating (1503) with all_1443_0_1795, all_1443_1_1796, all_1443_2_1797 yields:
% 51.17/18.29 | (1623) party_of_protocol(a) = all_1443_2_1797 & intruder_message(all_1443_1_1796) = all_1443_0_1795 & encrypt(all_61_7_179, an_a_nonce) = all_1443_1_1796 & ( ~ (all_1443_2_1797 = 0) | all_1443_0_1795 = 0)
% 51.17/18.29 |
% 51.17/18.29 | Applying alpha-rule on (1623) yields:
% 51.17/18.29 | (1624) party_of_protocol(a) = all_1443_2_1797
% 51.17/18.29 | (1625) intruder_message(all_1443_1_1796) = all_1443_0_1795
% 51.17/18.29 | (1626) encrypt(all_61_7_179, an_a_nonce) = all_1443_1_1796
% 51.17/18.29 | (1627) ~ (all_1443_2_1797 = 0) | all_1443_0_1795 = 0
% 51.17/18.29 |
% 51.17/18.29 +-Applying beta-rule and splitting (1515), into two cases.
% 51.17/18.29 |-Branch one:
% 51.17/18.29 | (1628) all_823_0_954 = 0
% 51.17/18.29 |
% 51.17/18.29 | Equations (1628) can reduce 1488 to:
% 51.17/18.29 | (551) $false
% 51.17/18.29 |
% 51.17/18.29 |-The branch is then unsatisfiable
% 51.17/18.29 |-Branch two:
% 51.17/18.29 | (1488) ~ (all_823_0_954 = 0)
% 51.17/18.29 | (1631) ? [v0] : ? [v1] : ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_61_7_179) = v0 & key(an_a_nonce, a) = v1 & ( ~ (v2 = 0) | ~ (v0 = 0)))
% 51.17/18.29 |
% 51.17/18.29 +-Applying beta-rule and splitting (1516), into two cases.
% 51.17/18.29 |-Branch one:
% 51.17/18.29 | (1628) all_823_0_954 = 0
% 51.17/18.29 |
% 51.17/18.29 | Equations (1628) can reduce 1488 to:
% 51.17/18.29 | (551) $false
% 51.17/18.29 |
% 51.17/18.29 |-The branch is then unsatisfiable
% 51.17/18.29 |-Branch two:
% 51.17/18.29 | (1488) ~ (all_823_0_954 = 0)
% 51.17/18.29 | (1635) ? [v0] : ? [v1] : ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_61_7_179) = v0 & key(an_a_nonce, t) = v1 & ( ~ (v2 = 0) | ~ (v0 = 0)))
% 51.17/18.29 |
% 51.17/18.29 +-Applying beta-rule and splitting (1514), into two cases.
% 51.17/18.29 |-Branch one:
% 51.17/18.29 | (1628) all_823_0_954 = 0
% 51.17/18.29 |
% 51.17/18.29 | Equations (1628) can reduce 1488 to:
% 51.17/18.29 | (551) $false
% 51.17/18.29 |
% 51.17/18.29 |-The branch is then unsatisfiable
% 51.17/18.29 |-Branch two:
% 51.17/18.29 | (1488) ~ (all_823_0_954 = 0)
% 51.44/18.29 | (1639) ? [v0] : ? [v1] : ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_61_7_179) = v0 & key(an_a_nonce, b) = v1 & ( ~ (v2 = 0) | ~ (v0 = 0)))
% 51.44/18.29 |
% 51.44/18.29 | Instantiating formula (66) with a, all_1439_2_1791, 0 and discharging atoms party_of_protocol(a) = all_1439_2_1791, party_of_protocol(a) = 0, yields:
% 51.44/18.29 | (1640) all_1439_2_1791 = 0
% 51.44/18.29 |
% 51.44/18.29 | Instantiating formula (66) with a, all_1435_2_1785, all_1443_2_1797 and discharging atoms party_of_protocol(a) = all_1443_2_1797, party_of_protocol(a) = all_1435_2_1785, yields:
% 51.44/18.29 | (1641) all_1443_2_1797 = all_1435_2_1785
% 51.44/18.29 |
% 51.44/18.29 | Instantiating formula (66) with a, all_1435_2_1785, all_1437_2_1788 and discharging atoms party_of_protocol(a) = all_1437_2_1788, party_of_protocol(a) = all_1435_2_1785, yields:
% 51.44/18.29 | (1642) all_1437_2_1788 = all_1435_2_1785
% 51.44/18.29 |
% 51.44/18.29 | Instantiating formula (66) with a, all_1433_2_1782, all_1443_2_1797 and discharging atoms party_of_protocol(a) = all_1443_2_1797, party_of_protocol(a) = all_1433_2_1782, yields:
% 51.44/18.29 | (1643) all_1443_2_1797 = all_1433_2_1782
% 51.44/18.29 |
% 51.44/18.29 | Instantiating formula (66) with a, all_1425_2_1770, all_1439_2_1791 and discharging atoms party_of_protocol(a) = all_1439_2_1791, party_of_protocol(a) = all_1425_2_1770, yields:
% 51.44/18.29 | (1644) all_1439_2_1791 = all_1425_2_1770
% 51.44/18.29 |
% 51.44/18.29 | Instantiating formula (66) with a, all_1369_1_1647, all_1441_2_1794 and discharging atoms party_of_protocol(a) = all_1441_2_1794, party_of_protocol(a) = all_1369_1_1647, yields:
% 51.44/18.29 | (1645) all_1441_2_1794 = all_1369_1_1647
% 51.44/18.29 |
% 51.44/18.29 | Instantiating formula (66) with a, all_1337_1_1591, all_1439_2_1791 and discharging atoms party_of_protocol(a) = all_1439_2_1791, party_of_protocol(a) = all_1337_1_1591, yields:
% 51.44/18.29 | (1646) all_1439_2_1791 = all_1337_1_1591
% 51.44/18.29 |
% 51.44/18.29 | Instantiating formula (66) with a, all_1303_1_1501, all_1369_1_1647 and discharging atoms party_of_protocol(a) = all_1369_1_1647, party_of_protocol(a) = all_1303_1_1501, yields:
% 51.44/18.29 | (1647) all_1369_1_1647 = all_1303_1_1501
% 51.44/18.29 |
% 51.44/18.29 | Instantiating formula (66) with a, all_1285_2_1475, all_1435_2_1785 and discharging atoms party_of_protocol(a) = all_1435_2_1785, party_of_protocol(a) = all_1285_2_1475, yields:
% 51.44/18.29 | (1648) all_1435_2_1785 = all_1285_2_1475
% 51.44/18.29 |
% 51.44/18.29 | Instantiating formula (66) with a, all_1285_2_1475, all_1423_2_1767 and discharging atoms party_of_protocol(a) = all_1423_2_1767, party_of_protocol(a) = all_1285_2_1475, yields:
% 51.44/18.29 | (1649) all_1423_2_1767 = all_1285_2_1475
% 51.44/18.29 |
% 51.44/18.29 | Instantiating formula (66) with a, all_1285_2_1475, all_1337_1_1591 and discharging atoms party_of_protocol(a) = all_1337_1_1591, party_of_protocol(a) = all_1285_2_1475, yields:
% 51.44/18.29 | (1650) all_1337_1_1591 = all_1285_2_1475
% 51.44/18.29 |
% 51.44/18.29 | Instantiating formula (66) with a, all_1285_2_1475, all_1303_1_1501 and discharging atoms party_of_protocol(a) = all_1303_1_1501, party_of_protocol(a) = all_1285_2_1475, yields:
% 51.44/18.30 | (1651) all_1303_1_1501 = all_1285_2_1475
% 51.44/18.30 |
% 51.44/18.30 | Instantiating formula (66) with a, all_1283_2_1472, all_1441_2_1794 and discharging atoms party_of_protocol(a) = all_1441_2_1794, party_of_protocol(a) = all_1283_2_1472, yields:
% 51.44/18.30 | (1652) all_1441_2_1794 = all_1283_2_1472
% 51.44/18.30 |
% 51.44/18.30 | Instantiating formula (66) with a, all_1281_2_1469, all_1423_2_1767 and discharging atoms party_of_protocol(a) = all_1423_2_1767, party_of_protocol(a) = all_1281_2_1469, yields:
% 51.44/18.30 | (1653) all_1423_2_1767 = all_1281_2_1469
% 51.44/18.30 |
% 51.44/18.30 | Instantiating formula (66) with a, all_1279_2_1466, all_1437_2_1788 and discharging atoms party_of_protocol(a) = all_1437_2_1788, party_of_protocol(a) = all_1279_2_1466, yields:
% 51.44/18.30 | (1654) all_1437_2_1788 = all_1279_2_1466
% 51.44/18.30 |
% 51.44/18.30 | Instantiating formula (31) with all_285_7_623, all_1333_1_1584, all_823_0_954 and discharging atoms intruder_message(all_285_7_623) = all_1333_1_1584, intruder_message(all_285_7_623) = all_823_0_954, yields:
% 51.44/18.30 | (1655) all_1333_1_1584 = all_823_0_954
% 51.44/18.30 |
% 51.44/18.30 | Instantiating formula (31) with all_285_7_623, all_1327_2_1561, all_1333_1_1584 and discharging atoms intruder_message(all_285_7_623) = all_1333_1_1584, intruder_message(all_285_7_623) = all_1327_2_1561, yields:
% 51.44/18.30 | (1656) all_1333_1_1584 = all_1327_2_1561
% 51.44/18.30 |
% 51.44/18.30 | Instantiating formula (31) with all_285_7_623, all_1325_1_1556, all_1333_1_1584 and discharging atoms intruder_message(all_285_7_623) = all_1333_1_1584, intruder_message(all_285_7_623) = all_1325_1_1556, yields:
% 51.44/18.30 | (1657) all_1333_1_1584 = all_1325_1_1556
% 51.44/18.30 |
% 51.44/18.30 | Instantiating formula (31) with all_285_7_623, all_1311_2_1517, all_1325_1_1556 and discharging atoms intruder_message(all_285_7_623) = all_1325_1_1556, intruder_message(all_285_7_623) = all_1311_2_1517, yields:
% 51.44/18.30 | (1658) all_1325_1_1556 = all_1311_2_1517
% 51.44/18.30 |
% 51.44/18.30 | Instantiating formula (8) with all_61_7_179, an_a_nonce, all_1443_1_1796, all_285_7_623 and discharging atoms encrypt(all_61_7_179, an_a_nonce) = all_1443_1_1796, encrypt(all_61_7_179, an_a_nonce) = all_285_7_623, yields:
% 51.44/18.30 | (1659) all_1443_1_1796 = all_285_7_623
% 51.44/18.30 |
% 51.44/18.30 | Instantiating formula (8) with all_61_7_179, an_a_nonce, all_1431_1_1778, all_1443_1_1796 and discharging atoms encrypt(all_61_7_179, an_a_nonce) = all_1443_1_1796, encrypt(all_61_7_179, an_a_nonce) = all_1431_1_1778, yields:
% 51.44/18.30 | (1660) all_1443_1_1796 = all_1431_1_1778
% 51.44/18.30 |
% 51.44/18.30 | Combining equations (1659,1660) yields a new equation:
% 51.44/18.30 | (1661) all_1431_1_1778 = all_285_7_623
% 51.44/18.30 |
% 51.44/18.30 | Combining equations (1641,1643) yields a new equation:
% 51.44/18.30 | (1662) all_1435_2_1785 = all_1433_2_1782
% 51.44/18.30 |
% 51.44/18.30 | Simplifying 1662 yields:
% 51.44/18.30 | (1663) all_1435_2_1785 = all_1433_2_1782
% 51.44/18.30 |
% 51.44/18.30 | Combining equations (1645,1652) yields a new equation:
% 51.44/18.30 | (1664) all_1369_1_1647 = all_1283_2_1472
% 51.44/18.30 |
% 51.44/18.30 | Simplifying 1664 yields:
% 51.44/18.30 | (1665) all_1369_1_1647 = all_1283_2_1472
% 51.44/18.30 |
% 51.44/18.30 | Combining equations (1646,1644) yields a new equation:
% 51.44/18.30 | (1666) all_1425_2_1770 = all_1337_1_1591
% 51.44/18.30 |
% 51.44/18.30 | Combining equations (1640,1644) yields a new equation:
% 51.44/18.30 | (1667) all_1425_2_1770 = 0
% 51.44/18.30 |
% 51.44/18.30 | Combining equations (1642,1654) yields a new equation:
% 51.44/18.30 | (1668) all_1435_2_1785 = all_1279_2_1466
% 51.44/18.30 |
% 51.44/18.30 | Simplifying 1668 yields:
% 51.44/18.30 | (1669) all_1435_2_1785 = all_1279_2_1466
% 51.44/18.30 |
% 51.44/18.30 | Combining equations (1648,1663) yields a new equation:
% 51.44/18.30 | (1670) all_1433_2_1782 = all_1285_2_1475
% 51.44/18.30 |
% 51.44/18.30 | Combining equations (1669,1663) yields a new equation:
% 51.44/18.30 | (1671) all_1433_2_1782 = all_1279_2_1466
% 51.44/18.30 |
% 51.44/18.30 | Combining equations (1670,1671) yields a new equation:
% 51.44/18.30 | (1672) all_1285_2_1475 = all_1279_2_1466
% 51.44/18.30 |
% 51.44/18.30 | Simplifying 1672 yields:
% 51.44/18.30 | (1673) all_1285_2_1475 = all_1279_2_1466
% 51.44/18.30 |
% 51.44/18.30 | Combining equations (1666,1667) yields a new equation:
% 51.44/18.30 | (1674) all_1337_1_1591 = 0
% 51.44/18.30 |
% 51.44/18.30 | Simplifying 1674 yields:
% 51.44/18.30 | (1675) all_1337_1_1591 = 0
% 51.44/18.30 |
% 51.44/18.30 | Combining equations (1649,1653) yields a new equation:
% 51.44/18.30 | (1676) all_1285_2_1475 = all_1281_2_1469
% 51.44/18.30 |
% 51.44/18.30 | Simplifying 1676 yields:
% 51.44/18.30 | (1677) all_1285_2_1475 = all_1281_2_1469
% 51.44/18.30 |
% 51.44/18.30 | Combining equations (1647,1665) yields a new equation:
% 51.44/18.30 | (1678) all_1303_1_1501 = all_1283_2_1472
% 51.44/18.30 |
% 51.44/18.30 | Simplifying 1678 yields:
% 51.44/18.30 | (1679) all_1303_1_1501 = all_1283_2_1472
% 51.44/18.30 |
% 51.44/18.30 | Combining equations (1650,1675) yields a new equation:
% 51.44/18.30 | (1680) all_1285_2_1475 = 0
% 51.44/18.30 |
% 51.44/18.30 | Simplifying 1680 yields:
% 51.44/18.30 | (1681) all_1285_2_1475 = 0
% 51.44/18.30 |
% 51.44/18.30 | Combining equations (1655,1656) yields a new equation:
% 51.44/18.30 | (1682) all_1327_2_1561 = all_823_0_954
% 51.44/18.30 |
% 51.44/18.30 | Combining equations (1657,1656) yields a new equation:
% 51.44/18.30 | (1683) all_1327_2_1561 = all_1325_1_1556
% 51.44/18.30 |
% 51.44/18.30 | Combining equations (1683,1682) yields a new equation:
% 51.44/18.30 | (1684) all_1325_1_1556 = all_823_0_954
% 51.44/18.30 |
% 51.44/18.30 | Simplifying 1684 yields:
% 51.44/18.30 | (1685) all_1325_1_1556 = all_823_0_954
% 51.44/18.30 |
% 51.44/18.30 | Combining equations (1685,1658) yields a new equation:
% 51.44/18.30 | (1686) all_1311_2_1517 = all_823_0_954
% 51.44/18.30 |
% 51.44/18.30 | Combining equations (1651,1679) yields a new equation:
% 51.44/18.30 | (1687) all_1285_2_1475 = all_1283_2_1472
% 51.44/18.30 |
% 51.44/18.30 | Simplifying 1687 yields:
% 51.44/18.30 | (1688) all_1285_2_1475 = all_1283_2_1472
% 51.44/18.30 |
% 51.44/18.30 | Combining equations (1673,1688) yields a new equation:
% 51.44/18.30 | (1689) all_1283_2_1472 = all_1279_2_1466
% 51.44/18.30 |
% 51.44/18.30 | Combining equations (1677,1688) yields a new equation:
% 51.44/18.30 | (1690) all_1283_2_1472 = all_1281_2_1469
% 51.44/18.30 |
% 51.44/18.30 | Combining equations (1681,1688) yields a new equation:
% 51.44/18.30 | (1691) all_1283_2_1472 = 0
% 51.44/18.30 |
% 51.44/18.30 | Combining equations (1691,1690) yields a new equation:
% 51.44/18.30 | (1692) all_1281_2_1469 = 0
% 51.44/18.30 |
% 51.44/18.30 | Combining equations (1689,1690) yields a new equation:
% 51.44/18.30 | (1693) all_1281_2_1469 = all_1279_2_1466
% 51.44/18.30 |
% 51.44/18.30 | Combining equations (1692,1693) yields a new equation:
% 51.44/18.30 | (1694) all_1279_2_1466 = 0
% 51.44/18.30 |
% 51.44/18.30 | Combining equations (1694,1671) yields a new equation:
% 51.44/18.30 | (1695) all_1433_2_1782 = 0
% 51.44/18.30 |
% 51.44/18.30 | Combining equations (1695,1643) yields a new equation:
% 51.44/18.30 | (1696) all_1443_2_1797 = 0
% 51.44/18.30 |
% 51.44/18.30 | Combining equations (1661,1660) yields a new equation:
% 51.44/18.30 | (1659) all_1443_1_1796 = all_285_7_623
% 51.44/18.30 |
% 51.44/18.30 | From (1659) and (1625) follows:
% 51.44/18.30 | (1698) intruder_message(all_285_7_623) = all_1443_0_1795
% 51.44/18.30 |
% 51.44/18.30 | From (1686) and (1552) follows:
% 51.44/18.30 | (1319) intruder_message(all_285_7_623) = all_823_0_954
% 51.44/18.30 |
% 51.44/18.30 +-Applying beta-rule and splitting (1512), into two cases.
% 51.44/18.30 |-Branch one:
% 51.44/18.30 | (1628) all_823_0_954 = 0
% 51.44/18.30 |
% 51.44/18.30 | Equations (1628) can reduce 1488 to:
% 51.44/18.30 | (551) $false
% 51.44/18.30 |
% 51.44/18.30 |-The branch is then unsatisfiable
% 51.44/18.30 |-Branch two:
% 51.44/18.30 | (1488) ~ (all_823_0_954 = 0)
% 51.44/18.30 | (1703) ? [v0] : ? [v1] : (party_of_protocol(a) = v1 & intruder_message(all_61_7_179) = v0 & ( ~ (v1 = 0) | ~ (v0 = 0)))
% 51.44/18.30 |
% 51.44/18.30 +-Applying beta-rule and splitting (1513), into two cases.
% 51.44/18.30 |-Branch one:
% 51.44/18.30 | (1628) all_823_0_954 = 0
% 51.44/18.30 |
% 51.44/18.30 | Equations (1628) can reduce 1488 to:
% 51.44/18.30 | (551) $false
% 51.44/18.30 |
% 51.44/18.30 |-The branch is then unsatisfiable
% 51.44/18.30 |-Branch two:
% 51.44/18.30 | (1488) ~ (all_823_0_954 = 0)
% 51.44/18.30 | (1707) ? [v0] : ? [v1] : (party_of_protocol(b) = v1 & intruder_message(all_61_7_179) = v0 & ( ~ (v1 = 0) | ~ (v0 = 0)))
% 51.44/18.30 |
% 51.44/18.30 +-Applying beta-rule and splitting (1627), into two cases.
% 51.44/18.30 |-Branch one:
% 51.44/18.30 | (1708) ~ (all_1443_2_1797 = 0)
% 51.44/18.30 |
% 51.44/18.30 | Equations (1696) can reduce 1708 to:
% 51.44/18.30 | (551) $false
% 51.44/18.30 |
% 51.44/18.30 |-The branch is then unsatisfiable
% 51.44/18.30 |-Branch two:
% 51.44/18.30 | (1696) all_1443_2_1797 = 0
% 51.44/18.30 | (1711) all_1443_0_1795 = 0
% 51.44/18.30 |
% 51.44/18.30 | From (1711) and (1698) follows:
% 51.44/18.30 | (1712) intruder_message(all_285_7_623) = 0
% 51.44/18.30 |
% 51.44/18.30 | Instantiating formula (31) with all_285_7_623, 0, all_823_0_954 and discharging atoms intruder_message(all_285_7_623) = all_823_0_954, intruder_message(all_285_7_623) = 0, yields:
% 51.44/18.30 | (1628) all_823_0_954 = 0
% 51.44/18.30 |
% 51.44/18.30 | Equations (1628) can reduce 1488 to:
% 51.44/18.30 | (551) $false
% 51.44/18.30 |
% 51.44/18.30 |-The branch is then unsatisfiable
% 51.44/18.30 |-Branch two:
% 51.44/18.30 | (1490) all_135_1_334 = 0
% 51.44/18.30 | (1716) ~ (all_135_2_335 = 0) | all_135_0_333 = 0
% 51.44/18.30 |
% 51.44/18.30 | From (1490) and (375) follows:
% 51.44/18.30 | (1717) intruder_message(all_13_7_53) = 0
% 51.44/18.30 |
% 51.44/18.30 | Instantiating formula (63) with all_375_1_791, a, an_a_nonce, all_63_3_186 and discharging atoms intruder_holds(all_375_1_791) = 0, intruder_message(all_63_3_186) = 0, key(an_a_nonce, a) = all_375_1_791, yields:
% 51.44/18.30 | (1499) ? [v0] : ? [v1] : ? [v2] : (party_of_protocol(a) = v0 & intruder_message(v1) = v2 & encrypt(all_63_3_186, an_a_nonce) = v1 & ( ~ (v0 = 0) | v2 = 0))
% 51.44/18.31 |
% 51.44/18.31 | Instantiating formula (63) with all_375_1_791, a, an_a_nonce, all_63_4_187 and discharging atoms intruder_holds(all_375_1_791) = 0, intruder_message(all_63_4_187) = 0, key(an_a_nonce, a) = all_375_1_791, yields:
% 51.44/18.31 | (1500) ? [v0] : ? [v1] : ? [v2] : (party_of_protocol(a) = v0 & intruder_message(v1) = v2 & encrypt(all_63_4_187, an_a_nonce) = v1 & ( ~ (v0 = 0) | v2 = 0))
% 51.44/18.31 |
% 51.44/18.31 | Instantiating formula (63) with all_375_1_791, a, an_a_nonce, all_61_3_175 and discharging atoms intruder_holds(all_375_1_791) = 0, intruder_message(all_61_3_175) = 0, key(an_a_nonce, a) = all_375_1_791, yields:
% 51.44/18.31 | (1501) ? [v0] : ? [v1] : ? [v2] : (party_of_protocol(a) = v0 & intruder_message(v1) = v2 & encrypt(all_61_3_175, an_a_nonce) = v1 & ( ~ (v0 = 0) | v2 = 0))
% 51.44/18.31 |
% 51.44/18.31 | Instantiating formula (63) with all_375_1_791, a, an_a_nonce, all_61_4_176 and discharging atoms intruder_holds(all_375_1_791) = 0, intruder_message(all_61_4_176) = 0, key(an_a_nonce, a) = all_375_1_791, yields:
% 51.44/18.31 | (1502) ? [v0] : ? [v1] : ? [v2] : (party_of_protocol(a) = v0 & intruder_message(v1) = v2 & encrypt(all_61_4_176, an_a_nonce) = v1 & ( ~ (v0 = 0) | v2 = 0))
% 51.44/18.31 |
% 51.44/18.31 | Instantiating formula (63) with all_375_1_791, a, an_a_nonce, all_61_7_179 and discharging atoms intruder_holds(all_375_1_791) = 0, intruder_message(all_61_7_179) = 0, key(an_a_nonce, a) = all_375_1_791, yields:
% 51.44/18.31 | (1503) ? [v0] : ? [v1] : ? [v2] : (party_of_protocol(a) = v0 & intruder_message(v1) = v2 & encrypt(all_61_7_179, an_a_nonce) = v1 & ( ~ (v0 = 0) | v2 = 0))
% 51.44/18.31 |
% 51.44/18.31 | Instantiating formula (63) with all_375_1_791, a, an_a_nonce, all_19_5_94 and discharging atoms intruder_holds(all_375_1_791) = 0, intruder_message(all_19_5_94) = 0, key(an_a_nonce, a) = all_375_1_791, yields:
% 51.44/18.31 | (1504) ? [v0] : ? [v1] : ? [v2] : (party_of_protocol(a) = v0 & intruder_message(v1) = v2 & encrypt(all_19_5_94, an_a_nonce) = v1 & ( ~ (v0 = 0) | v2 = 0))
% 51.44/18.31 |
% 51.44/18.31 | Instantiating formula (63) with all_375_1_791, a, an_a_nonce, all_17_1_81 and discharging atoms intruder_holds(all_375_1_791) = 0, intruder_message(all_17_1_81) = 0, key(an_a_nonce, a) = all_375_1_791, yields:
% 51.44/18.31 | (1505) ? [v0] : ? [v1] : ? [v2] : (party_of_protocol(a) = v0 & intruder_message(v1) = v2 & encrypt(all_17_1_81, an_a_nonce) = v1 & ( ~ (v0 = 0) | v2 = 0))
% 51.44/18.31 |
% 51.44/18.31 | Instantiating formula (63) with all_375_1_791, a, an_a_nonce, all_0_2_2 and discharging atoms intruder_holds(all_375_1_791) = 0, intruder_message(all_0_2_2) = 0, key(an_a_nonce, a) = all_375_1_791, yields:
% 51.44/18.31 | (1506) ? [v0] : ? [v1] : ? [v2] : (party_of_protocol(a) = v0 & intruder_message(v1) = v2 & encrypt(all_0_2_2, an_a_nonce) = v1 & ( ~ (v0 = 0) | v2 = 0))
% 51.44/18.31 |
% 51.44/18.31 | Instantiating formula (63) with all_375_1_791, a, an_a_nonce, all_0_3_3 and discharging atoms intruder_holds(all_375_1_791) = 0, intruder_message(all_0_3_3) = 0, key(an_a_nonce, a) = all_375_1_791, yields:
% 51.44/18.31 | (1507) ? [v0] : ? [v1] : ? [v2] : (party_of_protocol(a) = v0 & intruder_message(v1) = v2 & encrypt(all_0_3_3, an_a_nonce) = v1 & ( ~ (v0 = 0) | v2 = 0))
% 51.44/18.31 |
% 51.44/18.31 | Instantiating formula (63) with all_375_1_791, a, an_a_nonce, an_a_nonce and discharging atoms intruder_holds(all_375_1_791) = 0, intruder_message(an_a_nonce) = 0, key(an_a_nonce, a) = all_375_1_791, yields:
% 51.44/18.31 | (1508) ? [v0] : ? [v1] : ? [v2] : (party_of_protocol(a) = v0 & intruder_message(v1) = v2 & encrypt(an_a_nonce, an_a_nonce) = v1 & ( ~ (v0 = 0) | v2 = 0))
% 51.44/18.31 |
% 51.44/18.31 | Instantiating formula (63) with all_375_1_791, a, an_a_nonce, b and discharging atoms intruder_holds(all_375_1_791) = 0, intruder_message(b) = 0, key(an_a_nonce, a) = all_375_1_791, yields:
% 51.44/18.31 | (1509) ? [v0] : ? [v1] : ? [v2] : (party_of_protocol(a) = v0 & intruder_message(v1) = v2 & encrypt(b, an_a_nonce) = v1 & ( ~ (v0 = 0) | v2 = 0))
% 51.44/18.31 |
% 51.44/18.31 | Instantiating formula (63) with all_375_1_791, a, an_a_nonce, a and discharging atoms intruder_holds(all_375_1_791) = 0, intruder_message(a) = 0, key(an_a_nonce, a) = all_375_1_791, yields:
% 51.44/18.31 | (1510) ? [v0] : ? [v1] : ? [v2] : (party_of_protocol(a) = v0 & intruder_message(v1) = v2 & encrypt(a, an_a_nonce) = v1 & ( ~ (v0 = 0) | v2 = 0))
% 51.44/18.31 |
% 51.44/18.31 | Instantiating formula (63) with all_285_1_617, b, an_a_nonce, all_61_7_179 and discharging atoms intruder_holds(all_285_1_617) = 0, intruder_message(all_61_7_179) = 0, key(an_a_nonce, b) = all_285_1_617, yields:
% 51.44/18.31 | (1511) ? [v0] : ? [v1] : ? [v2] : (party_of_protocol(b) = v0 & intruder_message(v1) = v2 & encrypt(all_61_7_179, an_a_nonce) = v1 & ( ~ (v0 = 0) | v2 = 0))
% 51.44/18.31 |
% 51.44/18.31 | Instantiating formula (45) with all_823_0_954, all_285_7_623, all_375_1_791, a, an_a_nonce, all_61_7_179 and discharging atoms intruder_holds(all_375_1_791) = 0, intruder_message(all_285_7_623) = all_823_0_954, encrypt(all_61_7_179, an_a_nonce) = all_285_7_623, key(an_a_nonce, a) = all_375_1_791, yields:
% 51.44/18.31 | (1512) all_823_0_954 = 0 | ? [v0] : ? [v1] : (party_of_protocol(a) = v1 & intruder_message(all_61_7_179) = v0 & ( ~ (v1 = 0) | ~ (v0 = 0)))
% 51.44/18.31 |
% 51.44/18.31 | Instantiating formula (45) with all_823_0_954, all_285_7_623, all_285_1_617, b, an_a_nonce, all_61_7_179 and discharging atoms intruder_holds(all_285_1_617) = 0, intruder_message(all_285_7_623) = all_823_0_954, encrypt(all_61_7_179, an_a_nonce) = all_285_7_623, key(an_a_nonce, b) = all_285_1_617, yields:
% 51.44/18.31 | (1513) all_823_0_954 = 0 | ? [v0] : ? [v1] : (party_of_protocol(b) = v1 & intruder_message(all_61_7_179) = v0 & ( ~ (v1 = 0) | ~ (v0 = 0)))
% 51.44/18.31 |
% 51.44/18.31 | Instantiating formula (7) with all_823_0_954, all_285_7_623, b, an_a_nonce, all_61_7_179 and discharging atoms party_of_protocol(b) = 0, intruder_message(all_285_7_623) = all_823_0_954, encrypt(all_61_7_179, an_a_nonce) = all_285_7_623, yields:
% 51.44/18.31 | (1514) all_823_0_954 = 0 | ? [v0] : ? [v1] : ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_61_7_179) = v0 & key(an_a_nonce, b) = v1 & ( ~ (v2 = 0) | ~ (v0 = 0)))
% 51.44/18.31 |
% 51.44/18.31 | Instantiating formula (7) with all_823_0_954, all_285_7_623, a, an_a_nonce, all_61_7_179 and discharging atoms party_of_protocol(a) = 0, intruder_message(all_285_7_623) = all_823_0_954, encrypt(all_61_7_179, an_a_nonce) = all_285_7_623, yields:
% 51.44/18.31 | (1515) all_823_0_954 = 0 | ? [v0] : ? [v1] : ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_61_7_179) = v0 & key(an_a_nonce, a) = v1 & ( ~ (v2 = 0) | ~ (v0 = 0)))
% 51.44/18.31 |
% 51.44/18.31 | Instantiating formula (7) with all_823_0_954, all_285_7_623, t, an_a_nonce, all_61_7_179 and discharging atoms party_of_protocol(t) = 0, intruder_message(all_285_7_623) = all_823_0_954, encrypt(all_61_7_179, an_a_nonce) = all_285_7_623, yields:
% 51.44/18.31 | (1516) all_823_0_954 = 0 | ? [v0] : ? [v1] : ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_61_7_179) = v0 & key(an_a_nonce, t) = v1 & ( ~ (v2 = 0) | ~ (v0 = 0)))
% 51.44/18.31 |
% 51.44/18.31 | Instantiating formula (63) with all_375_1_791, a, an_a_nonce, all_13_7_53 and discharging atoms intruder_holds(all_375_1_791) = 0, intruder_message(all_13_7_53) = 0, key(an_a_nonce, a) = all_375_1_791, yields:
% 51.44/18.31 | (1736) ? [v0] : ? [v1] : ? [v2] : (party_of_protocol(a) = v0 & intruder_message(v1) = v2 & encrypt(all_13_7_53, an_a_nonce) = v1 & ( ~ (v0 = 0) | v2 = 0))
% 51.44/18.31 |
% 51.44/18.31 | Instantiating formula (40) with all_837_5_988, all_835_6_978, all_285_7_623, all_63_4_187 and discharging atoms triple(all_63_4_187, all_285_7_623, all_835_6_978) = all_837_5_988, yields:
% 51.44/18.31 | (1517) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (intruder_message(all_837_5_988) = v3 & intruder_message(all_835_6_978) = v2 & intruder_message(all_285_7_623) = v1 & intruder_message(all_63_4_187) = v0 & ( ~ (v2 = 0) | ~ (v1 = 0) | ~ (v0 = 0) | v3 = 0))
% 51.44/18.31 |
% 51.44/18.31 | Instantiating formula (68) with all_837_5_988, all_835_6_978, all_285_7_623, all_63_4_187 and discharging atoms triple(all_63_4_187, all_285_7_623, all_835_6_978) = all_837_5_988, yields:
% 51.44/18.31 | (1518) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (intruder_message(all_837_5_988) = v0 & intruder_message(all_835_6_978) = v3 & intruder_message(all_285_7_623) = v2 & intruder_message(all_63_4_187) = v1 & ( ~ (v0 = 0) | (v3 = 0 & v2 = 0 & v1 = 0)))
% 51.44/18.31 |
% 51.44/18.31 | Instantiating formula (40) with all_835_5_977, all_835_6_978, all_285_7_623, all_61_4_176 and discharging atoms triple(all_61_4_176, all_285_7_623, all_835_6_978) = all_835_5_977, yields:
% 51.44/18.31 | (1519) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (intruder_message(all_835_5_977) = v3 & intruder_message(all_835_6_978) = v2 & intruder_message(all_285_7_623) = v1 & intruder_message(all_61_4_176) = v0 & ( ~ (v2 = 0) | ~ (v1 = 0) | ~ (v0 = 0) | v3 = 0))
% 51.44/18.31 |
% 51.44/18.31 | Instantiating formula (68) with all_835_5_977, all_835_6_978, all_285_7_623, all_61_4_176 and discharging atoms triple(all_61_4_176, all_285_7_623, all_835_6_978) = all_835_5_977, yields:
% 51.44/18.31 | (1520) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (intruder_message(all_835_5_977) = v0 & intruder_message(all_835_6_978) = v3 & intruder_message(all_285_7_623) = v2 & intruder_message(all_61_4_176) = v1 & ( ~ (v0 = 0) | (v3 = 0 & v2 = 0 & v1 = 0)))
% 51.44/18.31 |
% 51.44/18.31 | Instantiating formula (57) with all_745_2_805, a, all_19_7_96 and discharging atoms key(all_19_7_96, a) = all_745_2_805, yields:
% 51.44/18.31 | (1521) ? [v0] : ? [v1] : ? [v2] : (intruder_holds(all_745_2_805) = v2 & party_of_protocol(a) = v1 & intruder_message(all_19_7_96) = v0 & ( ~ (v1 = 0) | ~ (v0 = 0) | v2 = 0))
% 51.44/18.31 |
% 51.44/18.31 | Instantiating formula (57) with all_833_2_971, a, all_17_7_87 and discharging atoms key(all_17_7_87, a) = all_833_2_971, yields:
% 51.44/18.31 | (1522) ? [v0] : ? [v1] : ? [v2] : (intruder_holds(all_833_2_971) = v2 & party_of_protocol(a) = v1 & intruder_message(all_17_7_87) = v0 & ( ~ (v1 = 0) | ~ (v0 = 0) | v2 = 0))
% 51.44/18.31 |
% 51.44/18.31 | Instantiating (1520) with all_1274_0_2310, all_1274_1_2311, all_1274_2_2312, all_1274_3_2313 yields:
% 51.44/18.31 | (1743) intruder_message(all_835_5_977) = all_1274_3_2313 & intruder_message(all_835_6_978) = all_1274_0_2310 & intruder_message(all_285_7_623) = all_1274_1_2311 & intruder_message(all_61_4_176) = all_1274_2_2312 & ( ~ (all_1274_3_2313 = 0) | (all_1274_0_2310 = 0 & all_1274_1_2311 = 0 & all_1274_2_2312 = 0))
% 51.44/18.31 |
% 51.44/18.31 | Applying alpha-rule on (1743) yields:
% 51.44/18.31 | (1744) intruder_message(all_285_7_623) = all_1274_1_2311
% 51.44/18.31 | (1745) intruder_message(all_835_6_978) = all_1274_0_2310
% 51.44/18.31 | (1746) ~ (all_1274_3_2313 = 0) | (all_1274_0_2310 = 0 & all_1274_1_2311 = 0 & all_1274_2_2312 = 0)
% 51.44/18.31 | (1747) intruder_message(all_61_4_176) = all_1274_2_2312
% 51.44/18.31 | (1748) intruder_message(all_835_5_977) = all_1274_3_2313
% 51.44/18.31 |
% 51.44/18.31 | Instantiating (1519) with all_1276_0_2314, all_1276_1_2315, all_1276_2_2316, all_1276_3_2317 yields:
% 51.44/18.31 | (1749) intruder_message(all_835_5_977) = all_1276_0_2314 & intruder_message(all_835_6_978) = all_1276_1_2315 & intruder_message(all_285_7_623) = all_1276_2_2316 & intruder_message(all_61_4_176) = all_1276_3_2317 & ( ~ (all_1276_1_2315 = 0) | ~ (all_1276_2_2316 = 0) | ~ (all_1276_3_2317 = 0) | all_1276_0_2314 = 0)
% 51.44/18.31 |
% 51.44/18.31 | Applying alpha-rule on (1749) yields:
% 51.44/18.31 | (1750) intruder_message(all_835_6_978) = all_1276_1_2315
% 51.44/18.31 | (1751) intruder_message(all_835_5_977) = all_1276_0_2314
% 51.44/18.31 | (1752) ~ (all_1276_1_2315 = 0) | ~ (all_1276_2_2316 = 0) | ~ (all_1276_3_2317 = 0) | all_1276_0_2314 = 0
% 51.44/18.31 | (1753) intruder_message(all_61_4_176) = all_1276_3_2317
% 51.44/18.31 | (1754) intruder_message(all_285_7_623) = all_1276_2_2316
% 51.44/18.31 |
% 51.44/18.31 | Instantiating (1518) with all_1314_0_2404, all_1314_1_2405, all_1314_2_2406, all_1314_3_2407 yields:
% 51.44/18.31 | (1755) intruder_message(all_837_5_988) = all_1314_3_2407 & intruder_message(all_835_6_978) = all_1314_0_2404 & intruder_message(all_285_7_623) = all_1314_1_2405 & intruder_message(all_63_4_187) = all_1314_2_2406 & ( ~ (all_1314_3_2407 = 0) | (all_1314_0_2404 = 0 & all_1314_1_2405 = 0 & all_1314_2_2406 = 0))
% 51.44/18.31 |
% 51.44/18.31 | Applying alpha-rule on (1755) yields:
% 51.44/18.31 | (1756) intruder_message(all_835_6_978) = all_1314_0_2404
% 51.44/18.32 | (1757) intruder_message(all_837_5_988) = all_1314_3_2407
% 51.44/18.32 | (1758) intruder_message(all_285_7_623) = all_1314_1_2405
% 51.44/18.32 | (1759) intruder_message(all_63_4_187) = all_1314_2_2406
% 51.44/18.32 | (1760) ~ (all_1314_3_2407 = 0) | (all_1314_0_2404 = 0 & all_1314_1_2405 = 0 & all_1314_2_2406 = 0)
% 51.44/18.32 |
% 51.44/18.32 | Instantiating (1517) with all_1316_0_2408, all_1316_1_2409, all_1316_2_2410, all_1316_3_2411 yields:
% 51.44/18.32 | (1761) intruder_message(all_837_5_988) = all_1316_0_2408 & intruder_message(all_835_6_978) = all_1316_1_2409 & intruder_message(all_285_7_623) = all_1316_2_2410 & intruder_message(all_63_4_187) = all_1316_3_2411 & ( ~ (all_1316_1_2409 = 0) | ~ (all_1316_2_2410 = 0) | ~ (all_1316_3_2411 = 0) | all_1316_0_2408 = 0)
% 51.44/18.32 |
% 51.44/18.32 | Applying alpha-rule on (1761) yields:
% 51.44/18.32 | (1762) intruder_message(all_285_7_623) = all_1316_2_2410
% 51.44/18.32 | (1763) intruder_message(all_837_5_988) = all_1316_0_2408
% 51.44/18.32 | (1764) intruder_message(all_63_4_187) = all_1316_3_2411
% 51.44/18.32 | (1765) ~ (all_1316_1_2409 = 0) | ~ (all_1316_2_2410 = 0) | ~ (all_1316_3_2411 = 0) | all_1316_0_2408 = 0
% 51.44/18.32 | (1766) intruder_message(all_835_6_978) = all_1316_1_2409
% 51.44/18.32 |
% 51.44/18.32 | Instantiating (1736) with all_1362_0_2514, all_1362_1_2515, all_1362_2_2516 yields:
% 51.44/18.32 | (1767) party_of_protocol(a) = all_1362_2_2516 & intruder_message(all_1362_1_2515) = all_1362_0_2514 & encrypt(all_13_7_53, an_a_nonce) = all_1362_1_2515 & ( ~ (all_1362_2_2516 = 0) | all_1362_0_2514 = 0)
% 51.44/18.32 |
% 51.44/18.32 | Applying alpha-rule on (1767) yields:
% 51.44/18.32 | (1768) party_of_protocol(a) = all_1362_2_2516
% 51.44/18.32 | (1769) intruder_message(all_1362_1_2515) = all_1362_0_2514
% 51.44/18.32 | (1770) encrypt(all_13_7_53, an_a_nonce) = all_1362_1_2515
% 51.44/18.32 | (1771) ~ (all_1362_2_2516 = 0) | all_1362_0_2514 = 0
% 51.44/18.32 |
% 51.44/18.32 | Instantiating (1506) with all_1380_0_2541, all_1380_1_2542, all_1380_2_2543 yields:
% 51.44/18.32 | (1772) party_of_protocol(a) = all_1380_2_2543 & intruder_message(all_1380_1_2542) = all_1380_0_2541 & encrypt(all_0_2_2, an_a_nonce) = all_1380_1_2542 & ( ~ (all_1380_2_2543 = 0) | all_1380_0_2541 = 0)
% 51.44/18.32 |
% 51.44/18.32 | Applying alpha-rule on (1772) yields:
% 51.44/18.32 | (1773) party_of_protocol(a) = all_1380_2_2543
% 51.44/18.32 | (1774) intruder_message(all_1380_1_2542) = all_1380_0_2541
% 51.44/18.32 | (1775) encrypt(all_0_2_2, an_a_nonce) = all_1380_1_2542
% 51.44/18.32 | (1776) ~ (all_1380_2_2543 = 0) | all_1380_0_2541 = 0
% 51.44/18.32 |
% 51.44/18.32 | Instantiating (1505) with all_1382_0_2544, all_1382_1_2545, all_1382_2_2546 yields:
% 51.44/18.32 | (1777) party_of_protocol(a) = all_1382_2_2546 & intruder_message(all_1382_1_2545) = all_1382_0_2544 & encrypt(all_17_1_81, an_a_nonce) = all_1382_1_2545 & ( ~ (all_1382_2_2546 = 0) | all_1382_0_2544 = 0)
% 51.44/18.32 |
% 51.44/18.32 | Applying alpha-rule on (1777) yields:
% 51.44/18.32 | (1778) party_of_protocol(a) = all_1382_2_2546
% 51.44/18.32 | (1779) intruder_message(all_1382_1_2545) = all_1382_0_2544
% 51.44/18.32 | (1780) encrypt(all_17_1_81, an_a_nonce) = all_1382_1_2545
% 51.44/18.32 | (1781) ~ (all_1382_2_2546 = 0) | all_1382_0_2544 = 0
% 51.44/18.32 |
% 51.44/18.32 | Instantiating (1504) with all_1384_0_2547, all_1384_1_2548, all_1384_2_2549 yields:
% 51.44/18.32 | (1782) party_of_protocol(a) = all_1384_2_2549 & intruder_message(all_1384_1_2548) = all_1384_0_2547 & encrypt(all_19_5_94, an_a_nonce) = all_1384_1_2548 & ( ~ (all_1384_2_2549 = 0) | all_1384_0_2547 = 0)
% 51.44/18.32 |
% 51.44/18.32 | Applying alpha-rule on (1782) yields:
% 51.44/18.32 | (1783) party_of_protocol(a) = all_1384_2_2549
% 51.44/18.32 | (1784) intruder_message(all_1384_1_2548) = all_1384_0_2547
% 51.44/18.32 | (1785) encrypt(all_19_5_94, an_a_nonce) = all_1384_1_2548
% 51.44/18.32 | (1786) ~ (all_1384_2_2549 = 0) | all_1384_0_2547 = 0
% 51.44/18.32 |
% 51.44/18.32 | Instantiating (1510) with all_1388_0_2553, all_1388_1_2554, all_1388_2_2555 yields:
% 51.44/18.32 | (1787) party_of_protocol(a) = all_1388_2_2555 & intruder_message(all_1388_1_2554) = all_1388_0_2553 & encrypt(a, an_a_nonce) = all_1388_1_2554 & ( ~ (all_1388_2_2555 = 0) | all_1388_0_2553 = 0)
% 51.44/18.32 |
% 51.44/18.32 | Applying alpha-rule on (1787) yields:
% 51.44/18.32 | (1788) party_of_protocol(a) = all_1388_2_2555
% 51.44/18.32 | (1789) intruder_message(all_1388_1_2554) = all_1388_0_2553
% 51.44/18.32 | (1790) encrypt(a, an_a_nonce) = all_1388_1_2554
% 51.44/18.32 | (1791) ~ (all_1388_2_2555 = 0) | all_1388_0_2553 = 0
% 51.44/18.32 |
% 51.44/18.32 | Instantiating (1509) with all_1390_0_2556, all_1390_1_2557, all_1390_2_2558 yields:
% 51.44/18.32 | (1792) party_of_protocol(a) = all_1390_2_2558 & intruder_message(all_1390_1_2557) = all_1390_0_2556 & encrypt(b, an_a_nonce) = all_1390_1_2557 & ( ~ (all_1390_2_2558 = 0) | all_1390_0_2556 = 0)
% 51.44/18.32 |
% 51.44/18.32 | Applying alpha-rule on (1792) yields:
% 51.44/18.32 | (1793) party_of_protocol(a) = all_1390_2_2558
% 51.44/18.32 | (1794) intruder_message(all_1390_1_2557) = all_1390_0_2556
% 51.44/18.32 | (1795) encrypt(b, an_a_nonce) = all_1390_1_2557
% 51.44/18.32 | (1796) ~ (all_1390_2_2558 = 0) | all_1390_0_2556 = 0
% 51.44/18.32 |
% 51.44/18.32 | Instantiating (1508) with all_1392_0_2559, all_1392_1_2560, all_1392_2_2561 yields:
% 51.44/18.32 | (1797) party_of_protocol(a) = all_1392_2_2561 & intruder_message(all_1392_1_2560) = all_1392_0_2559 & encrypt(an_a_nonce, an_a_nonce) = all_1392_1_2560 & ( ~ (all_1392_2_2561 = 0) | all_1392_0_2559 = 0)
% 51.44/18.32 |
% 51.44/18.32 | Applying alpha-rule on (1797) yields:
% 51.44/18.32 | (1798) party_of_protocol(a) = all_1392_2_2561
% 51.44/18.32 | (1799) intruder_message(all_1392_1_2560) = all_1392_0_2559
% 51.44/18.32 | (1800) encrypt(an_a_nonce, an_a_nonce) = all_1392_1_2560
% 51.44/18.32 | (1801) ~ (all_1392_2_2561 = 0) | all_1392_0_2559 = 0
% 51.44/18.32 |
% 51.44/18.32 | Instantiating (1503) with all_1394_0_2562, all_1394_1_2563, all_1394_2_2564 yields:
% 51.44/18.32 | (1802) party_of_protocol(a) = all_1394_2_2564 & intruder_message(all_1394_1_2563) = all_1394_0_2562 & encrypt(all_61_7_179, an_a_nonce) = all_1394_1_2563 & ( ~ (all_1394_2_2564 = 0) | all_1394_0_2562 = 0)
% 51.44/18.32 |
% 51.44/18.32 | Applying alpha-rule on (1802) yields:
% 51.44/18.32 | (1803) party_of_protocol(a) = all_1394_2_2564
% 51.44/18.32 | (1804) intruder_message(all_1394_1_2563) = all_1394_0_2562
% 51.44/18.32 | (1805) encrypt(all_61_7_179, an_a_nonce) = all_1394_1_2563
% 51.44/18.32 | (1806) ~ (all_1394_2_2564 = 0) | all_1394_0_2562 = 0
% 51.44/18.32 |
% 51.44/18.32 | Instantiating (1502) with all_1396_0_2565, all_1396_1_2566, all_1396_2_2567 yields:
% 51.44/18.32 | (1807) party_of_protocol(a) = all_1396_2_2567 & intruder_message(all_1396_1_2566) = all_1396_0_2565 & encrypt(all_61_4_176, an_a_nonce) = all_1396_1_2566 & ( ~ (all_1396_2_2567 = 0) | all_1396_0_2565 = 0)
% 51.44/18.32 |
% 51.44/18.32 | Applying alpha-rule on (1807) yields:
% 51.44/18.32 | (1808) party_of_protocol(a) = all_1396_2_2567
% 51.44/18.32 | (1809) intruder_message(all_1396_1_2566) = all_1396_0_2565
% 51.44/18.32 | (1810) encrypt(all_61_4_176, an_a_nonce) = all_1396_1_2566
% 51.44/18.32 | (1811) ~ (all_1396_2_2567 = 0) | all_1396_0_2565 = 0
% 51.44/18.32 |
% 51.44/18.32 | Instantiating (1501) with all_1398_0_2568, all_1398_1_2569, all_1398_2_2570 yields:
% 51.44/18.32 | (1812) party_of_protocol(a) = all_1398_2_2570 & intruder_message(all_1398_1_2569) = all_1398_0_2568 & encrypt(all_61_3_175, an_a_nonce) = all_1398_1_2569 & ( ~ (all_1398_2_2570 = 0) | all_1398_0_2568 = 0)
% 51.44/18.32 |
% 51.44/18.32 | Applying alpha-rule on (1812) yields:
% 51.44/18.32 | (1813) party_of_protocol(a) = all_1398_2_2570
% 51.44/18.32 | (1814) intruder_message(all_1398_1_2569) = all_1398_0_2568
% 51.44/18.32 | (1815) encrypt(all_61_3_175, an_a_nonce) = all_1398_1_2569
% 51.44/18.32 | (1816) ~ (all_1398_2_2570 = 0) | all_1398_0_2568 = 0
% 51.44/18.32 |
% 51.44/18.32 | Instantiating (1500) with all_1400_0_2571, all_1400_1_2572, all_1400_2_2573 yields:
% 51.44/18.32 | (1817) party_of_protocol(a) = all_1400_2_2573 & intruder_message(all_1400_1_2572) = all_1400_0_2571 & encrypt(all_63_4_187, an_a_nonce) = all_1400_1_2572 & ( ~ (all_1400_2_2573 = 0) | all_1400_0_2571 = 0)
% 51.44/18.32 |
% 51.44/18.32 | Applying alpha-rule on (1817) yields:
% 51.44/18.32 | (1818) party_of_protocol(a) = all_1400_2_2573
% 51.44/18.32 | (1819) intruder_message(all_1400_1_2572) = all_1400_0_2571
% 51.44/18.32 | (1820) encrypt(all_63_4_187, an_a_nonce) = all_1400_1_2572
% 51.44/18.32 | (1821) ~ (all_1400_2_2573 = 0) | all_1400_0_2571 = 0
% 51.44/18.32 |
% 51.44/18.32 | Instantiating (1507) with all_1402_0_2574, all_1402_1_2575, all_1402_2_2576 yields:
% 51.44/18.32 | (1822) party_of_protocol(a) = all_1402_2_2576 & intruder_message(all_1402_1_2575) = all_1402_0_2574 & encrypt(all_0_3_3, an_a_nonce) = all_1402_1_2575 & ( ~ (all_1402_2_2576 = 0) | all_1402_0_2574 = 0)
% 51.44/18.32 |
% 51.44/18.32 | Applying alpha-rule on (1822) yields:
% 51.44/18.32 | (1823) party_of_protocol(a) = all_1402_2_2576
% 51.44/18.32 | (1824) intruder_message(all_1402_1_2575) = all_1402_0_2574
% 51.44/18.32 | (1825) encrypt(all_0_3_3, an_a_nonce) = all_1402_1_2575
% 51.44/18.32 | (1826) ~ (all_1402_2_2576 = 0) | all_1402_0_2574 = 0
% 51.44/18.32 |
% 51.44/18.32 | Instantiating (1522) with all_1410_0_2588, all_1410_1_2589, all_1410_2_2590 yields:
% 51.44/18.32 | (1827) intruder_holds(all_833_2_971) = all_1410_0_2588 & party_of_protocol(a) = all_1410_1_2589 & intruder_message(all_17_7_87) = all_1410_2_2590 & ( ~ (all_1410_1_2589 = 0) | ~ (all_1410_2_2590 = 0) | all_1410_0_2588 = 0)
% 51.44/18.32 |
% 51.44/18.32 | Applying alpha-rule on (1827) yields:
% 51.44/18.32 | (1828) intruder_holds(all_833_2_971) = all_1410_0_2588
% 51.44/18.32 | (1829) party_of_protocol(a) = all_1410_1_2589
% 51.44/18.33 | (1830) intruder_message(all_17_7_87) = all_1410_2_2590
% 51.44/18.33 | (1831) ~ (all_1410_1_2589 = 0) | ~ (all_1410_2_2590 = 0) | all_1410_0_2588 = 0
% 51.44/18.33 |
% 51.44/18.33 | Instantiating (1521) with all_1424_0_2608, all_1424_1_2609, all_1424_2_2610 yields:
% 51.44/18.33 | (1832) intruder_holds(all_745_2_805) = all_1424_0_2608 & party_of_protocol(a) = all_1424_1_2609 & intruder_message(all_19_7_96) = all_1424_2_2610 & ( ~ (all_1424_1_2609 = 0) | ~ (all_1424_2_2610 = 0) | all_1424_0_2608 = 0)
% 51.44/18.33 |
% 51.44/18.33 | Applying alpha-rule on (1832) yields:
% 51.44/18.33 | (1833) intruder_holds(all_745_2_805) = all_1424_0_2608
% 51.44/18.33 | (1834) party_of_protocol(a) = all_1424_1_2609
% 51.44/18.33 | (1835) intruder_message(all_19_7_96) = all_1424_2_2610
% 51.44/18.33 | (1836) ~ (all_1424_1_2609 = 0) | ~ (all_1424_2_2610 = 0) | all_1424_0_2608 = 0
% 51.44/18.33 |
% 51.44/18.33 | Instantiating (1511) with all_1450_0_2655, all_1450_1_2656, all_1450_2_2657 yields:
% 51.44/18.33 | (1837) party_of_protocol(b) = all_1450_2_2657 & intruder_message(all_1450_1_2656) = all_1450_0_2655 & encrypt(all_61_7_179, an_a_nonce) = all_1450_1_2656 & ( ~ (all_1450_2_2657 = 0) | all_1450_0_2655 = 0)
% 51.44/18.33 |
% 51.44/18.33 | Applying alpha-rule on (1837) yields:
% 51.44/18.33 | (1838) party_of_protocol(b) = all_1450_2_2657
% 51.44/18.33 | (1839) intruder_message(all_1450_1_2656) = all_1450_0_2655
% 51.44/18.33 | (1840) encrypt(all_61_7_179, an_a_nonce) = all_1450_1_2656
% 51.44/18.33 | (1841) ~ (all_1450_2_2657 = 0) | all_1450_0_2655 = 0
% 51.44/18.33 |
% 51.44/18.33 | Instantiating (1499) with all_1456_0_2672, all_1456_1_2673, all_1456_2_2674 yields:
% 51.44/18.33 | (1842) party_of_protocol(a) = all_1456_2_2674 & intruder_message(all_1456_1_2673) = all_1456_0_2672 & encrypt(all_63_3_186, an_a_nonce) = all_1456_1_2673 & ( ~ (all_1456_2_2674 = 0) | all_1456_0_2672 = 0)
% 51.44/18.33 |
% 51.44/18.33 | Applying alpha-rule on (1842) yields:
% 51.44/18.33 | (1843) party_of_protocol(a) = all_1456_2_2674
% 51.44/18.33 | (1844) intruder_message(all_1456_1_2673) = all_1456_0_2672
% 51.44/18.33 | (1845) encrypt(all_63_3_186, an_a_nonce) = all_1456_1_2673
% 51.44/18.33 | (1846) ~ (all_1456_2_2674 = 0) | all_1456_0_2672 = 0
% 51.44/18.33 |
% 51.44/18.33 +-Applying beta-rule and splitting (1515), into two cases.
% 51.44/18.33 |-Branch one:
% 51.44/18.33 | (1628) all_823_0_954 = 0
% 51.44/18.33 |
% 51.44/18.33 | Equations (1628) can reduce 1488 to:
% 51.44/18.33 | (551) $false
% 51.44/18.33 |
% 51.44/18.33 |-The branch is then unsatisfiable
% 51.44/18.33 |-Branch two:
% 51.44/18.33 | (1488) ~ (all_823_0_954 = 0)
% 51.44/18.33 | (1631) ? [v0] : ? [v1] : ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_61_7_179) = v0 & key(an_a_nonce, a) = v1 & ( ~ (v2 = 0) | ~ (v0 = 0)))
% 51.44/18.33 |
% 51.44/18.33 +-Applying beta-rule and splitting (1514), into two cases.
% 51.44/18.33 |-Branch one:
% 51.44/18.33 | (1628) all_823_0_954 = 0
% 51.44/18.33 |
% 51.44/18.33 | Equations (1628) can reduce 1488 to:
% 51.44/18.33 | (551) $false
% 51.44/18.33 |
% 51.44/18.33 |-The branch is then unsatisfiable
% 51.44/18.33 |-Branch two:
% 51.44/18.33 | (1488) ~ (all_823_0_954 = 0)
% 51.44/18.33 | (1639) ? [v0] : ? [v1] : ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_61_7_179) = v0 & key(an_a_nonce, b) = v1 & ( ~ (v2 = 0) | ~ (v0 = 0)))
% 51.44/18.33 |
% 51.44/18.33 +-Applying beta-rule and splitting (1516), into two cases.
% 51.44/18.33 |-Branch one:
% 51.44/18.33 | (1628) all_823_0_954 = 0
% 51.44/18.33 |
% 51.44/18.33 | Equations (1628) can reduce 1488 to:
% 51.44/18.33 | (551) $false
% 51.44/18.33 |
% 51.44/18.33 |-The branch is then unsatisfiable
% 51.44/18.33 |-Branch two:
% 51.44/18.33 | (1488) ~ (all_823_0_954 = 0)
% 51.44/18.33 | (1635) ? [v0] : ? [v1] : ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_61_7_179) = v0 & key(an_a_nonce, t) = v1 & ( ~ (v2 = 0) | ~ (v0 = 0)))
% 51.44/18.33 |
% 51.44/18.33 | Instantiating formula (66) with a, all_1424_1_2609, all_1456_2_2674 and discharging atoms party_of_protocol(a) = all_1456_2_2674, party_of_protocol(a) = all_1424_1_2609, yields:
% 51.44/18.33 | (1859) all_1456_2_2674 = all_1424_1_2609
% 51.44/18.33 |
% 51.44/18.33 | Instantiating formula (66) with a, all_1410_1_2589, all_1424_1_2609 and discharging atoms party_of_protocol(a) = all_1424_1_2609, party_of_protocol(a) = all_1410_1_2589, yields:
% 51.44/18.33 | (1860) all_1424_1_2609 = all_1410_1_2589
% 51.44/18.33 |
% 51.44/18.33 | Instantiating formula (66) with a, all_1402_2_2576, all_1410_1_2589 and discharging atoms party_of_protocol(a) = all_1410_1_2589, party_of_protocol(a) = all_1402_2_2576, yields:
% 51.44/18.33 | (1861) all_1410_1_2589 = all_1402_2_2576
% 51.44/18.33 |
% 51.44/18.33 | Instantiating formula (66) with a, all_1400_2_2573, all_1402_2_2576 and discharging atoms party_of_protocol(a) = all_1402_2_2576, party_of_protocol(a) = all_1400_2_2573, yields:
% 51.44/18.33 | (1862) all_1402_2_2576 = all_1400_2_2573
% 51.44/18.33 |
% 51.44/18.33 | Instantiating formula (66) with a, all_1398_2_2570, all_1400_2_2573 and discharging atoms party_of_protocol(a) = all_1400_2_2573, party_of_protocol(a) = all_1398_2_2570, yields:
% 51.44/18.33 | (1863) all_1400_2_2573 = all_1398_2_2570
% 51.44/18.33 |
% 51.44/18.33 | Instantiating formula (66) with a, all_1396_2_2567, all_1398_2_2570 and discharging atoms party_of_protocol(a) = all_1398_2_2570, party_of_protocol(a) = all_1396_2_2567, yields:
% 51.44/18.33 | (1864) all_1398_2_2570 = all_1396_2_2567
% 51.44/18.33 |
% 51.44/18.33 | Instantiating formula (66) with a, all_1394_2_2564, all_1396_2_2567 and discharging atoms party_of_protocol(a) = all_1396_2_2567, party_of_protocol(a) = all_1394_2_2564, yields:
% 51.44/18.33 | (1865) all_1396_2_2567 = all_1394_2_2564
% 51.44/18.33 |
% 51.44/18.33 | Instantiating formula (66) with a, all_1392_2_2561, 0 and discharging atoms party_of_protocol(a) = all_1392_2_2561, party_of_protocol(a) = 0, yields:
% 51.44/18.33 | (1866) all_1392_2_2561 = 0
% 51.44/18.33 |
% 51.44/18.33 | Instantiating formula (66) with a, all_1390_2_2558, all_1392_2_2561 and discharging atoms party_of_protocol(a) = all_1392_2_2561, party_of_protocol(a) = all_1390_2_2558, yields:
% 51.44/18.33 | (1867) all_1392_2_2561 = all_1390_2_2558
% 51.44/18.33 |
% 51.44/18.33 | Instantiating formula (66) with a, all_1388_2_2555, all_1396_2_2567 and discharging atoms party_of_protocol(a) = all_1396_2_2567, party_of_protocol(a) = all_1388_2_2555, yields:
% 51.44/18.33 | (1868) all_1396_2_2567 = all_1388_2_2555
% 51.44/18.33 |
% 51.44/18.33 | Instantiating formula (66) with a, all_1388_2_2555, all_1390_2_2558 and discharging atoms party_of_protocol(a) = all_1390_2_2558, party_of_protocol(a) = all_1388_2_2555, yields:
% 51.44/18.33 | (1869) all_1390_2_2558 = all_1388_2_2555
% 51.44/18.33 |
% 51.44/18.33 | Instantiating formula (66) with a, all_1384_2_2549, all_1392_2_2561 and discharging atoms party_of_protocol(a) = all_1392_2_2561, party_of_protocol(a) = all_1384_2_2549, yields:
% 51.44/18.33 | (1870) all_1392_2_2561 = all_1384_2_2549
% 51.44/18.33 |
% 51.44/18.33 | Instantiating formula (66) with a, all_1382_2_2546, all_1390_2_2558 and discharging atoms party_of_protocol(a) = all_1390_2_2558, party_of_protocol(a) = all_1382_2_2546, yields:
% 51.44/18.33 | (1871) all_1390_2_2558 = all_1382_2_2546
% 51.44/18.33 |
% 51.44/18.33 | Instantiating formula (66) with a, all_1380_2_2543, all_1392_2_2561 and discharging atoms party_of_protocol(a) = all_1392_2_2561, party_of_protocol(a) = all_1380_2_2543, yields:
% 51.44/18.33 | (1872) all_1392_2_2561 = all_1380_2_2543
% 51.44/18.33 |
% 51.44/18.33 | Instantiating formula (66) with a, all_1362_2_2516, all_1456_2_2674 and discharging atoms party_of_protocol(a) = all_1456_2_2674, party_of_protocol(a) = all_1362_2_2516, yields:
% 51.44/18.33 | (1873) all_1456_2_2674 = all_1362_2_2516
% 51.44/18.33 |
% 51.44/18.33 | Instantiating formula (31) with all_285_7_623, all_1314_1_2405, all_823_0_954 and discharging atoms intruder_message(all_285_7_623) = all_1314_1_2405, intruder_message(all_285_7_623) = all_823_0_954, yields:
% 51.44/18.33 | (1874) all_1314_1_2405 = all_823_0_954
% 51.44/18.33 |
% 51.44/18.33 | Instantiating formula (31) with all_285_7_623, all_1314_1_2405, all_1316_2_2410 and discharging atoms intruder_message(all_285_7_623) = all_1316_2_2410, intruder_message(all_285_7_623) = all_1314_1_2405, yields:
% 51.44/18.33 | (1875) all_1316_2_2410 = all_1314_1_2405
% 51.44/18.33 |
% 51.44/18.33 | Instantiating formula (31) with all_285_7_623, all_1276_2_2316, all_1314_1_2405 and discharging atoms intruder_message(all_285_7_623) = all_1314_1_2405, intruder_message(all_285_7_623) = all_1276_2_2316, yields:
% 51.44/18.33 | (1876) all_1314_1_2405 = all_1276_2_2316
% 51.44/18.33 |
% 51.44/18.33 | Instantiating formula (31) with all_285_7_623, all_1274_1_2311, all_1316_2_2410 and discharging atoms intruder_message(all_285_7_623) = all_1316_2_2410, intruder_message(all_285_7_623) = all_1274_1_2311, yields:
% 51.44/18.33 | (1877) all_1316_2_2410 = all_1274_1_2311
% 51.44/18.33 |
% 51.44/18.33 | Instantiating formula (8) with all_61_7_179, an_a_nonce, all_1450_1_2656, all_285_7_623 and discharging atoms encrypt(all_61_7_179, an_a_nonce) = all_1450_1_2656, encrypt(all_61_7_179, an_a_nonce) = all_285_7_623, yields:
% 51.44/18.33 | (1878) all_1450_1_2656 = all_285_7_623
% 51.44/18.33 |
% 51.44/18.33 | Instantiating formula (8) with all_61_7_179, an_a_nonce, all_1394_1_2563, all_1450_1_2656 and discharging atoms encrypt(all_61_7_179, an_a_nonce) = all_1450_1_2656, encrypt(all_61_7_179, an_a_nonce) = all_1394_1_2563, yields:
% 51.44/18.33 | (1879) all_1450_1_2656 = all_1394_1_2563
% 51.44/18.33 |
% 51.44/18.33 | Combining equations (1859,1873) yields a new equation:
% 51.44/18.33 | (1880) all_1424_1_2609 = all_1362_2_2516
% 51.44/18.33 |
% 51.44/18.33 | Simplifying 1880 yields:
% 51.44/18.33 | (1881) all_1424_1_2609 = all_1362_2_2516
% 51.44/18.33 |
% 51.44/18.33 | Combining equations (1878,1879) yields a new equation:
% 51.44/18.33 | (1882) all_1394_1_2563 = all_285_7_623
% 51.44/18.33 |
% 51.44/18.33 | Combining equations (1860,1881) yields a new equation:
% 51.44/18.33 | (1883) all_1410_1_2589 = all_1362_2_2516
% 51.44/18.33 |
% 51.44/18.33 | Simplifying 1883 yields:
% 51.44/18.33 | (1884) all_1410_1_2589 = all_1362_2_2516
% 51.44/18.33 |
% 51.44/18.33 | Combining equations (1861,1884) yields a new equation:
% 51.44/18.33 | (1885) all_1402_2_2576 = all_1362_2_2516
% 51.44/18.33 |
% 51.44/18.33 | Simplifying 1885 yields:
% 51.44/18.33 | (1886) all_1402_2_2576 = all_1362_2_2516
% 51.44/18.33 |
% 51.44/18.33 | Combining equations (1862,1886) yields a new equation:
% 51.44/18.33 | (1887) all_1400_2_2573 = all_1362_2_2516
% 51.44/18.33 |
% 51.44/18.33 | Simplifying 1887 yields:
% 51.44/18.33 | (1888) all_1400_2_2573 = all_1362_2_2516
% 51.44/18.33 |
% 51.44/18.33 | Combining equations (1863,1888) yields a new equation:
% 51.44/18.33 | (1889) all_1398_2_2570 = all_1362_2_2516
% 51.44/18.33 |
% 51.44/18.33 | Simplifying 1889 yields:
% 51.44/18.33 | (1890) all_1398_2_2570 = all_1362_2_2516
% 51.44/18.33 |
% 51.44/18.33 | Combining equations (1864,1890) yields a new equation:
% 51.44/18.33 | (1891) all_1396_2_2567 = all_1362_2_2516
% 51.44/18.33 |
% 51.44/18.33 | Simplifying 1891 yields:
% 51.44/18.33 | (1892) all_1396_2_2567 = all_1362_2_2516
% 51.44/18.33 |
% 51.44/18.33 | Combining equations (1868,1865) yields a new equation:
% 51.44/18.33 | (1893) all_1394_2_2564 = all_1388_2_2555
% 51.44/18.33 |
% 51.44/18.33 | Combining equations (1892,1865) yields a new equation:
% 51.44/18.33 | (1894) all_1394_2_2564 = all_1362_2_2516
% 51.44/18.33 |
% 51.44/18.33 | Combining equations (1893,1894) yields a new equation:
% 51.44/18.33 | (1895) all_1388_2_2555 = all_1362_2_2516
% 51.44/18.33 |
% 51.44/18.33 | Simplifying 1895 yields:
% 51.44/18.33 | (1896) all_1388_2_2555 = all_1362_2_2516
% 51.44/18.33 |
% 51.44/18.33 | Combining equations (1872,1870) yields a new equation:
% 51.44/18.33 | (1897) all_1384_2_2549 = all_1380_2_2543
% 51.44/18.33 |
% 51.44/18.33 | Combining equations (1866,1870) yields a new equation:
% 51.44/18.33 | (1898) all_1384_2_2549 = 0
% 51.44/18.33 |
% 51.44/18.33 | Combining equations (1867,1870) yields a new equation:
% 51.44/18.33 | (1899) all_1390_2_2558 = all_1384_2_2549
% 51.44/18.33 |
% 51.44/18.33 | Simplifying 1899 yields:
% 51.44/18.33 | (1900) all_1390_2_2558 = all_1384_2_2549
% 51.44/18.33 |
% 51.44/18.33 | Combining equations (1900,1871) yields a new equation:
% 51.44/18.34 | (1901) all_1384_2_2549 = all_1382_2_2546
% 51.44/18.34 |
% 51.44/18.34 | Simplifying 1901 yields:
% 51.44/18.34 | (1902) all_1384_2_2549 = all_1382_2_2546
% 51.44/18.34 |
% 51.44/18.34 | Combining equations (1869,1871) yields a new equation:
% 51.44/18.34 | (1903) all_1388_2_2555 = all_1382_2_2546
% 51.44/18.34 |
% 51.44/18.34 | Simplifying 1903 yields:
% 51.44/18.34 | (1904) all_1388_2_2555 = all_1382_2_2546
% 51.44/18.34 |
% 51.44/18.34 | Combining equations (1904,1896) yields a new equation:
% 51.44/18.34 | (1905) all_1382_2_2546 = all_1362_2_2516
% 51.44/18.34 |
% 51.44/18.34 | Simplifying 1905 yields:
% 51.44/18.34 | (1906) all_1382_2_2546 = all_1362_2_2516
% 51.44/18.34 |
% 51.44/18.34 | Combining equations (1898,1897) yields a new equation:
% 51.44/18.34 | (1907) all_1380_2_2543 = 0
% 51.44/18.34 |
% 51.44/18.34 | Combining equations (1902,1897) yields a new equation:
% 51.44/18.34 | (1908) all_1382_2_2546 = all_1380_2_2543
% 51.44/18.34 |
% 51.44/18.34 | Simplifying 1908 yields:
% 51.44/18.34 | (1909) all_1382_2_2546 = all_1380_2_2543
% 51.44/18.34 |
% 51.44/18.34 | Combining equations (1909,1906) yields a new equation:
% 51.44/18.34 | (1910) all_1380_2_2543 = all_1362_2_2516
% 51.44/18.34 |
% 51.44/18.34 | Simplifying 1910 yields:
% 51.44/18.34 | (1911) all_1380_2_2543 = all_1362_2_2516
% 51.44/18.34 |
% 51.44/18.34 | Combining equations (1907,1911) yields a new equation:
% 51.44/18.34 | (1912) all_1362_2_2516 = 0
% 51.44/18.34 |
% 51.44/18.34 | Combining equations (1875,1877) yields a new equation:
% 51.44/18.34 | (1913) all_1314_1_2405 = all_1274_1_2311
% 51.44/18.34 |
% 51.44/18.34 | Simplifying 1913 yields:
% 51.44/18.34 | (1914) all_1314_1_2405 = all_1274_1_2311
% 51.44/18.34 |
% 51.44/18.34 | Combining equations (1914,1876) yields a new equation:
% 51.44/18.34 | (1915) all_1276_2_2316 = all_1274_1_2311
% 51.44/18.34 |
% 51.44/18.34 | Combining equations (1874,1876) yields a new equation:
% 51.44/18.34 | (1916) all_1276_2_2316 = all_823_0_954
% 51.44/18.34 |
% 51.44/18.34 | Combining equations (1915,1916) yields a new equation:
% 51.44/18.34 | (1917) all_1274_1_2311 = all_823_0_954
% 51.44/18.34 |
% 51.44/18.34 | Simplifying 1917 yields:
% 51.44/18.34 | (1918) all_1274_1_2311 = all_823_0_954
% 51.44/18.34 |
% 51.44/18.34 | Combining equations (1912,1894) yields a new equation:
% 51.44/18.34 | (1919) all_1394_2_2564 = 0
% 51.44/18.34 |
% 51.44/18.34 | From (1882) and (1804) follows:
% 51.44/18.34 | (1920) intruder_message(all_285_7_623) = all_1394_0_2562
% 51.44/18.34 |
% 51.44/18.34 | From (1918) and (1744) follows:
% 51.44/18.34 | (1319) intruder_message(all_285_7_623) = all_823_0_954
% 51.44/18.34 |
% 51.44/18.34 +-Applying beta-rule and splitting (1513), into two cases.
% 51.44/18.34 |-Branch one:
% 51.44/18.34 | (1628) all_823_0_954 = 0
% 51.44/18.34 |
% 51.44/18.34 | Equations (1628) can reduce 1488 to:
% 51.44/18.34 | (551) $false
% 51.44/18.34 |
% 51.44/18.34 |-The branch is then unsatisfiable
% 51.44/18.34 |-Branch two:
% 51.44/18.34 | (1488) ~ (all_823_0_954 = 0)
% 51.44/18.34 | (1707) ? [v0] : ? [v1] : (party_of_protocol(b) = v1 & intruder_message(all_61_7_179) = v0 & ( ~ (v1 = 0) | ~ (v0 = 0)))
% 51.44/18.34 |
% 51.44/18.34 +-Applying beta-rule and splitting (1512), into two cases.
% 51.44/18.34 |-Branch one:
% 51.44/18.34 | (1628) all_823_0_954 = 0
% 51.44/18.34 |
% 51.44/18.34 | Equations (1628) can reduce 1488 to:
% 51.44/18.34 | (551) $false
% 51.44/18.34 |
% 51.44/18.34 |-The branch is then unsatisfiable
% 51.44/18.34 |-Branch two:
% 51.44/18.34 | (1488) ~ (all_823_0_954 = 0)
% 51.44/18.34 | (1703) ? [v0] : ? [v1] : (party_of_protocol(a) = v1 & intruder_message(all_61_7_179) = v0 & ( ~ (v1 = 0) | ~ (v0 = 0)))
% 51.44/18.34 |
% 51.44/18.34 +-Applying beta-rule and splitting (1806), into two cases.
% 51.44/18.34 |-Branch one:
% 51.44/18.34 | (1930) ~ (all_1394_2_2564 = 0)
% 51.44/18.34 |
% 51.44/18.34 | Equations (1919) can reduce 1930 to:
% 51.44/18.34 | (551) $false
% 51.44/18.34 |
% 51.44/18.34 |-The branch is then unsatisfiable
% 51.44/18.34 |-Branch two:
% 51.44/18.34 | (1919) all_1394_2_2564 = 0
% 51.44/18.34 | (1933) all_1394_0_2562 = 0
% 51.44/18.34 |
% 51.44/18.34 | From (1933) and (1920) follows:
% 51.44/18.34 | (1712) intruder_message(all_285_7_623) = 0
% 51.44/18.34 |
% 51.44/18.34 | Instantiating formula (31) with all_285_7_623, 0, all_823_0_954 and discharging atoms intruder_message(all_285_7_623) = all_823_0_954, intruder_message(all_285_7_623) = 0, yields:
% 51.44/18.34 | (1628) all_823_0_954 = 0
% 51.44/18.34 |
% 51.44/18.34 | Equations (1628) can reduce 1488 to:
% 51.44/18.34 | (551) $false
% 51.44/18.34 |
% 51.44/18.34 |-The branch is then unsatisfiable
% 51.44/18.34 |-Branch two:
% 51.44/18.34 | (1937) all_825_1_958 = 0
% 51.44/18.34 | (1938) ~ (all_825_2_959 = 0) | all_825_0_957 = 0
% 51.44/18.34 |
% 51.44/18.34 +-Applying beta-rule and splitting (1938), into two cases.
% 51.44/18.34 |-Branch one:
% 51.44/18.34 | (1939) ~ (all_825_2_959 = 0)
% 51.44/18.34 |
% 51.44/18.34 | Equations (1387) can reduce 1939 to:
% 51.44/18.34 | (551) $false
% 51.44/18.34 |
% 51.44/18.34 |-The branch is then unsatisfiable
% 51.44/18.34 |-Branch two:
% 51.44/18.34 | (1387) all_825_2_959 = 0
% 51.44/18.34 | (1942) all_825_0_957 = 0
% 51.44/18.34 |
% 51.44/18.34 | Combining equations (1942,1381) yields a new equation:
% 51.44/18.34 | (1943) all_763_3_833 = 0
% 51.44/18.34 |
% 51.44/18.34 | Equations (1943) can reduce 1486 to:
% 51.44/18.34 | (551) $false
% 51.44/18.34 |
% 51.44/18.34 |-The branch is then unsatisfiable
% 51.44/18.34 |-Branch two:
% 51.44/18.34 | (1943) all_763_3_833 = 0
% 51.44/18.34 | (1946) all_763_0_830 = 0
% 51.44/18.34 |
% 51.44/18.34 | Combining equations (1426,1946) yields a new equation:
% 51.44/18.34 | (1947) all_375_4_794 = 0
% 51.44/18.34 |
% 51.44/18.34 | Simplifying 1947 yields:
% 51.44/18.34 | (1948) all_375_4_794 = 0
% 51.44/18.34 |
% 51.44/18.34 | Equations (1948) can reduce 1477 to:
% 51.44/18.34 | (551) $false
% 51.44/18.34 |
% 51.44/18.34 |-The branch is then unsatisfiable
% 51.44/18.34 |-Branch two:
% 51.44/18.34 | (1948) all_375_4_794 = 0
% 51.44/18.34 | (1951) all_375_0_790 = 0
% 51.44/18.34 |
% 51.44/18.34 | Equations (1951) can reduce 1471 to:
% 51.44/18.34 | (551) $false
% 51.44/18.34 |
% 51.44/18.34 |-The branch is then unsatisfiable
% 51.44/18.34 |-Branch two:
% 51.44/18.34 | (1953) all_757_0_821 = 0
% 51.44/18.34 | (1954) ~ (all_757_2_823 = 0)
% 51.44/18.34 |
% 51.44/18.34 | Equations (1466) can reduce 1954 to:
% 51.44/18.34 | (551) $false
% 51.44/18.34 |
% 51.44/18.34 |-The branch is then unsatisfiable
% 51.44/18.34 |-Branch two:
% 51.44/18.34 | (1956) ~ (all_17_0_80 = 0)
% 51.44/18.34 | (1957) ? [v0] : ? [v1] : ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_17_8_88) = v0 & key(all_17_7_87, b) = v1 & ( ~ (v2 = 0) | ~ (v0 = 0)))
% 51.44/18.34 |
% 51.44/18.34 | Instantiating (1957) with all_499_0_2688, all_499_1_2689, all_499_2_2690 yields:
% 51.44/18.34 | (1958) intruder_holds(all_499_1_2689) = all_499_0_2688 & intruder_message(all_17_8_88) = all_499_2_2690 & key(all_17_7_87, b) = all_499_1_2689 & ( ~ (all_499_0_2688 = 0) | ~ (all_499_2_2690 = 0))
% 51.44/18.34 |
% 51.44/18.34 | Applying alpha-rule on (1958) yields:
% 51.44/18.34 | (1959) intruder_holds(all_499_1_2689) = all_499_0_2688
% 51.44/18.34 | (1960) intruder_message(all_17_8_88) = all_499_2_2690
% 51.44/18.34 | (1961) key(all_17_7_87, b) = all_499_1_2689
% 51.44/18.34 | (1962) ~ (all_499_0_2688 = 0) | ~ (all_499_2_2690 = 0)
% 51.44/18.34 |
% 51.44/18.34 +-Applying beta-rule and splitting (168), into two cases.
% 51.44/18.34 |-Branch one:
% 51.44/18.34 | (1204) all_17_0_80 = 0
% 51.44/18.34 |
% 51.44/18.34 | Equations (1204) can reduce 1956 to:
% 51.44/18.34 | (551) $false
% 51.44/18.34 |
% 51.44/18.34 |-The branch is then unsatisfiable
% 51.44/18.34 |-Branch two:
% 51.44/18.34 | (1956) ~ (all_17_0_80 = 0)
% 51.44/18.34 | (1966) ? [v0] : ? [v1] : ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_17_8_88) = v0 & key(all_17_7_87, a) = v1 & ( ~ (v2 = 0) | ~ (v0 = 0)))
% 51.44/18.34 |
% 51.44/18.34 | Instantiating (1966) with all_505_0_2691, all_505_1_2692, all_505_2_2693 yields:
% 51.44/18.34 | (1967) intruder_holds(all_505_1_2692) = all_505_0_2691 & intruder_message(all_17_8_88) = all_505_2_2693 & key(all_17_7_87, a) = all_505_1_2692 & ( ~ (all_505_0_2691 = 0) | ~ (all_505_2_2693 = 0))
% 51.44/18.34 |
% 51.44/18.34 | Applying alpha-rule on (1967) yields:
% 51.44/18.34 | (1968) intruder_holds(all_505_1_2692) = all_505_0_2691
% 51.44/18.34 | (1969) intruder_message(all_17_8_88) = all_505_2_2693
% 51.44/18.35 | (1970) key(all_17_7_87, a) = all_505_1_2692
% 51.44/18.35 | (1971) ~ (all_505_0_2691 = 0) | ~ (all_505_2_2693 = 0)
% 51.44/18.35 |
% 51.44/18.35 +-Applying beta-rule and splitting (169), into two cases.
% 51.44/18.35 |-Branch one:
% 51.44/18.35 | (1204) all_17_0_80 = 0
% 51.44/18.35 |
% 51.44/18.35 | Equations (1204) can reduce 1956 to:
% 51.44/18.35 | (551) $false
% 51.44/18.35 |
% 51.44/18.35 |-The branch is then unsatisfiable
% 51.44/18.35 |-Branch two:
% 51.44/18.35 | (1956) ~ (all_17_0_80 = 0)
% 51.44/18.35 | (1975) ? [v0] : ? [v1] : ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_17_8_88) = v0 & key(all_17_7_87, t) = v1 & ( ~ (v2 = 0) | ~ (v0 = 0)))
% 51.44/18.35 |
% 51.44/18.35 | Instantiating (1975) with all_510_0_2694, all_510_1_2695, all_510_2_2696 yields:
% 51.44/18.35 | (1976) intruder_holds(all_510_1_2695) = all_510_0_2694 & intruder_message(all_17_8_88) = all_510_2_2696 & key(all_17_7_87, t) = all_510_1_2695 & ( ~ (all_510_0_2694 = 0) | ~ (all_510_2_2696 = 0))
% 51.44/18.35 |
% 51.44/18.35 | Applying alpha-rule on (1976) yields:
% 51.44/18.35 | (1977) intruder_holds(all_510_1_2695) = all_510_0_2694
% 51.44/18.35 | (1978) intruder_message(all_17_8_88) = all_510_2_2696
% 51.44/18.35 | (1979) key(all_17_7_87, t) = all_510_1_2695
% 51.44/18.35 | (1980) ~ (all_510_0_2694 = 0) | ~ (all_510_2_2696 = 0)
% 51.44/18.35 |
% 51.44/18.35 | Instantiating formula (70) with all_281_6_602, all_281_7_603, all_149_4_382 and discharging atoms pair(all_149_4_382, all_281_7_603) = all_281_6_602, yields:
% 51.44/18.35 | (1981) ? [v0] : ? [v1] : ? [v2] : ? [v3] : ? [v4] : ? [v5] : ? [v6] : ? [v7] : ? [v8] : ? [v9] : ? [v10] : (fresh_to_b(all_281_7_603) = v2 & generate_b_nonce(all_281_7_603) = v3 & generate_expiration_time(all_281_7_603) = v4 & b_stored(all_281_6_602) = v10 & triple(all_149_4_382, all_281_7_603, v4) = v5 & triple(b, v3, v6) = v7 & encrypt(v5, bt) = v6 & sent(all_149_4_382, b, all_281_6_602) = v0 & sent(b, t, v7) = v8 & message(v8) = v9 & message(v0) = v1 & ( ~ (v2 = 0) | ~ (v1 = 0) | (v10 = 0 & v9 = 0)))
% 51.44/18.35 |
% 51.44/18.35 | Instantiating formula (12) with all_285_6_622, all_285_7_623, all_63_4_187 and discharging atoms pair(all_63_4_187, all_285_7_623) = all_285_6_622, yields:
% 51.44/18.35 | (1211) ? [v0] : ? [v1] : ? [v2] : (intruder_message(all_285_6_622) = v2 & intruder_message(all_285_7_623) = v1 & intruder_message(all_63_4_187) = v0 & ( ~ (v1 = 0) | ~ (v0 = 0) | v2 = 0))
% 51.44/18.35 |
% 51.44/18.35 | Instantiating formula (56) with all_285_6_622, all_285_7_623, all_63_4_187 and discharging atoms pair(all_63_4_187, all_285_7_623) = all_285_6_622, yields:
% 51.44/18.35 | (1212) ? [v0] : ? [v1] : ? [v2] : (intruder_message(all_285_6_622) = v0 & intruder_message(all_285_7_623) = v2 & intruder_message(all_63_4_187) = v1 & ( ~ (v0 = 0) | (v2 = 0 & v1 = 0)))
% 51.44/18.35 |
% 51.44/18.35 | Instantiating formula (12) with all_375_6_796, all_285_7_623, all_61_4_176 and discharging atoms pair(all_61_4_176, all_285_7_623) = all_375_6_796, yields:
% 51.44/18.35 | (1214) ? [v0] : ? [v1] : ? [v2] : (intruder_message(all_375_6_796) = v2 & intruder_message(all_285_7_623) = v1 & intruder_message(all_61_4_176) = v0 & ( ~ (v1 = 0) | ~ (v0 = 0) | v2 = 0))
% 51.44/18.35 |
% 51.44/18.35 | Instantiating formula (56) with all_375_6_796, all_285_7_623, all_61_4_176 and discharging atoms pair(all_61_4_176, all_285_7_623) = all_375_6_796, yields:
% 51.44/18.35 | (1215) ? [v0] : ? [v1] : ? [v2] : (intruder_message(all_375_6_796) = v0 & intruder_message(all_285_7_623) = v2 & intruder_message(all_61_4_176) = v1 & ( ~ (v0 = 0) | (v2 = 0 & v1 = 0)))
% 51.44/18.35 |
% 51.44/18.35 | Instantiating formula (73) with all_281_5_601, b, all_15_14_75, all_281_6_602 and discharging atoms sent(all_15_14_75, b, all_281_6_602) = all_281_5_601, yields:
% 51.44/18.35 | (1216) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (party_of_protocol(all_15_14_75) = v1 & party_of_protocol(b) = v2 & intruder_message(all_281_6_602) = v0 & message(all_281_5_601) = v3 & ( ~ (v2 = 0) | ~ (v1 = 0) | ~ (v0 = 0) | v3 = 0))
% 51.44/18.35 |
% 51.44/18.35 | Instantiating formula (73) with all_269_5_559, b, all_15_15_76, all_269_6_560 and discharging atoms sent(all_15_15_76, b, all_269_6_560) = all_269_5_559, yields:
% 51.44/18.35 | (1217) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (party_of_protocol(all_15_15_76) = v1 & party_of_protocol(b) = v2 & intruder_message(all_269_6_560) = v0 & message(all_269_5_559) = v3 & ( ~ (v2 = 0) | ~ (v1 = 0) | ~ (v0 = 0) | v3 = 0))
% 51.44/18.35 |
% 51.44/18.35 | Instantiating formula (73) with all_277_5_581, b, all_13_9_55, all_277_6_582 and discharging atoms sent(all_13_9_55, b, all_277_6_582) = all_277_5_581, yields:
% 51.44/18.35 | (1218) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (party_of_protocol(all_13_9_55) = v1 & party_of_protocol(b) = v2 & intruder_message(all_277_6_582) = v0 & message(all_277_5_581) = v3 & ( ~ (v2 = 0) | ~ (v1 = 0) | ~ (v0 = 0) | v3 = 0))
% 51.44/18.35 |
% 51.44/18.35 | Instantiating formula (73) with all_369_10_781, b, all_11_4_36, all_131_6_319 and discharging atoms sent(all_11_4_36, b, all_131_6_319) = all_369_10_781, yields:
% 51.44/18.35 | (1219) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (party_of_protocol(all_11_4_36) = v1 & party_of_protocol(b) = v2 & intruder_message(all_131_6_319) = v0 & message(all_369_10_781) = v3 & ( ~ (v2 = 0) | ~ (v1 = 0) | ~ (v0 = 0) | v3 = 0))
% 51.44/18.35 |
% 51.44/18.35 | Instantiating formula (73) with all_285_5_621, b, b, all_285_6_622 and discharging atoms sent(b, b, all_285_6_622) = all_285_5_621, yields:
% 51.44/18.35 | (1220) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (party_of_protocol(b) = v2 & party_of_protocol(b) = v1 & intruder_message(all_285_6_622) = v0 & message(all_285_5_621) = v3 & ( ~ (v2 = 0) | ~ (v1 = 0) | ~ (v0 = 0) | v3 = 0))
% 51.44/18.35 |
% 51.44/18.35 | Instantiating formula (73) with all_369_2_773, t, b, all_369_3_774 and discharging atoms sent(b, t, all_369_3_774) = all_369_2_773, yields:
% 51.44/18.35 | (1221) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (party_of_protocol(b) = v1 & party_of_protocol(t) = v2 & intruder_message(all_369_3_774) = v0 & message(all_369_2_773) = v3 & ( ~ (v2 = 0) | ~ (v1 = 0) | ~ (v0 = 0) | v3 = 0))
% 51.44/18.35 |
% 51.44/18.35 | Instantiating formula (73) with all_375_5_795, b, a, all_375_6_796 and discharging atoms sent(a, b, all_375_6_796) = all_375_5_795, yields:
% 51.44/18.35 | (1222) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (party_of_protocol(b) = v2 & party_of_protocol(a) = v1 & intruder_message(all_375_6_796) = v0 & message(all_375_5_795) = v3 & ( ~ (v2 = 0) | ~ (v1 = 0) | ~ (v0 = 0) | v3 = 0))
% 51.44/18.35 |
% 51.44/18.35 | Instantiating formula (4) with all_375_5_795, all_375_6_796, b, a and discharging atoms sent(a, b, all_375_6_796) = all_375_5_795, yields:
% 51.44/18.35 | (1223) ? [v0] : ? [v1] : (intruder_message(all_375_6_796) = v1 & message(all_375_5_795) = v0 & ( ~ (v0 = 0) | v1 = 0))
% 51.44/18.35 |
% 51.44/18.35 | Instantiating formula (57) with all_499_1_2689, b, all_17_7_87 and discharging atoms key(all_17_7_87, b) = all_499_1_2689, yields:
% 51.44/18.35 | (1994) ? [v0] : ? [v1] : ? [v2] : (intruder_holds(all_499_1_2689) = v2 & party_of_protocol(b) = v1 & intruder_message(all_17_7_87) = v0 & ( ~ (v1 = 0) | ~ (v0 = 0) | v2 = 0))
% 51.44/18.35 |
% 51.44/18.35 | Instantiating formula (57) with all_505_1_2692, a, all_17_7_87 and discharging atoms key(all_17_7_87, a) = all_505_1_2692, yields:
% 51.44/18.35 | (1995) ? [v0] : ? [v1] : ? [v2] : (intruder_holds(all_505_1_2692) = v2 & party_of_protocol(a) = v1 & intruder_message(all_17_7_87) = v0 & ( ~ (v1 = 0) | ~ (v0 = 0) | v2 = 0))
% 51.44/18.35 |
% 51.44/18.35 | Instantiating formula (57) with all_510_1_2695, t, all_17_7_87 and discharging atoms key(all_17_7_87, t) = all_510_1_2695, yields:
% 51.44/18.35 | (1996) ? [v0] : ? [v1] : ? [v2] : (intruder_holds(all_510_1_2695) = v2 & party_of_protocol(t) = v1 & intruder_message(all_17_7_87) = v0 & ( ~ (v1 = 0) | ~ (v0 = 0) | v2 = 0))
% 51.44/18.35 |
% 51.44/18.35 | Instantiating formula (39) with all_285_1_617, an_a_nonce and discharging atoms key(an_a_nonce, b) = all_285_1_617, yields:
% 51.44/18.35 | (1225) ? [v0] : ? [v1] : ? [v2] : (intruder_holds(all_285_1_617) = v0 & b_holds(v1) = v2 & key(an_a_nonce, a) = v1 & ( ~ (v2 = 0) | ~ (v0 = 0)))
% 51.44/18.35 |
% 51.44/18.35 | Instantiating formula (57) with all_285_1_617, b, an_a_nonce and discharging atoms key(an_a_nonce, b) = all_285_1_617, yields:
% 51.44/18.35 | (1226) ? [v0] : ? [v1] : ? [v2] : (intruder_holds(all_285_1_617) = v2 & party_of_protocol(b) = v1 & intruder_message(an_a_nonce) = v0 & ( ~ (v1 = 0) | ~ (v0 = 0) | v2 = 0))
% 51.44/18.35 |
% 51.44/18.35 | Instantiating formula (62) with all_375_1_791, an_a_nonce and discharging atoms key(an_a_nonce, a) = all_375_1_791, yields:
% 51.44/18.35 | (1227) ? [v0] : ? [v1] : ? [v2] : (intruder_holds(v0) = v1 & b_holds(all_375_1_791) = v2 & key(an_a_nonce, b) = v0 & ( ~ (v2 = 0) | ~ (v1 = 0)))
% 51.44/18.35 |
% 51.44/18.35 | Instantiating formula (57) with all_375_1_791, a, an_a_nonce and discharging atoms key(an_a_nonce, a) = all_375_1_791, yields:
% 51.44/18.35 | (1228) ? [v0] : ? [v1] : ? [v2] : (intruder_holds(all_375_1_791) = v2 & party_of_protocol(a) = v1 & intruder_message(an_a_nonce) = v0 & ( ~ (v1 = 0) | ~ (v0 = 0) | v2 = 0))
% 51.44/18.35 |
% 51.44/18.35 | Instantiating (1981) with all_766_0_2697, all_766_1_2698, all_766_2_2699, all_766_3_2700, all_766_4_2701, all_766_5_2702, all_766_6_2703, all_766_7_2704, all_766_8_2705, all_766_9_2706, all_766_10_2707 yields:
% 51.44/18.35 | (2001) fresh_to_b(all_281_7_603) = all_766_8_2705 & generate_b_nonce(all_281_7_603) = all_766_7_2704 & generate_expiration_time(all_281_7_603) = all_766_6_2703 & b_stored(all_281_6_602) = all_766_0_2697 & triple(all_149_4_382, all_281_7_603, all_766_6_2703) = all_766_5_2702 & triple(b, all_766_7_2704, all_766_4_2701) = all_766_3_2700 & encrypt(all_766_5_2702, bt) = all_766_4_2701 & sent(all_149_4_382, b, all_281_6_602) = all_766_10_2707 & sent(b, t, all_766_3_2700) = all_766_2_2699 & message(all_766_2_2699) = all_766_1_2698 & message(all_766_10_2707) = all_766_9_2706 & ( ~ (all_766_8_2705 = 0) | ~ (all_766_9_2706 = 0) | (all_766_0_2697 = 0 & all_766_1_2698 = 0))
% 51.44/18.35 |
% 51.44/18.35 | Applying alpha-rule on (2001) yields:
% 51.44/18.35 | (2002) b_stored(all_281_6_602) = all_766_0_2697
% 51.44/18.35 | (2003) triple(b, all_766_7_2704, all_766_4_2701) = all_766_3_2700
% 51.44/18.35 | (2004) triple(all_149_4_382, all_281_7_603, all_766_6_2703) = all_766_5_2702
% 51.44/18.35 | (2005) generate_expiration_time(all_281_7_603) = all_766_6_2703
% 51.44/18.35 | (2006) sent(b, t, all_766_3_2700) = all_766_2_2699
% 51.44/18.35 | (2007) message(all_766_10_2707) = all_766_9_2706
% 51.44/18.35 | (2008) encrypt(all_766_5_2702, bt) = all_766_4_2701
% 51.44/18.35 | (2009) sent(all_149_4_382, b, all_281_6_602) = all_766_10_2707
% 51.44/18.35 | (2010) ~ (all_766_8_2705 = 0) | ~ (all_766_9_2706 = 0) | (all_766_0_2697 = 0 & all_766_1_2698 = 0)
% 51.44/18.35 | (2011) message(all_766_2_2699) = all_766_1_2698
% 51.44/18.35 | (2012) fresh_to_b(all_281_7_603) = all_766_8_2705
% 51.44/18.35 | (2013) generate_b_nonce(all_281_7_603) = all_766_7_2704
% 51.44/18.35 |
% 51.44/18.35 | Instantiating (1228) with all_770_0_2712, all_770_1_2713, all_770_2_2714 yields:
% 51.44/18.35 | (2014) intruder_holds(all_375_1_791) = all_770_0_2712 & party_of_protocol(a) = all_770_1_2713 & intruder_message(an_a_nonce) = all_770_2_2714 & ( ~ (all_770_1_2713 = 0) | ~ (all_770_2_2714 = 0) | all_770_0_2712 = 0)
% 51.44/18.35 |
% 51.44/18.35 | Applying alpha-rule on (2014) yields:
% 51.44/18.35 | (2015) intruder_holds(all_375_1_791) = all_770_0_2712
% 51.44/18.35 | (2016) party_of_protocol(a) = all_770_1_2713
% 51.44/18.35 | (2017) intruder_message(an_a_nonce) = all_770_2_2714
% 51.44/18.35 | (2018) ~ (all_770_1_2713 = 0) | ~ (all_770_2_2714 = 0) | all_770_0_2712 = 0
% 51.44/18.35 |
% 51.44/18.35 | Instantiating (1227) with all_772_0_2715, all_772_1_2716, all_772_2_2717 yields:
% 51.44/18.35 | (2019) intruder_holds(all_772_2_2717) = all_772_1_2716 & b_holds(all_375_1_791) = all_772_0_2715 & key(an_a_nonce, b) = all_772_2_2717 & ( ~ (all_772_0_2715 = 0) | ~ (all_772_1_2716 = 0))
% 51.44/18.35 |
% 51.44/18.35 | Applying alpha-rule on (2019) yields:
% 51.44/18.35 | (2020) intruder_holds(all_772_2_2717) = all_772_1_2716
% 51.44/18.36 | (2021) b_holds(all_375_1_791) = all_772_0_2715
% 51.44/18.36 | (2022) key(an_a_nonce, b) = all_772_2_2717
% 51.44/18.36 | (2023) ~ (all_772_0_2715 = 0) | ~ (all_772_1_2716 = 0)
% 51.44/18.36 |
% 51.44/18.36 | Instantiating (1219) with all_778_0_2722, all_778_1_2723, all_778_2_2724, all_778_3_2725 yields:
% 51.44/18.36 | (2024) party_of_protocol(all_11_4_36) = all_778_2_2724 & party_of_protocol(b) = all_778_1_2723 & intruder_message(all_131_6_319) = all_778_3_2725 & message(all_369_10_781) = all_778_0_2722 & ( ~ (all_778_1_2723 = 0) | ~ (all_778_2_2724 = 0) | ~ (all_778_3_2725 = 0) | all_778_0_2722 = 0)
% 51.44/18.36 |
% 51.44/18.36 | Applying alpha-rule on (2024) yields:
% 51.44/18.36 | (2025) message(all_369_10_781) = all_778_0_2722
% 51.44/18.36 | (2026) party_of_protocol(all_11_4_36) = all_778_2_2724
% 51.44/18.36 | (2027) party_of_protocol(b) = all_778_1_2723
% 51.44/18.36 | (2028) ~ (all_778_1_2723 = 0) | ~ (all_778_2_2724 = 0) | ~ (all_778_3_2725 = 0) | all_778_0_2722 = 0
% 51.44/18.36 | (2029) intruder_message(all_131_6_319) = all_778_3_2725
% 51.44/18.36 |
% 51.44/18.36 | Instantiating (1996) with all_786_0_2735, all_786_1_2736, all_786_2_2737 yields:
% 51.44/18.36 | (2030) intruder_holds(all_510_1_2695) = all_786_0_2735 & party_of_protocol(t) = all_786_1_2736 & intruder_message(all_17_7_87) = all_786_2_2737 & ( ~ (all_786_1_2736 = 0) | ~ (all_786_2_2737 = 0) | all_786_0_2735 = 0)
% 51.44/18.36 |
% 51.44/18.36 | Applying alpha-rule on (2030) yields:
% 51.44/18.36 | (2031) intruder_holds(all_510_1_2695) = all_786_0_2735
% 51.44/18.36 | (2032) party_of_protocol(t) = all_786_1_2736
% 51.44/18.36 | (2033) intruder_message(all_17_7_87) = all_786_2_2737
% 51.44/18.36 | (2034) ~ (all_786_1_2736 = 0) | ~ (all_786_2_2737 = 0) | all_786_0_2735 = 0
% 51.44/18.36 |
% 51.44/18.36 | Instantiating (1216) with all_790_0_2740, all_790_1_2741, all_790_2_2742, all_790_3_2743 yields:
% 51.44/18.36 | (2035) party_of_protocol(all_15_14_75) = all_790_2_2742 & party_of_protocol(b) = all_790_1_2741 & intruder_message(all_281_6_602) = all_790_3_2743 & message(all_281_5_601) = all_790_0_2740 & ( ~ (all_790_1_2741 = 0) | ~ (all_790_2_2742 = 0) | ~ (all_790_3_2743 = 0) | all_790_0_2740 = 0)
% 51.44/18.36 |
% 51.44/18.36 | Applying alpha-rule on (2035) yields:
% 51.44/18.36 | (2036) party_of_protocol(all_15_14_75) = all_790_2_2742
% 51.44/18.36 | (2037) ~ (all_790_1_2741 = 0) | ~ (all_790_2_2742 = 0) | ~ (all_790_3_2743 = 0) | all_790_0_2740 = 0
% 51.44/18.36 | (2038) party_of_protocol(b) = all_790_1_2741
% 51.44/18.36 | (2039) intruder_message(all_281_6_602) = all_790_3_2743
% 51.44/18.36 | (2040) message(all_281_5_601) = all_790_0_2740
% 51.44/18.36 |
% 51.44/18.36 | Instantiating (1212) with all_794_0_2755, all_794_1_2756, all_794_2_2757 yields:
% 51.44/18.36 | (2041) intruder_message(all_285_6_622) = all_794_2_2757 & intruder_message(all_285_7_623) = all_794_0_2755 & intruder_message(all_63_4_187) = all_794_1_2756 & ( ~ (all_794_2_2757 = 0) | (all_794_0_2755 = 0 & all_794_1_2756 = 0))
% 51.44/18.36 |
% 51.44/18.36 | Applying alpha-rule on (2041) yields:
% 51.44/18.36 | (2042) intruder_message(all_285_6_622) = all_794_2_2757
% 51.44/18.36 | (2043) intruder_message(all_285_7_623) = all_794_0_2755
% 51.44/18.36 | (2044) intruder_message(all_63_4_187) = all_794_1_2756
% 51.44/18.36 | (2045) ~ (all_794_2_2757 = 0) | (all_794_0_2755 = 0 & all_794_1_2756 = 0)
% 51.44/18.36 |
% 51.44/18.36 | Instantiating (1215) with all_796_0_2758, all_796_1_2759, all_796_2_2760 yields:
% 51.44/18.36 | (2046) intruder_message(all_375_6_796) = all_796_2_2760 & intruder_message(all_285_7_623) = all_796_0_2758 & intruder_message(all_61_4_176) = all_796_1_2759 & ( ~ (all_796_2_2760 = 0) | (all_796_0_2758 = 0 & all_796_1_2759 = 0))
% 51.44/18.36 |
% 51.44/18.36 | Applying alpha-rule on (2046) yields:
% 51.44/18.36 | (2047) intruder_message(all_375_6_796) = all_796_2_2760
% 51.44/18.36 | (2048) intruder_message(all_285_7_623) = all_796_0_2758
% 51.44/18.36 | (2049) intruder_message(all_61_4_176) = all_796_1_2759
% 51.44/18.36 | (2050) ~ (all_796_2_2760 = 0) | (all_796_0_2758 = 0 & all_796_1_2759 = 0)
% 51.44/18.36 |
% 51.44/18.36 | Instantiating (1220) with all_798_0_2761, all_798_1_2762, all_798_2_2763, all_798_3_2764 yields:
% 51.44/18.36 | (2051) party_of_protocol(b) = all_798_1_2762 & party_of_protocol(b) = all_798_2_2763 & intruder_message(all_285_6_622) = all_798_3_2764 & message(all_285_5_621) = all_798_0_2761 & ( ~ (all_798_1_2762 = 0) | ~ (all_798_2_2763 = 0) | ~ (all_798_3_2764 = 0) | all_798_0_2761 = 0)
% 51.44/18.36 |
% 51.44/18.36 | Applying alpha-rule on (2051) yields:
% 51.44/18.36 | (2052) ~ (all_798_1_2762 = 0) | ~ (all_798_2_2763 = 0) | ~ (all_798_3_2764 = 0) | all_798_0_2761 = 0
% 51.44/18.36 | (2053) party_of_protocol(b) = all_798_2_2763
% 51.44/18.36 | (2054) party_of_protocol(b) = all_798_1_2762
% 51.44/18.36 | (2055) intruder_message(all_285_6_622) = all_798_3_2764
% 51.44/18.36 | (2056) message(all_285_5_621) = all_798_0_2761
% 51.44/18.36 |
% 51.44/18.36 | Instantiating (1218) with all_802_0_2767, all_802_1_2768, all_802_2_2769, all_802_3_2770 yields:
% 51.44/18.36 | (2057) party_of_protocol(all_13_9_55) = all_802_2_2769 & party_of_protocol(b) = all_802_1_2768 & intruder_message(all_277_6_582) = all_802_3_2770 & message(all_277_5_581) = all_802_0_2767 & ( ~ (all_802_1_2768 = 0) | ~ (all_802_2_2769 = 0) | ~ (all_802_3_2770 = 0) | all_802_0_2767 = 0)
% 51.44/18.36 |
% 51.44/18.36 | Applying alpha-rule on (2057) yields:
% 51.44/18.36 | (2058) party_of_protocol(b) = all_802_1_2768
% 51.44/18.36 | (2059) ~ (all_802_1_2768 = 0) | ~ (all_802_2_2769 = 0) | ~ (all_802_3_2770 = 0) | all_802_0_2767 = 0
% 51.44/18.36 | (2060) intruder_message(all_277_6_582) = all_802_3_2770
% 51.44/18.36 | (2061) message(all_277_5_581) = all_802_0_2767
% 51.44/18.36 | (2062) party_of_protocol(all_13_9_55) = all_802_2_2769
% 51.44/18.36 |
% 51.44/18.36 | Instantiating (1214) with all_806_0_2773, all_806_1_2774, all_806_2_2775 yields:
% 51.44/18.36 | (2063) intruder_message(all_375_6_796) = all_806_0_2773 & intruder_message(all_285_7_623) = all_806_1_2774 & intruder_message(all_61_4_176) = all_806_2_2775 & ( ~ (all_806_1_2774 = 0) | ~ (all_806_2_2775 = 0) | all_806_0_2773 = 0)
% 51.44/18.36 |
% 51.44/18.36 | Applying alpha-rule on (2063) yields:
% 51.44/18.36 | (2064) intruder_message(all_375_6_796) = all_806_0_2773
% 51.44/18.36 | (2065) intruder_message(all_285_7_623) = all_806_1_2774
% 51.44/18.36 | (2066) intruder_message(all_61_4_176) = all_806_2_2775
% 51.44/18.36 | (2067) ~ (all_806_1_2774 = 0) | ~ (all_806_2_2775 = 0) | all_806_0_2773 = 0
% 51.44/18.36 |
% 51.44/18.36 | Instantiating (1211) with all_808_0_2776, all_808_1_2777, all_808_2_2778 yields:
% 51.44/18.36 | (2068) intruder_message(all_285_6_622) = all_808_0_2776 & intruder_message(all_285_7_623) = all_808_1_2777 & intruder_message(all_63_4_187) = all_808_2_2778 & ( ~ (all_808_1_2777 = 0) | ~ (all_808_2_2778 = 0) | all_808_0_2776 = 0)
% 51.44/18.36 |
% 51.44/18.36 | Applying alpha-rule on (2068) yields:
% 51.44/18.36 | (2069) intruder_message(all_285_6_622) = all_808_0_2776
% 51.44/18.36 | (2070) intruder_message(all_285_7_623) = all_808_1_2777
% 51.44/18.36 | (2071) intruder_message(all_63_4_187) = all_808_2_2778
% 51.44/18.36 | (2072) ~ (all_808_1_2777 = 0) | ~ (all_808_2_2778 = 0) | all_808_0_2776 = 0
% 51.44/18.36 |
% 51.44/18.36 | Instantiating (1217) with all_810_0_2779, all_810_1_2780, all_810_2_2781, all_810_3_2782 yields:
% 51.44/18.36 | (2073) party_of_protocol(all_15_15_76) = all_810_2_2781 & party_of_protocol(b) = all_810_1_2780 & intruder_message(all_269_6_560) = all_810_3_2782 & message(all_269_5_559) = all_810_0_2779 & ( ~ (all_810_1_2780 = 0) | ~ (all_810_2_2781 = 0) | ~ (all_810_3_2782 = 0) | all_810_0_2779 = 0)
% 51.44/18.36 |
% 51.44/18.36 | Applying alpha-rule on (2073) yields:
% 51.44/18.36 | (2074) intruder_message(all_269_6_560) = all_810_3_2782
% 51.44/18.36 | (2075) ~ (all_810_1_2780 = 0) | ~ (all_810_2_2781 = 0) | ~ (all_810_3_2782 = 0) | all_810_0_2779 = 0
% 51.44/18.36 | (2076) message(all_269_5_559) = all_810_0_2779
% 51.44/18.36 | (2077) party_of_protocol(b) = all_810_1_2780
% 51.72/18.36 | (2078) party_of_protocol(all_15_15_76) = all_810_2_2781
% 51.72/18.36 |
% 51.72/18.36 | Instantiating (1226) with all_812_0_2783, all_812_1_2784, all_812_2_2785 yields:
% 51.72/18.36 | (2079) intruder_holds(all_285_1_617) = all_812_0_2783 & party_of_protocol(b) = all_812_1_2784 & intruder_message(an_a_nonce) = all_812_2_2785 & ( ~ (all_812_1_2784 = 0) | ~ (all_812_2_2785 = 0) | all_812_0_2783 = 0)
% 51.72/18.36 |
% 51.72/18.36 | Applying alpha-rule on (2079) yields:
% 51.72/18.36 | (2080) intruder_holds(all_285_1_617) = all_812_0_2783
% 51.72/18.36 | (2081) party_of_protocol(b) = all_812_1_2784
% 51.72/18.36 | (2082) intruder_message(an_a_nonce) = all_812_2_2785
% 51.72/18.36 | (2083) ~ (all_812_1_2784 = 0) | ~ (all_812_2_2785 = 0) | all_812_0_2783 = 0
% 51.72/18.36 |
% 51.72/18.36 | Instantiating (1225) with all_814_0_2786, all_814_1_2787, all_814_2_2788 yields:
% 51.72/18.36 | (2084) intruder_holds(all_285_1_617) = all_814_2_2788 & b_holds(all_814_1_2787) = all_814_0_2786 & key(an_a_nonce, a) = all_814_1_2787 & ( ~ (all_814_0_2786 = 0) | ~ (all_814_2_2788 = 0))
% 51.72/18.36 |
% 51.72/18.36 | Applying alpha-rule on (2084) yields:
% 51.72/18.36 | (2085) intruder_holds(all_285_1_617) = all_814_2_2788
% 51.72/18.36 | (2086) b_holds(all_814_1_2787) = all_814_0_2786
% 51.72/18.36 | (2087) key(an_a_nonce, a) = all_814_1_2787
% 51.72/18.37 | (2088) ~ (all_814_0_2786 = 0) | ~ (all_814_2_2788 = 0)
% 51.72/18.37 |
% 51.72/18.37 | Instantiating (1995) with all_822_0_2805, all_822_1_2806, all_822_2_2807 yields:
% 51.72/18.37 | (2089) intruder_holds(all_505_1_2692) = all_822_0_2805 & party_of_protocol(a) = all_822_1_2806 & intruder_message(all_17_7_87) = all_822_2_2807 & ( ~ (all_822_1_2806 = 0) | ~ (all_822_2_2807 = 0) | all_822_0_2805 = 0)
% 51.72/18.37 |
% 51.72/18.37 | Applying alpha-rule on (2089) yields:
% 51.72/18.37 | (2090) intruder_holds(all_505_1_2692) = all_822_0_2805
% 51.72/18.37 | (2091) party_of_protocol(a) = all_822_1_2806
% 51.72/18.37 | (2092) intruder_message(all_17_7_87) = all_822_2_2807
% 51.72/18.37 | (2093) ~ (all_822_1_2806 = 0) | ~ (all_822_2_2807 = 0) | all_822_0_2805 = 0
% 51.72/18.37 |
% 51.72/18.37 | Instantiating (1994) with all_824_0_2808, all_824_1_2809, all_824_2_2810 yields:
% 51.72/18.37 | (2094) intruder_holds(all_499_1_2689) = all_824_0_2808 & party_of_protocol(b) = all_824_1_2809 & intruder_message(all_17_7_87) = all_824_2_2810 & ( ~ (all_824_1_2809 = 0) | ~ (all_824_2_2810 = 0) | all_824_0_2808 = 0)
% 51.72/18.37 |
% 51.72/18.37 | Applying alpha-rule on (2094) yields:
% 51.72/18.37 | (2095) intruder_holds(all_499_1_2689) = all_824_0_2808
% 51.72/18.37 | (2096) party_of_protocol(b) = all_824_1_2809
% 51.72/18.37 | (2097) intruder_message(all_17_7_87) = all_824_2_2810
% 51.72/18.37 | (2098) ~ (all_824_1_2809 = 0) | ~ (all_824_2_2810 = 0) | all_824_0_2808 = 0
% 51.72/18.37 |
% 51.72/18.37 | Instantiating (1223) with all_842_0_2845, all_842_1_2846 yields:
% 51.72/18.37 | (2099) intruder_message(all_375_6_796) = all_842_0_2845 & message(all_375_5_795) = all_842_1_2846 & ( ~ (all_842_1_2846 = 0) | all_842_0_2845 = 0)
% 51.72/18.37 |
% 51.72/18.37 | Applying alpha-rule on (2099) yields:
% 51.72/18.37 | (2100) intruder_message(all_375_6_796) = all_842_0_2845
% 51.72/18.37 | (2101) message(all_375_5_795) = all_842_1_2846
% 51.72/18.37 | (2102) ~ (all_842_1_2846 = 0) | all_842_0_2845 = 0
% 51.72/18.37 |
% 51.72/18.37 | Instantiating (1222) with all_846_0_2849, all_846_1_2850, all_846_2_2851, all_846_3_2852 yields:
% 51.74/18.37 | (2103) party_of_protocol(b) = all_846_1_2850 & party_of_protocol(a) = all_846_2_2851 & intruder_message(all_375_6_796) = all_846_3_2852 & message(all_375_5_795) = all_846_0_2849 & ( ~ (all_846_1_2850 = 0) | ~ (all_846_2_2851 = 0) | ~ (all_846_3_2852 = 0) | all_846_0_2849 = 0)
% 51.74/18.37 |
% 51.74/18.37 | Applying alpha-rule on (2103) yields:
% 51.74/18.37 | (2104) ~ (all_846_1_2850 = 0) | ~ (all_846_2_2851 = 0) | ~ (all_846_3_2852 = 0) | all_846_0_2849 = 0
% 51.74/18.37 | (2105) message(all_375_5_795) = all_846_0_2849
% 51.74/18.37 | (2106) party_of_protocol(b) = all_846_1_2850
% 51.74/18.37 | (2107) party_of_protocol(a) = all_846_2_2851
% 51.74/18.37 | (2108) intruder_message(all_375_6_796) = all_846_3_2852
% 51.74/18.37 |
% 51.74/18.37 | Instantiating (1221) with all_870_0_2910, all_870_1_2911, all_870_2_2912, all_870_3_2913 yields:
% 51.74/18.37 | (2109) party_of_protocol(b) = all_870_2_2912 & party_of_protocol(t) = all_870_1_2911 & intruder_message(all_369_3_774) = all_870_3_2913 & message(all_369_2_773) = all_870_0_2910 & ( ~ (all_870_1_2911 = 0) | ~ (all_870_2_2912 = 0) | ~ (all_870_3_2913 = 0) | all_870_0_2910 = 0)
% 51.74/18.37 |
% 51.74/18.37 | Applying alpha-rule on (2109) yields:
% 51.74/18.37 | (2110) message(all_369_2_773) = all_870_0_2910
% 51.74/18.37 | (2111) ~ (all_870_1_2911 = 0) | ~ (all_870_2_2912 = 0) | ~ (all_870_3_2913 = 0) | all_870_0_2910 = 0
% 51.74/18.37 | (2112) party_of_protocol(b) = all_870_2_2912
% 51.74/18.37 | (2113) intruder_message(all_369_3_774) = all_870_3_2913
% 51.74/18.37 | (2114) party_of_protocol(t) = all_870_1_2911
% 51.74/18.37 |
% 51.74/18.37 | Instantiating formula (37) with all_285_1_617, all_812_0_2783, all_814_2_2788 and discharging atoms intruder_holds(all_285_1_617) = all_814_2_2788, intruder_holds(all_285_1_617) = all_812_0_2783, yields:
% 51.74/18.37 | (2115) all_814_2_2788 = all_812_0_2783
% 51.74/18.37 |
% 51.74/18.37 | Instantiating formula (66) with b, all_812_1_2784, all_824_1_2809 and discharging atoms party_of_protocol(b) = all_824_1_2809, party_of_protocol(b) = all_812_1_2784, yields:
% 51.74/18.37 | (2116) all_824_1_2809 = all_812_1_2784
% 51.74/18.37 |
% 51.74/18.37 | Instantiating formula (66) with b, all_810_1_2780, all_870_2_2912 and discharging atoms party_of_protocol(b) = all_870_2_2912, party_of_protocol(b) = all_810_1_2780, yields:
% 51.74/18.37 | (2117) all_870_2_2912 = all_810_1_2780
% 51.74/18.37 |
% 51.74/18.37 | Instantiating formula (66) with b, all_810_1_2780, all_846_1_2850 and discharging atoms party_of_protocol(b) = all_846_1_2850, party_of_protocol(b) = all_810_1_2780, yields:
% 51.74/18.37 | (2118) all_846_1_2850 = all_810_1_2780
% 51.74/18.37 |
% 51.74/18.37 | Instantiating formula (66) with b, all_802_1_2768, 0 and discharging atoms party_of_protocol(b) = all_802_1_2768, party_of_protocol(b) = 0, yields:
% 51.74/18.37 | (2119) all_802_1_2768 = 0
% 51.74/18.37 |
% 51.74/18.37 | Instantiating formula (66) with b, all_802_1_2768, all_812_1_2784 and discharging atoms party_of_protocol(b) = all_812_1_2784, party_of_protocol(b) = all_802_1_2768, yields:
% 51.74/18.37 | (2120) all_812_1_2784 = all_802_1_2768
% 51.74/18.37 |
% 51.74/18.37 | Instantiating formula (66) with b, all_802_1_2768, all_810_1_2780 and discharging atoms party_of_protocol(b) = all_810_1_2780, party_of_protocol(b) = all_802_1_2768, yields:
% 51.74/18.37 | (2121) all_810_1_2780 = all_802_1_2768
% 51.74/18.37 |
% 51.74/18.37 | Instantiating formula (66) with b, all_798_1_2762, all_802_1_2768 and discharging atoms party_of_protocol(b) = all_802_1_2768, party_of_protocol(b) = all_798_1_2762, yields:
% 51.74/18.37 | (2122) all_802_1_2768 = all_798_1_2762
% 51.74/18.37 |
% 51.74/18.37 | Instantiating formula (66) with b, all_798_2_2763, all_824_1_2809 and discharging atoms party_of_protocol(b) = all_824_1_2809, party_of_protocol(b) = all_798_2_2763, yields:
% 51.74/18.37 | (2123) all_824_1_2809 = all_798_2_2763
% 51.74/18.37 |
% 51.74/18.37 | Instantiating formula (66) with b, all_790_1_2741, all_846_1_2850 and discharging atoms party_of_protocol(b) = all_846_1_2850, party_of_protocol(b) = all_790_1_2741, yields:
% 51.74/18.37 | (2124) all_846_1_2850 = all_790_1_2741
% 51.74/18.37 |
% 51.74/18.37 | Instantiating formula (66) with b, all_778_1_2723, all_870_2_2912 and discharging atoms party_of_protocol(b) = all_870_2_2912, party_of_protocol(b) = all_778_1_2723, yields:
% 51.74/18.37 | (2125) all_870_2_2912 = all_778_1_2723
% 51.74/18.37 |
% 51.74/18.37 | Instantiating formula (66) with a, all_846_2_2851, 0 and discharging atoms party_of_protocol(a) = all_846_2_2851, party_of_protocol(a) = 0, yields:
% 51.74/18.37 | (2126) all_846_2_2851 = 0
% 51.74/18.37 |
% 51.74/18.37 | Instantiating formula (66) with a, all_822_1_2806, all_846_2_2851 and discharging atoms party_of_protocol(a) = all_846_2_2851, party_of_protocol(a) = all_822_1_2806, yields:
% 51.74/18.37 | (2127) all_846_2_2851 = all_822_1_2806
% 51.74/18.37 |
% 51.74/18.37 | Instantiating formula (66) with a, all_770_1_2713, all_846_2_2851 and discharging atoms party_of_protocol(a) = all_846_2_2851, party_of_protocol(a) = all_770_1_2713, yields:
% 51.74/18.37 | (2128) all_846_2_2851 = all_770_1_2713
% 51.74/18.37 |
% 51.74/18.37 | Instantiating formula (66) with t, all_870_1_2911, 0 and discharging atoms party_of_protocol(t) = all_870_1_2911, party_of_protocol(t) = 0, yields:
% 51.74/18.37 | (2129) all_870_1_2911 = 0
% 51.74/18.37 |
% 51.74/18.37 | Instantiating formula (66) with t, all_786_1_2736, all_870_1_2911 and discharging atoms party_of_protocol(t) = all_870_1_2911, party_of_protocol(t) = all_786_1_2736, yields:
% 51.74/18.37 | (2130) all_870_1_2911 = all_786_1_2736
% 51.74/18.37 |
% 51.74/18.37 | Instantiating formula (31) with all_375_6_796, all_842_0_2845, all_846_3_2852 and discharging atoms intruder_message(all_375_6_796) = all_846_3_2852, intruder_message(all_375_6_796) = all_842_0_2845, yields:
% 51.74/18.37 | (2131) all_846_3_2852 = all_842_0_2845
% 51.74/18.37 |
% 51.74/18.37 | Instantiating formula (31) with all_375_6_796, all_806_0_2773, all_846_3_2852 and discharging atoms intruder_message(all_375_6_796) = all_846_3_2852, intruder_message(all_375_6_796) = all_806_0_2773, yields:
% 51.74/18.37 | (2132) all_846_3_2852 = all_806_0_2773
% 51.74/18.37 |
% 51.74/18.37 | Instantiating formula (31) with all_375_6_796, all_796_2_2760, all_846_3_2852 and discharging atoms intruder_message(all_375_6_796) = all_846_3_2852, intruder_message(all_375_6_796) = all_796_2_2760, yields:
% 51.74/18.37 | (2133) all_846_3_2852 = all_796_2_2760
% 51.74/18.37 |
% 51.74/18.37 | Instantiating formula (31) with all_285_7_623, all_806_1_2774, all_808_1_2777 and discharging atoms intruder_message(all_285_7_623) = all_808_1_2777, intruder_message(all_285_7_623) = all_806_1_2774, yields:
% 51.74/18.37 | (2134) all_808_1_2777 = all_806_1_2774
% 51.74/18.37 |
% 51.74/18.37 | Instantiating formula (31) with all_285_7_623, all_796_0_2758, all_808_1_2777 and discharging atoms intruder_message(all_285_7_623) = all_808_1_2777, intruder_message(all_285_7_623) = all_796_0_2758, yields:
% 51.74/18.37 | (2135) all_808_1_2777 = all_796_0_2758
% 51.74/18.37 |
% 51.74/18.37 | Instantiating formula (31) with all_285_7_623, all_794_0_2755, all_806_1_2774 and discharging atoms intruder_message(all_285_7_623) = all_806_1_2774, intruder_message(all_285_7_623) = all_794_0_2755, yields:
% 51.74/18.37 | (2136) all_806_1_2774 = all_794_0_2755
% 51.74/18.37 |
% 51.74/18.37 | Instantiating formula (31) with all_63_4_187, all_808_2_2778, 0 and discharging atoms intruder_message(all_63_4_187) = all_808_2_2778, intruder_message(all_63_4_187) = 0, yields:
% 51.74/18.37 | (2137) all_808_2_2778 = 0
% 51.74/18.37 |
% 51.74/18.37 | Instantiating formula (31) with all_63_4_187, all_794_1_2756, all_808_2_2778 and discharging atoms intruder_message(all_63_4_187) = all_808_2_2778, intruder_message(all_63_4_187) = all_794_1_2756, yields:
% 51.74/18.37 | (2138) all_808_2_2778 = all_794_1_2756
% 51.74/18.37 |
% 51.74/18.37 | Instantiating formula (31) with all_61_4_176, all_806_2_2775, 0 and discharging atoms intruder_message(all_61_4_176) = all_806_2_2775, intruder_message(all_61_4_176) = 0, yields:
% 51.74/18.37 | (2139) all_806_2_2775 = 0
% 51.74/18.37 |
% 51.74/18.37 | Instantiating formula (31) with all_61_4_176, all_796_1_2759, all_806_2_2775 and discharging atoms intruder_message(all_61_4_176) = all_806_2_2775, intruder_message(all_61_4_176) = all_796_1_2759, yields:
% 51.74/18.37 | (2140) all_806_2_2775 = all_796_1_2759
% 51.74/18.37 |
% 51.74/18.37 | Instantiating formula (31) with an_a_nonce, all_812_2_2785, 0 and discharging atoms intruder_message(an_a_nonce) = all_812_2_2785, intruder_message(an_a_nonce) = 0, yields:
% 51.74/18.37 | (2141) all_812_2_2785 = 0
% 51.74/18.37 |
% 51.74/18.37 | Instantiating formula (31) with an_a_nonce, all_770_2_2714, all_812_2_2785 and discharging atoms intruder_message(an_a_nonce) = all_812_2_2785, intruder_message(an_a_nonce) = all_770_2_2714, yields:
% 51.74/18.37 | (2142) all_812_2_2785 = all_770_2_2714
% 51.74/18.37 |
% 51.74/18.37 | Instantiating formula (26) with all_375_1_791, all_772_0_2715, all_375_0_790 and discharging atoms b_holds(all_375_1_791) = all_772_0_2715, b_holds(all_375_1_791) = all_375_0_790, yields:
% 51.74/18.37 | (2143) all_772_0_2715 = all_375_0_790
% 51.74/18.37 |
% 51.74/18.37 | Instantiating formula (15) with all_375_5_795, all_846_0_2849, all_375_4_794 and discharging atoms message(all_375_5_795) = all_846_0_2849, message(all_375_5_795) = all_375_4_794, yields:
% 51.74/18.37 | (2144) all_846_0_2849 = all_375_4_794
% 51.74/18.37 |
% 51.74/18.37 | Instantiating formula (15) with all_375_5_795, all_842_1_2846, all_846_0_2849 and discharging atoms message(all_375_5_795) = all_846_0_2849, message(all_375_5_795) = all_842_1_2846, yields:
% 51.74/18.37 | (2145) all_846_0_2849 = all_842_1_2846
% 51.74/18.37 |
% 51.74/18.37 | Instantiating formula (55) with an_a_nonce, b, all_772_2_2717, all_285_1_617 and discharging atoms key(an_a_nonce, b) = all_772_2_2717, key(an_a_nonce, b) = all_285_1_617, yields:
% 51.74/18.37 | (2146) all_772_2_2717 = all_285_1_617
% 51.74/18.37 |
% 51.74/18.37 | Instantiating formula (55) with an_a_nonce, a, all_814_1_2787, all_375_1_791 and discharging atoms key(an_a_nonce, a) = all_814_1_2787, key(an_a_nonce, a) = all_375_1_791, yields:
% 51.74/18.37 | (2147) all_814_1_2787 = all_375_1_791
% 51.74/18.37 |
% 51.74/18.37 | Combining equations (2130,2129) yields a new equation:
% 51.74/18.37 | (2148) all_786_1_2736 = 0
% 51.74/18.37 |
% 51.74/18.37 | Simplifying 2148 yields:
% 51.74/18.37 | (2149) all_786_1_2736 = 0
% 51.74/18.37 |
% 51.74/18.37 | Combining equations (2117,2125) yields a new equation:
% 51.74/18.37 | (2150) all_810_1_2780 = all_778_1_2723
% 51.74/18.37 |
% 51.74/18.37 | Simplifying 2150 yields:
% 51.74/18.37 | (2151) all_810_1_2780 = all_778_1_2723
% 51.74/18.37 |
% 51.74/18.37 | Combining equations (2144,2145) yields a new equation:
% 51.74/18.37 | (2152) all_842_1_2846 = all_375_4_794
% 51.74/18.37 |
% 51.74/18.37 | Combining equations (2118,2124) yields a new equation:
% 51.74/18.37 | (2153) all_810_1_2780 = all_790_1_2741
% 51.74/18.37 |
% 51.74/18.37 | Simplifying 2153 yields:
% 51.74/18.37 | (2154) all_810_1_2780 = all_790_1_2741
% 51.74/18.37 |
% 51.74/18.37 | Combining equations (2128,2127) yields a new equation:
% 51.74/18.37 | (2155) all_822_1_2806 = all_770_1_2713
% 51.74/18.37 |
% 51.74/18.37 | Combining equations (2126,2127) yields a new equation:
% 51.74/18.38 | (2156) all_822_1_2806 = 0
% 51.74/18.38 |
% 51.74/18.38 | Combining equations (2132,2131) yields a new equation:
% 51.74/18.38 | (2157) all_842_0_2845 = all_806_0_2773
% 51.74/18.38 |
% 51.74/18.38 | Combining equations (2133,2131) yields a new equation:
% 51.74/18.38 | (2158) all_842_0_2845 = all_796_2_2760
% 51.74/18.38 |
% 51.74/18.38 | Combining equations (2158,2157) yields a new equation:
% 51.74/18.38 | (2159) all_806_0_2773 = all_796_2_2760
% 51.74/18.38 |
% 51.74/18.38 | Combining equations (2116,2123) yields a new equation:
% 51.74/18.38 | (2160) all_812_1_2784 = all_798_2_2763
% 51.74/18.38 |
% 51.74/18.38 | Simplifying 2160 yields:
% 51.74/18.38 | (2161) all_812_1_2784 = all_798_2_2763
% 51.74/18.38 |
% 51.74/18.38 | Combining equations (2155,2156) yields a new equation:
% 51.74/18.38 | (2162) all_770_1_2713 = 0
% 51.74/18.38 |
% 51.74/18.38 | Simplifying 2162 yields:
% 51.74/18.38 | (2163) all_770_1_2713 = 0
% 51.74/18.38 |
% 51.74/18.38 | Combining equations (2120,2161) yields a new equation:
% 51.74/18.38 | (2164) all_802_1_2768 = all_798_2_2763
% 51.74/18.38 |
% 51.74/18.38 | Simplifying 2164 yields:
% 51.74/18.38 | (2165) all_802_1_2768 = all_798_2_2763
% 51.74/18.38 |
% 51.74/18.38 | Combining equations (2141,2142) yields a new equation:
% 51.74/18.38 | (2166) all_770_2_2714 = 0
% 51.74/18.38 |
% 51.74/18.38 | Combining equations (2121,2154) yields a new equation:
% 51.74/18.38 | (2167) all_802_1_2768 = all_790_1_2741
% 51.74/18.38 |
% 51.74/18.38 | Simplifying 2167 yields:
% 51.74/18.38 | (2168) all_802_1_2768 = all_790_1_2741
% 51.74/18.38 |
% 51.74/18.38 | Combining equations (2151,2154) yields a new equation:
% 51.74/18.38 | (2169) all_790_1_2741 = all_778_1_2723
% 51.74/18.38 |
% 51.74/18.38 | Combining equations (2134,2135) yields a new equation:
% 51.74/18.38 | (2170) all_806_1_2774 = all_796_0_2758
% 51.74/18.38 |
% 51.74/18.38 | Simplifying 2170 yields:
% 51.74/18.38 | (2171) all_806_1_2774 = all_796_0_2758
% 51.74/18.38 |
% 51.74/18.38 | Combining equations (2138,2137) yields a new equation:
% 51.74/18.38 | (2172) all_794_1_2756 = 0
% 51.74/18.38 |
% 51.74/18.38 | Simplifying 2172 yields:
% 51.74/18.38 | (2173) all_794_1_2756 = 0
% 51.74/18.38 |
% 51.74/18.38 | Combining equations (2136,2171) yields a new equation:
% 51.74/18.38 | (2174) all_796_0_2758 = all_794_0_2755
% 51.74/18.38 |
% 51.74/18.38 | Combining equations (2139,2140) yields a new equation:
% 51.74/18.38 | (2175) all_796_1_2759 = 0
% 51.74/18.38 |
% 51.74/18.38 | Combining equations (2119,2122) yields a new equation:
% 51.74/18.38 | (2176) all_798_1_2762 = 0
% 51.74/18.38 |
% 51.74/18.38 | Combining equations (2168,2122) yields a new equation:
% 51.74/18.38 | (2177) all_798_1_2762 = all_790_1_2741
% 51.74/18.38 |
% 51.74/18.38 | Combining equations (2165,2122) yields a new equation:
% 51.74/18.38 | (2178) all_798_1_2762 = all_798_2_2763
% 51.74/18.38 |
% 51.74/18.38 | Combining equations (2176,2178) yields a new equation:
% 51.74/18.38 | (2179) all_798_2_2763 = 0
% 51.74/18.38 |
% 51.74/18.38 | Combining equations (2177,2178) yields a new equation:
% 51.74/18.38 | (2180) all_798_2_2763 = all_790_1_2741
% 51.74/18.38 |
% 51.74/18.38 | Combining equations (2180,2179) yields a new equation:
% 51.74/18.38 | (2181) all_790_1_2741 = 0
% 51.74/18.38 |
% 51.74/18.38 | Simplifying 2181 yields:
% 51.74/18.38 | (2182) all_790_1_2741 = 0
% 51.74/18.38 |
% 51.74/18.38 | Combining equations (2182,2169) yields a new equation:
% 51.74/18.38 | (2183) all_778_1_2723 = 0
% 51.74/18.38 |
% 51.74/18.38 | Combining equations (2183,2169) yields a new equation:
% 51.74/18.38 | (2182) all_790_1_2741 = 0
% 51.74/18.38 |
% 51.74/18.38 | Combining equations (2175,2140) yields a new equation:
% 51.74/18.38 | (2139) all_806_2_2775 = 0
% 51.74/18.38 |
% 51.74/18.38 | Combining equations (2174,2171) yields a new equation:
% 51.74/18.38 | (2136) all_806_1_2774 = all_794_0_2755
% 51.74/18.38 |
% 51.74/18.38 | Combining equations (2166,2142) yields a new equation:
% 51.74/18.38 | (2141) all_812_2_2785 = 0
% 51.74/18.38 |
% 51.74/18.38 | Combining equations (2179,2161) yields a new equation:
% 51.74/18.38 | (2188) all_812_1_2784 = 0
% 51.74/18.38 |
% 51.74/18.38 | Combining equations (2159,2157) yields a new equation:
% 51.74/18.38 | (2158) all_842_0_2845 = all_796_2_2760
% 51.74/18.38 |
% 51.74/18.38 | Combining equations (2158,2131) yields a new equation:
% 51.74/18.38 | (2133) all_846_3_2852 = all_796_2_2760
% 51.74/18.38 |
% 51.74/18.38 | Combining equations (2156,2127) yields a new equation:
% 51.74/18.38 | (2126) all_846_2_2851 = 0
% 51.74/18.38 |
% 51.74/18.38 | Combining equations (2182,2124) yields a new equation:
% 51.74/18.38 | (2192) all_846_1_2850 = 0
% 51.74/18.38 |
% 51.74/18.38 | Combining equations (2152,2145) yields a new equation:
% 51.74/18.38 | (2144) all_846_0_2849 = all_375_4_794
% 51.74/18.38 |
% 51.74/18.38 | From (2146) and (2020) follows:
% 51.74/18.38 | (2194) intruder_holds(all_285_1_617) = all_772_1_2716
% 51.74/18.38 |
% 51.74/18.38 | From (2115) and (2085) follows:
% 51.74/18.38 | (2080) intruder_holds(all_285_1_617) = all_812_0_2783
% 51.74/18.38 |
% 51.74/18.38 | From (2183) and (2027) follows:
% 51.74/18.38 | (10) party_of_protocol(b) = 0
% 51.74/18.38 |
% 51.74/18.38 | From (2163) and (2016) follows:
% 51.74/18.38 | (43) party_of_protocol(a) = 0
% 51.74/18.38 |
% 51.74/18.38 | From (2149) and (2032) follows:
% 51.74/18.38 | (34) party_of_protocol(t) = 0
% 51.74/18.38 |
% 51.74/18.38 | From (2174) and (2048) follows:
% 51.74/18.38 | (2043) intruder_message(all_285_7_623) = all_794_0_2755
% 51.74/18.38 |
% 51.74/18.38 | From (2173) and (2044) follows:
% 51.74/18.38 | (1197) intruder_message(all_63_4_187) = 0
% 51.74/18.38 |
% 51.74/18.38 | From (2147) and (2086) follows:
% 51.74/18.38 | (2201) b_holds(all_375_1_791) = all_814_0_2786
% 51.74/18.38 |
% 51.74/18.38 | From (2143) and (2021) follows:
% 51.74/18.38 | (918) b_holds(all_375_1_791) = all_375_0_790
% 51.74/18.38 |
% 51.74/18.38 | From (2146) and (2022) follows:
% 51.74/18.38 | (716) key(an_a_nonce, b) = all_285_1_617
% 51.74/18.38 |
% 51.74/18.38 +-Applying beta-rule and splitting (2083), into two cases.
% 51.74/18.38 |-Branch one:
% 51.74/18.38 | (2204) ~ (all_812_1_2784 = 0)
% 51.74/18.38 |
% 51.74/18.38 | Equations (2188) can reduce 2204 to:
% 51.74/18.38 | (551) $false
% 51.74/18.38 |
% 51.74/18.38 |-The branch is then unsatisfiable
% 51.74/18.38 |-Branch two:
% 51.74/18.38 | (2188) all_812_1_2784 = 0
% 51.74/18.38 | (2207) ~ (all_812_2_2785 = 0) | all_812_0_2783 = 0
% 51.74/18.38 |
% 51.74/18.38 +-Applying beta-rule and splitting (2207), into two cases.
% 51.74/18.38 |-Branch one:
% 51.74/18.38 | (2208) ~ (all_812_2_2785 = 0)
% 51.74/18.38 |
% 51.74/18.38 | Equations (2141) can reduce 2208 to:
% 51.74/18.38 | (551) $false
% 51.74/18.38 |
% 51.74/18.38 |-The branch is then unsatisfiable
% 51.74/18.38 |-Branch two:
% 51.74/18.38 | (2141) all_812_2_2785 = 0
% 51.74/18.38 | (2211) all_812_0_2783 = 0
% 51.74/18.38 |
% 51.74/18.38 | Combining equations (2211,2115) yields a new equation:
% 51.74/18.38 | (2212) all_814_2_2788 = 0
% 51.74/18.38 |
% 51.74/18.38 | From (2211) and (2080) follows:
% 51.74/18.38 | (1467) intruder_holds(all_285_1_617) = 0
% 51.74/18.38 |
% 51.74/18.38 +-Applying beta-rule and splitting (2088), into two cases.
% 51.74/18.38 |-Branch one:
% 51.74/18.38 | (2214) ~ (all_814_0_2786 = 0)
% 51.74/18.38 |
% 51.74/18.38 | Instantiating formula (37) with all_285_1_617, 0, all_772_1_2716 and discharging atoms intruder_holds(all_285_1_617) = all_772_1_2716, intruder_holds(all_285_1_617) = 0, yields:
% 51.74/18.38 | (2215) all_772_1_2716 = 0
% 51.74/18.38 |
% 51.74/18.38 | Instantiating formula (26) with all_375_1_791, all_814_0_2786, all_375_0_790 and discharging atoms b_holds(all_375_1_791) = all_814_0_2786, b_holds(all_375_1_791) = all_375_0_790, yields:
% 51.74/18.39 | (2216) all_814_0_2786 = all_375_0_790
% 51.74/18.39 |
% 51.74/18.39 | Equations (2216) can reduce 2214 to:
% 51.74/18.39 | (1471) ~ (all_375_0_790 = 0)
% 51.74/18.39 |
% 51.74/18.39 | From (2215) and (2194) follows:
% 51.74/18.39 | (1467) intruder_holds(all_285_1_617) = 0
% 51.74/18.39 |
% 51.74/18.39 +-Applying beta-rule and splitting (916), into two cases.
% 51.74/18.39 |-Branch one:
% 51.74/18.39 | (1473) ~ (all_375_2_792 = 0)
% 51.74/18.39 |
% 51.74/18.39 | Equations (1198) can reduce 1473 to:
% 51.74/18.39 | (551) $false
% 51.74/18.39 |
% 51.74/18.39 |-The branch is then unsatisfiable
% 51.74/18.39 |-Branch two:
% 51.74/18.39 | (1198) all_375_2_792 = 0
% 51.74/18.39 | (1476) ~ (all_375_4_794 = 0) | all_375_0_790 = 0
% 51.74/18.39 |
% 51.74/18.39 +-Applying beta-rule and splitting (1476), into two cases.
% 51.74/18.39 |-Branch one:
% 51.74/18.39 | (1477) ~ (all_375_4_794 = 0)
% 51.74/18.39 |
% 51.74/18.39 +-Applying beta-rule and splitting (2104), into two cases.
% 51.74/18.39 |-Branch one:
% 51.74/18.39 | (2224) ~ (all_846_1_2850 = 0)
% 51.74/18.39 |
% 51.74/18.39 | Equations (2192) can reduce 2224 to:
% 51.74/18.39 | (551) $false
% 51.74/18.39 |
% 51.74/18.39 |-The branch is then unsatisfiable
% 51.74/18.39 |-Branch two:
% 51.74/18.39 | (2192) all_846_1_2850 = 0
% 51.74/18.39 | (2227) ~ (all_846_2_2851 = 0) | ~ (all_846_3_2852 = 0) | all_846_0_2849 = 0
% 51.74/18.39 |
% 51.74/18.39 +-Applying beta-rule and splitting (2227), into two cases.
% 51.74/18.39 |-Branch one:
% 51.74/18.39 | (2228) ~ (all_846_2_2851 = 0)
% 51.74/18.39 |
% 51.74/18.39 | Equations (2126) can reduce 2228 to:
% 51.74/18.39 | (551) $false
% 51.74/18.39 |
% 51.74/18.39 |-The branch is then unsatisfiable
% 51.74/18.39 |-Branch two:
% 51.74/18.39 | (2126) all_846_2_2851 = 0
% 51.74/18.39 | (2231) ~ (all_846_3_2852 = 0) | all_846_0_2849 = 0
% 51.74/18.39 |
% 51.74/18.39 +-Applying beta-rule and splitting (2231), into two cases.
% 51.74/18.39 |-Branch one:
% 51.74/18.39 | (2232) ~ (all_846_3_2852 = 0)
% 51.74/18.39 |
% 51.74/18.39 | Equations (2133) can reduce 2232 to:
% 51.74/18.39 | (2233) ~ (all_796_2_2760 = 0)
% 51.74/18.39 |
% 51.74/18.39 +-Applying beta-rule and splitting (2067), into two cases.
% 51.74/18.39 |-Branch one:
% 51.74/18.39 | (2234) ~ (all_806_1_2774 = 0)
% 51.74/18.39 |
% 51.74/18.39 | Equations (2136) can reduce 2234 to:
% 51.74/18.39 | (2235) ~ (all_794_0_2755 = 0)
% 51.74/18.39 |
% 51.74/18.39 | Instantiating formula (63) with all_285_1_617, b, an_a_nonce, all_63_4_187 and discharging atoms intruder_holds(all_285_1_617) = 0, intruder_message(all_63_4_187) = 0, key(an_a_nonce, b) = all_285_1_617, yields:
% 51.74/18.39 | (2236) ? [v0] : ? [v1] : ? [v2] : (party_of_protocol(b) = v0 & intruder_message(v1) = v2 & encrypt(all_63_4_187, an_a_nonce) = v1 & ( ~ (v0 = 0) | v2 = 0))
% 51.74/18.39 |
% 51.74/18.39 | Instantiating formula (63) with all_285_1_617, b, an_a_nonce, all_61_7_179 and discharging atoms intruder_holds(all_285_1_617) = 0, intruder_message(all_61_7_179) = 0, key(an_a_nonce, b) = all_285_1_617, yields:
% 51.74/18.39 | (1511) ? [v0] : ? [v1] : ? [v2] : (party_of_protocol(b) = v0 & intruder_message(v1) = v2 & encrypt(all_61_7_179, an_a_nonce) = v1 & ( ~ (v0 = 0) | v2 = 0))
% 51.74/18.39 |
% 51.74/18.39 | Instantiating formula (63) with all_285_1_617, b, an_a_nonce, all_0_3_3 and discharging atoms intruder_holds(all_285_1_617) = 0, intruder_message(all_0_3_3) = 0, key(an_a_nonce, b) = all_285_1_617, yields:
% 51.74/18.39 | (2238) ? [v0] : ? [v1] : ? [v2] : (party_of_protocol(b) = v0 & intruder_message(v1) = v2 & encrypt(all_0_3_3, an_a_nonce) = v1 & ( ~ (v0 = 0) | v2 = 0))
% 51.74/18.39 |
% 51.74/18.39 | Instantiating formula (45) with all_794_0_2755, all_285_7_623, all_285_1_617, b, an_a_nonce, all_61_7_179 and discharging atoms intruder_holds(all_285_1_617) = 0, intruder_message(all_285_7_623) = all_794_0_2755, encrypt(all_61_7_179, an_a_nonce) = all_285_7_623, key(an_a_nonce, b) = all_285_1_617, yields:
% 51.74/18.39 | (2239) all_794_0_2755 = 0 | ? [v0] : ? [v1] : (party_of_protocol(b) = v1 & intruder_message(all_61_7_179) = v0 & ( ~ (v1 = 0) | ~ (v0 = 0)))
% 51.74/18.39 |
% 51.74/18.39 | Instantiating formula (7) with all_794_0_2755, all_285_7_623, b, an_a_nonce, all_61_7_179 and discharging atoms party_of_protocol(b) = 0, intruder_message(all_285_7_623) = all_794_0_2755, encrypt(all_61_7_179, an_a_nonce) = all_285_7_623, yields:
% 51.74/18.39 | (2240) all_794_0_2755 = 0 | ? [v0] : ? [v1] : ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_61_7_179) = v0 & key(an_a_nonce, b) = v1 & ( ~ (v2 = 0) | ~ (v0 = 0)))
% 51.74/18.39 |
% 51.74/18.39 | Instantiating formula (7) with all_794_0_2755, all_285_7_623, a, an_a_nonce, all_61_7_179 and discharging atoms party_of_protocol(a) = 0, intruder_message(all_285_7_623) = all_794_0_2755, encrypt(all_61_7_179, an_a_nonce) = all_285_7_623, yields:
% 51.74/18.39 | (2241) all_794_0_2755 = 0 | ? [v0] : ? [v1] : ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_61_7_179) = v0 & key(an_a_nonce, a) = v1 & ( ~ (v2 = 0) | ~ (v0 = 0)))
% 51.74/18.39 |
% 51.74/18.39 | Instantiating formula (7) with all_794_0_2755, all_285_7_623, t, an_a_nonce, all_61_7_179 and discharging atoms party_of_protocol(t) = 0, intruder_message(all_285_7_623) = all_794_0_2755, encrypt(all_61_7_179, an_a_nonce) = all_285_7_623, yields:
% 51.74/18.39 | (2242) all_794_0_2755 = 0 | ? [v0] : ? [v1] : ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_61_7_179) = v0 & key(an_a_nonce, t) = v1 & ( ~ (v2 = 0) | ~ (v0 = 0)))
% 51.74/18.39 |
% 51.74/18.39 | Instantiating formula (73) with all_766_2_2699, t, b, all_766_3_2700 and discharging atoms sent(b, t, all_766_3_2700) = all_766_2_2699, yields:
% 51.74/18.39 | (2243) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (party_of_protocol(b) = v1 & party_of_protocol(t) = v2 & intruder_message(all_766_3_2700) = v0 & message(all_766_2_2699) = v3 & ( ~ (v2 = 0) | ~ (v1 = 0) | ~ (v0 = 0) | v3 = 0))
% 51.74/18.39 |
% 51.74/18.39 | Instantiating (2243) with all_1390_0_3442, all_1390_1_3443, all_1390_2_3444, all_1390_3_3445 yields:
% 51.74/18.39 | (2244) party_of_protocol(b) = all_1390_2_3444 & party_of_protocol(t) = all_1390_1_3443 & intruder_message(all_766_3_2700) = all_1390_3_3445 & message(all_766_2_2699) = all_1390_0_3442 & ( ~ (all_1390_1_3443 = 0) | ~ (all_1390_2_3444 = 0) | ~ (all_1390_3_3445 = 0) | all_1390_0_3442 = 0)
% 51.74/18.39 |
% 51.74/18.39 | Applying alpha-rule on (2244) yields:
% 51.74/18.39 | (2245) party_of_protocol(t) = all_1390_1_3443
% 51.74/18.39 | (2246) party_of_protocol(b) = all_1390_2_3444
% 51.74/18.39 | (2247) intruder_message(all_766_3_2700) = all_1390_3_3445
% 51.74/18.39 | (2248) ~ (all_1390_1_3443 = 0) | ~ (all_1390_2_3444 = 0) | ~ (all_1390_3_3445 = 0) | all_1390_0_3442 = 0
% 51.74/18.39 | (2249) message(all_766_2_2699) = all_1390_0_3442
% 51.74/18.39 |
% 51.74/18.39 | Instantiating (2238) with all_1396_0_3452, all_1396_1_3453, all_1396_2_3454 yields:
% 51.74/18.39 | (2250) party_of_protocol(b) = all_1396_2_3454 & intruder_message(all_1396_1_3453) = all_1396_0_3452 & encrypt(all_0_3_3, an_a_nonce) = all_1396_1_3453 & ( ~ (all_1396_2_3454 = 0) | all_1396_0_3452 = 0)
% 51.74/18.39 |
% 51.74/18.39 | Applying alpha-rule on (2250) yields:
% 51.74/18.39 | (2251) party_of_protocol(b) = all_1396_2_3454
% 51.74/18.39 | (2252) intruder_message(all_1396_1_3453) = all_1396_0_3452
% 51.74/18.39 | (2253) encrypt(all_0_3_3, an_a_nonce) = all_1396_1_3453
% 51.74/18.39 | (2254) ~ (all_1396_2_3454 = 0) | all_1396_0_3452 = 0
% 51.74/18.39 |
% 51.74/18.39 | Instantiating (1511) with all_1454_0_3625, all_1454_1_3626, all_1454_2_3627 yields:
% 51.74/18.39 | (2255) party_of_protocol(b) = all_1454_2_3627 & intruder_message(all_1454_1_3626) = all_1454_0_3625 & encrypt(all_61_7_179, an_a_nonce) = all_1454_1_3626 & ( ~ (all_1454_2_3627 = 0) | all_1454_0_3625 = 0)
% 51.74/18.39 |
% 51.74/18.39 | Applying alpha-rule on (2255) yields:
% 51.74/18.39 | (2256) party_of_protocol(b) = all_1454_2_3627
% 51.74/18.39 | (2257) intruder_message(all_1454_1_3626) = all_1454_0_3625
% 51.74/18.39 | (2258) encrypt(all_61_7_179, an_a_nonce) = all_1454_1_3626
% 51.74/18.39 | (2259) ~ (all_1454_2_3627 = 0) | all_1454_0_3625 = 0
% 51.74/18.39 |
% 51.74/18.39 | Instantiating (2236) with all_1458_0_3631, all_1458_1_3632, all_1458_2_3633 yields:
% 51.74/18.39 | (2260) party_of_protocol(b) = all_1458_2_3633 & intruder_message(all_1458_1_3632) = all_1458_0_3631 & encrypt(all_63_4_187, an_a_nonce) = all_1458_1_3632 & ( ~ (all_1458_2_3633 = 0) | all_1458_0_3631 = 0)
% 51.74/18.39 |
% 51.74/18.39 | Applying alpha-rule on (2260) yields:
% 51.74/18.39 | (2261) party_of_protocol(b) = all_1458_2_3633
% 51.74/18.39 | (2262) intruder_message(all_1458_1_3632) = all_1458_0_3631
% 51.74/18.39 | (2263) encrypt(all_63_4_187, an_a_nonce) = all_1458_1_3632
% 51.74/18.39 | (2264) ~ (all_1458_2_3633 = 0) | all_1458_0_3631 = 0
% 51.74/18.39 |
% 51.74/18.39 +-Applying beta-rule and splitting (2239), into two cases.
% 51.74/18.39 |-Branch one:
% 51.74/18.39 | (2265) all_794_0_2755 = 0
% 51.74/18.39 |
% 51.74/18.39 | Equations (2265) can reduce 2235 to:
% 51.74/18.39 | (551) $false
% 51.74/18.39 |
% 51.74/18.39 |-The branch is then unsatisfiable
% 51.74/18.39 |-Branch two:
% 51.74/18.39 | (2235) ~ (all_794_0_2755 = 0)
% 51.74/18.39 | (1707) ? [v0] : ? [v1] : (party_of_protocol(b) = v1 & intruder_message(all_61_7_179) = v0 & ( ~ (v1 = 0) | ~ (v0 = 0)))
% 51.74/18.39 |
% 51.74/18.39 | Instantiating (1707) with all_1502_0_3702, all_1502_1_3703 yields:
% 51.74/18.39 | (2269) party_of_protocol(b) = all_1502_0_3702 & intruder_message(all_61_7_179) = all_1502_1_3703 & ( ~ (all_1502_0_3702 = 0) | ~ (all_1502_1_3703 = 0))
% 51.74/18.39 |
% 51.74/18.39 | Applying alpha-rule on (2269) yields:
% 51.74/18.39 | (2270) party_of_protocol(b) = all_1502_0_3702
% 51.74/18.39 | (2271) intruder_message(all_61_7_179) = all_1502_1_3703
% 51.74/18.39 | (2272) ~ (all_1502_0_3702 = 0) | ~ (all_1502_1_3703 = 0)
% 51.74/18.39 |
% 51.74/18.39 +-Applying beta-rule and splitting (2241), into two cases.
% 51.74/18.39 |-Branch one:
% 51.74/18.39 | (2265) all_794_0_2755 = 0
% 51.74/18.39 |
% 51.74/18.40 | Equations (2265) can reduce 2235 to:
% 51.74/18.40 | (551) $false
% 51.74/18.40 |
% 51.74/18.40 |-The branch is then unsatisfiable
% 51.74/18.40 |-Branch two:
% 51.74/18.40 | (2235) ~ (all_794_0_2755 = 0)
% 51.74/18.40 | (1631) ? [v0] : ? [v1] : ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_61_7_179) = v0 & key(an_a_nonce, a) = v1 & ( ~ (v2 = 0) | ~ (v0 = 0)))
% 51.74/18.40 |
% 51.74/18.40 | Instantiating (1631) with all_1508_0_3704, all_1508_1_3705, all_1508_2_3706 yields:
% 51.74/18.40 | (2277) intruder_holds(all_1508_1_3705) = all_1508_0_3704 & intruder_message(all_61_7_179) = all_1508_2_3706 & key(an_a_nonce, a) = all_1508_1_3705 & ( ~ (all_1508_0_3704 = 0) | ~ (all_1508_2_3706 = 0))
% 51.74/18.40 |
% 51.74/18.40 | Applying alpha-rule on (2277) yields:
% 51.74/18.40 | (2278) intruder_holds(all_1508_1_3705) = all_1508_0_3704
% 51.74/18.40 | (2279) intruder_message(all_61_7_179) = all_1508_2_3706
% 51.74/18.40 | (2280) key(an_a_nonce, a) = all_1508_1_3705
% 51.74/18.40 | (2281) ~ (all_1508_0_3704 = 0) | ~ (all_1508_2_3706 = 0)
% 51.74/18.40 |
% 51.74/18.40 +-Applying beta-rule and splitting (2240), into two cases.
% 51.74/18.40 |-Branch one:
% 51.74/18.40 | (2265) all_794_0_2755 = 0
% 51.74/18.40 |
% 51.74/18.40 | Equations (2265) can reduce 2235 to:
% 51.74/18.40 | (551) $false
% 51.74/18.40 |
% 51.74/18.40 |-The branch is then unsatisfiable
% 51.74/18.40 |-Branch two:
% 51.74/18.40 | (2235) ~ (all_794_0_2755 = 0)
% 51.74/18.40 | (1639) ? [v0] : ? [v1] : ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_61_7_179) = v0 & key(an_a_nonce, b) = v1 & ( ~ (v2 = 0) | ~ (v0 = 0)))
% 51.74/18.40 |
% 51.74/18.40 | Instantiating (1639) with all_1514_0_3707, all_1514_1_3708, all_1514_2_3709 yields:
% 51.74/18.40 | (2286) intruder_holds(all_1514_1_3708) = all_1514_0_3707 & intruder_message(all_61_7_179) = all_1514_2_3709 & key(an_a_nonce, b) = all_1514_1_3708 & ( ~ (all_1514_0_3707 = 0) | ~ (all_1514_2_3709 = 0))
% 51.74/18.40 |
% 51.74/18.40 | Applying alpha-rule on (2286) yields:
% 51.74/18.40 | (2287) intruder_holds(all_1514_1_3708) = all_1514_0_3707
% 51.74/18.40 | (2288) intruder_message(all_61_7_179) = all_1514_2_3709
% 51.74/18.40 | (2289) key(an_a_nonce, b) = all_1514_1_3708
% 51.74/18.40 | (2290) ~ (all_1514_0_3707 = 0) | ~ (all_1514_2_3709 = 0)
% 51.74/18.40 |
% 51.74/18.40 +-Applying beta-rule and splitting (2242), into two cases.
% 51.74/18.40 |-Branch one:
% 51.74/18.40 | (2265) all_794_0_2755 = 0
% 51.74/18.40 |
% 51.74/18.40 | Equations (2265) can reduce 2235 to:
% 51.74/18.40 | (551) $false
% 51.74/18.40 |
% 51.74/18.40 |-The branch is then unsatisfiable
% 51.74/18.40 |-Branch two:
% 51.74/18.40 | (2235) ~ (all_794_0_2755 = 0)
% 51.74/18.40 | (1635) ? [v0] : ? [v1] : ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_61_7_179) = v0 & key(an_a_nonce, t) = v1 & ( ~ (v2 = 0) | ~ (v0 = 0)))
% 51.74/18.40 |
% 51.74/18.40 | Instantiating (1635) with all_1520_0_3710, all_1520_1_3711, all_1520_2_3712 yields:
% 51.74/18.40 | (2295) intruder_holds(all_1520_1_3711) = all_1520_0_3710 & intruder_message(all_61_7_179) = all_1520_2_3712 & key(an_a_nonce, t) = all_1520_1_3711 & ( ~ (all_1520_0_3710 = 0) | ~ (all_1520_2_3712 = 0))
% 51.74/18.40 |
% 51.74/18.40 | Applying alpha-rule on (2295) yields:
% 51.74/18.40 | (2296) intruder_holds(all_1520_1_3711) = all_1520_0_3710
% 51.74/18.40 | (2297) intruder_message(all_61_7_179) = all_1520_2_3712
% 51.74/18.40 | (2298) key(an_a_nonce, t) = all_1520_1_3711
% 51.74/18.40 | (2299) ~ (all_1520_0_3710 = 0) | ~ (all_1520_2_3712 = 0)
% 51.74/18.40 |
% 51.74/18.40 | Instantiating formula (66) with b, all_1458_2_3633, all_1502_0_3702 and discharging atoms party_of_protocol(b) = all_1502_0_3702, party_of_protocol(b) = all_1458_2_3633, yields:
% 51.74/18.40 | (2300) all_1502_0_3702 = all_1458_2_3633
% 51.74/18.40 |
% 51.74/18.40 | Instantiating formula (66) with b, all_1454_2_3627, all_1458_2_3633 and discharging atoms party_of_protocol(b) = all_1458_2_3633, party_of_protocol(b) = all_1454_2_3627, yields:
% 51.74/18.40 | (2301) all_1458_2_3633 = all_1454_2_3627
% 51.74/18.40 |
% 51.74/18.40 | Instantiating formula (66) with b, all_1396_2_3454, 0 and discharging atoms party_of_protocol(b) = all_1396_2_3454, party_of_protocol(b) = 0, yields:
% 51.74/18.40 | (2302) all_1396_2_3454 = 0
% 51.74/18.40 |
% 51.74/18.40 | Instantiating formula (66) with b, all_1396_2_3454, all_1458_2_3633 and discharging atoms party_of_protocol(b) = all_1458_2_3633, party_of_protocol(b) = all_1396_2_3454, yields:
% 51.74/18.40 | (2303) all_1458_2_3633 = all_1396_2_3454
% 51.74/18.40 |
% 51.74/18.40 | Instantiating formula (66) with b, all_1390_2_3444, all_1502_0_3702 and discharging atoms party_of_protocol(b) = all_1502_0_3702, party_of_protocol(b) = all_1390_2_3444, yields:
% 51.74/18.40 | (2304) all_1502_0_3702 = all_1390_2_3444
% 51.74/18.40 |
% 51.74/18.40 | Instantiating formula (31) with all_61_7_179, all_1514_2_3709, 0 and discharging atoms intruder_message(all_61_7_179) = all_1514_2_3709, intruder_message(all_61_7_179) = 0, yields:
% 51.74/18.40 | (2305) all_1514_2_3709 = 0
% 51.74/18.40 |
% 51.74/18.40 | Instantiating formula (31) with all_61_7_179, all_1508_2_3706, all_1520_2_3712 and discharging atoms intruder_message(all_61_7_179) = all_1520_2_3712, intruder_message(all_61_7_179) = all_1508_2_3706, yields:
% 51.74/18.40 | (2306) all_1520_2_3712 = all_1508_2_3706
% 51.74/18.40 |
% 51.74/18.40 | Instantiating formula (31) with all_61_7_179, all_1508_2_3706, all_1514_2_3709 and discharging atoms intruder_message(all_61_7_179) = all_1514_2_3709, intruder_message(all_61_7_179) = all_1508_2_3706, yields:
% 51.74/18.40 | (2307) all_1514_2_3709 = all_1508_2_3706
% 51.74/18.40 |
% 51.74/18.40 | Instantiating formula (31) with all_61_7_179, all_1502_1_3703, all_1520_2_3712 and discharging atoms intruder_message(all_61_7_179) = all_1520_2_3712, intruder_message(all_61_7_179) = all_1502_1_3703, yields:
% 51.74/18.40 | (2308) all_1520_2_3712 = all_1502_1_3703
% 51.74/18.40 |
% 51.74/18.40 | Combining equations (2306,2308) yields a new equation:
% 51.74/18.40 | (2309) all_1508_2_3706 = all_1502_1_3703
% 51.74/18.40 |
% 51.74/18.40 | Simplifying 2309 yields:
% 51.74/18.40 | (2310) all_1508_2_3706 = all_1502_1_3703
% 51.74/18.40 |
% 51.84/18.40 | Combining equations (2307,2305) yields a new equation:
% 51.84/18.40 | (2311) all_1508_2_3706 = 0
% 51.84/18.40 |
% 51.84/18.40 | Simplifying 2311 yields:
% 51.84/18.40 | (2312) all_1508_2_3706 = 0
% 51.84/18.40 |
% 51.84/18.40 | Combining equations (2312,2310) yields a new equation:
% 51.84/18.40 | (2313) all_1502_1_3703 = 0
% 51.84/18.40 |
% 51.84/18.40 | Combining equations (2300,2304) yields a new equation:
% 51.84/18.40 | (2314) all_1458_2_3633 = all_1390_2_3444
% 51.84/18.40 |
% 51.84/18.40 | Simplifying 2314 yields:
% 51.84/18.40 | (2315) all_1458_2_3633 = all_1390_2_3444
% 51.84/18.40 |
% 51.84/18.40 | Combining equations (2303,2301) yields a new equation:
% 51.84/18.40 | (2316) all_1454_2_3627 = all_1396_2_3454
% 51.84/18.40 |
% 51.84/18.40 | Combining equations (2315,2301) yields a new equation:
% 51.84/18.40 | (2317) all_1454_2_3627 = all_1390_2_3444
% 51.84/18.40 |
% 51.84/18.40 | Combining equations (2316,2317) yields a new equation:
% 51.84/18.40 | (2318) all_1396_2_3454 = all_1390_2_3444
% 51.84/18.40 |
% 51.84/18.40 | Simplifying 2318 yields:
% 51.84/18.40 | (2319) all_1396_2_3454 = all_1390_2_3444
% 51.84/18.40 |
% 51.84/18.40 | Combining equations (2302,2319) yields a new equation:
% 51.84/18.40 | (2320) all_1390_2_3444 = 0
% 51.84/18.40 |
% 51.84/18.40 | Combining equations (2320,2304) yields a new equation:
% 51.84/18.40 | (2321) all_1502_0_3702 = 0
% 51.84/18.40 |
% 51.84/18.40 +-Applying beta-rule and splitting (2272), into two cases.
% 51.84/18.40 |-Branch one:
% 51.84/18.40 | (2322) ~ (all_1502_0_3702 = 0)
% 51.84/18.40 |
% 51.84/18.40 | Equations (2321) can reduce 2322 to:
% 51.84/18.40 | (551) $false
% 51.84/18.40 |
% 51.84/18.40 |-The branch is then unsatisfiable
% 51.84/18.40 |-Branch two:
% 51.84/18.40 | (2321) all_1502_0_3702 = 0
% 51.84/18.40 | (2325) ~ (all_1502_1_3703 = 0)
% 51.84/18.40 |
% 51.84/18.40 | Equations (2313) can reduce 2325 to:
% 51.84/18.40 | (551) $false
% 51.84/18.40 |
% 51.84/18.40 |-The branch is then unsatisfiable
% 51.84/18.40 |-Branch two:
% 51.84/18.40 | (2327) all_806_1_2774 = 0
% 51.84/18.40 | (2328) ~ (all_806_2_2775 = 0) | all_806_0_2773 = 0
% 51.84/18.40 |
% 51.84/18.40 +-Applying beta-rule and splitting (2328), into two cases.
% 51.84/18.40 |-Branch one:
% 51.84/18.40 | (2329) ~ (all_806_2_2775 = 0)
% 51.84/18.40 |
% 51.84/18.40 | Equations (2139) can reduce 2329 to:
% 51.84/18.40 | (551) $false
% 51.84/18.40 |
% 51.84/18.40 |-The branch is then unsatisfiable
% 51.84/18.40 |-Branch two:
% 51.84/18.40 | (2139) all_806_2_2775 = 0
% 51.84/18.40 | (2332) all_806_0_2773 = 0
% 51.84/18.40 |
% 51.84/18.40 | Combining equations (2159,2332) yields a new equation:
% 51.84/18.40 | (2333) all_796_2_2760 = 0
% 51.84/18.40 |
% 51.84/18.40 | Simplifying 2333 yields:
% 51.84/18.40 | (2334) all_796_2_2760 = 0
% 51.84/18.40 |
% 51.84/18.40 | Equations (2334) can reduce 2233 to:
% 51.84/18.40 | (551) $false
% 51.84/18.40 |
% 51.84/18.40 |-The branch is then unsatisfiable
% 51.84/18.40 |-Branch two:
% 51.84/18.40 | (2336) all_846_3_2852 = 0
% 51.84/18.40 | (2337) all_846_0_2849 = 0
% 51.84/18.40 |
% 51.84/18.40 | Combining equations (2337,2144) yields a new equation:
% 51.84/18.40 | (1948) all_375_4_794 = 0
% 51.84/18.40 |
% 51.84/18.41 | Equations (1948) can reduce 1477 to:
% 51.84/18.41 | (551) $false
% 51.84/18.41 |
% 51.84/18.41 |-The branch is then unsatisfiable
% 51.84/18.41 |-Branch two:
% 51.84/18.41 | (1948) all_375_4_794 = 0
% 51.84/18.41 | (1951) all_375_0_790 = 0
% 51.84/18.41 |
% 51.84/18.41 | Equations (1951) can reduce 1471 to:
% 51.84/18.41 | (551) $false
% 51.84/18.41 |
% 51.84/18.41 |-The branch is then unsatisfiable
% 51.84/18.41 |-Branch two:
% 51.84/18.41 | (2343) all_814_0_2786 = 0
% 51.84/18.41 | (2344) ~ (all_814_2_2788 = 0)
% 51.84/18.41 |
% 51.84/18.41 | Equations (2212) can reduce 2344 to:
% 51.84/18.41 | (551) $false
% 51.84/18.41 |
% 51.84/18.41 |-The branch is then unsatisfiable
% 51.84/18.41 |-Branch two:
% 51.84/18.41 | (2346) ~ (all_19_4_93 = 0)
% 51.84/18.41 | (2347) ? [v0] : ? [v1] : ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_19_8_97) = v0 & key(all_19_7_96, a) = v1 & ( ~ (v2 = 0) | ~ (v0 = 0)))
% 51.84/18.41 |
% 51.84/18.41 | Instantiating (2347) with all_493_0_3715, all_493_1_3716, all_493_2_3717 yields:
% 51.84/18.41 | (2348) intruder_holds(all_493_1_3716) = all_493_0_3715 & intruder_message(all_19_8_97) = all_493_2_3717 & key(all_19_7_96, a) = all_493_1_3716 & ( ~ (all_493_0_3715 = 0) | ~ (all_493_2_3717 = 0))
% 51.84/18.41 |
% 51.84/18.41 | Applying alpha-rule on (2348) yields:
% 51.84/18.41 | (2349) intruder_holds(all_493_1_3716) = all_493_0_3715
% 51.84/18.41 | (2350) intruder_message(all_19_8_97) = all_493_2_3717
% 51.84/18.41 | (2351) key(all_19_7_96, a) = all_493_1_3716
% 51.84/18.41 | (2352) ~ (all_493_0_3715 = 0) | ~ (all_493_2_3717 = 0)
% 51.84/18.41 |
% 51.84/18.41 +-Applying beta-rule and splitting (166), into two cases.
% 51.84/18.41 |-Branch one:
% 51.84/18.41 | (1202) all_19_4_93 = 0
% 51.84/18.41 |
% 51.84/18.41 | Equations (1202) can reduce 2346 to:
% 51.84/18.41 | (551) $false
% 51.84/18.41 |
% 51.84/18.41 |-The branch is then unsatisfiable
% 51.84/18.41 |-Branch two:
% 51.84/18.41 | (2346) ~ (all_19_4_93 = 0)
% 51.84/18.41 | (2356) ? [v0] : ? [v1] : ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_19_8_97) = v0 & key(all_19_7_96, t) = v1 & ( ~ (v2 = 0) | ~ (v0 = 0)))
% 51.84/18.41 |
% 51.84/18.41 | Instantiating (2356) with all_499_0_3718, all_499_1_3719, all_499_2_3720 yields:
% 51.84/18.41 | (2357) intruder_holds(all_499_1_3719) = all_499_0_3718 & intruder_message(all_19_8_97) = all_499_2_3720 & key(all_19_7_96, t) = all_499_1_3719 & ( ~ (all_499_0_3718 = 0) | ~ (all_499_2_3720 = 0))
% 51.84/18.41 |
% 51.84/18.41 | Applying alpha-rule on (2357) yields:
% 51.84/18.41 | (2358) intruder_holds(all_499_1_3719) = all_499_0_3718
% 51.84/18.41 | (2359) intruder_message(all_19_8_97) = all_499_2_3720
% 51.84/18.41 | (2360) key(all_19_7_96, t) = all_499_1_3719
% 51.84/18.41 | (2361) ~ (all_499_0_3718 = 0) | ~ (all_499_2_3720 = 0)
% 51.84/18.41 |
% 51.84/18.41 +-Applying beta-rule and splitting (164), into two cases.
% 51.84/18.41 |-Branch one:
% 51.84/18.41 | (1202) all_19_4_93 = 0
% 51.84/18.41 |
% 51.84/18.41 | Equations (1202) can reduce 2346 to:
% 51.84/18.41 | (551) $false
% 51.84/18.41 |
% 51.84/18.41 |-The branch is then unsatisfiable
% 51.84/18.41 |-Branch two:
% 51.84/18.41 | (2346) ~ (all_19_4_93 = 0)
% 51.84/18.41 | (2365) ? [v0] : ? [v1] : ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_19_8_97) = v0 & key(all_19_7_96, b) = v1 & ( ~ (v2 = 0) | ~ (v0 = 0)))
% 51.84/18.41 |
% 51.84/18.41 | Instantiating (2365) with all_504_0_3721, all_504_1_3722, all_504_2_3723 yields:
% 51.84/18.41 | (2366) intruder_holds(all_504_1_3722) = all_504_0_3721 & intruder_message(all_19_8_97) = all_504_2_3723 & key(all_19_7_96, b) = all_504_1_3722 & ( ~ (all_504_0_3721 = 0) | ~ (all_504_2_3723 = 0))
% 51.84/18.41 |
% 51.84/18.41 | Applying alpha-rule on (2366) yields:
% 51.84/18.41 | (2367) intruder_holds(all_504_1_3722) = all_504_0_3721
% 51.84/18.41 | (2368) intruder_message(all_19_8_97) = all_504_2_3723
% 51.84/18.41 | (2369) key(all_19_7_96, b) = all_504_1_3722
% 51.84/18.41 | (2370) ~ (all_504_0_3721 = 0) | ~ (all_504_2_3723 = 0)
% 51.84/18.41 |
% 51.84/18.41 | Instantiating formula (70) with all_285_6_622, all_285_7_623, all_63_4_187 and discharging atoms pair(all_63_4_187, all_285_7_623) = all_285_6_622, yields:
% 51.84/18.41 | (1210) ? [v0] : ? [v1] : ? [v2] : ? [v3] : ? [v4] : ? [v5] : ? [v6] : ? [v7] : ? [v8] : ? [v9] : ? [v10] : (fresh_to_b(all_285_7_623) = v2 & generate_b_nonce(all_285_7_623) = v3 & generate_expiration_time(all_285_7_623) = v4 & b_stored(all_285_6_622) = v10 & triple(all_63_4_187, all_285_7_623, v4) = v5 & triple(b, v3, v6) = v7 & encrypt(v5, bt) = v6 & sent(all_63_4_187, b, all_285_6_622) = v0 & sent(b, t, v7) = v8 & message(v8) = v9 & message(v0) = v1 & ( ~ (v2 = 0) | ~ (v1 = 0) | (v10 = 0 & v9 = 0)))
% 51.84/18.41 |
% 51.84/18.41 | Instantiating formula (12) with all_285_6_622, all_285_7_623, all_63_4_187 and discharging atoms pair(all_63_4_187, all_285_7_623) = all_285_6_622, yields:
% 51.84/18.41 | (1211) ? [v0] : ? [v1] : ? [v2] : (intruder_message(all_285_6_622) = v2 & intruder_message(all_285_7_623) = v1 & intruder_message(all_63_4_187) = v0 & ( ~ (v1 = 0) | ~ (v0 = 0) | v2 = 0))
% 51.84/18.41 |
% 51.84/18.41 | Instantiating formula (56) with all_285_6_622, all_285_7_623, all_63_4_187 and discharging atoms pair(all_63_4_187, all_285_7_623) = all_285_6_622, yields:
% 51.84/18.41 | (1212) ? [v0] : ? [v1] : ? [v2] : (intruder_message(all_285_6_622) = v0 & intruder_message(all_285_7_623) = v2 & intruder_message(all_63_4_187) = v1 & ( ~ (v0 = 0) | (v2 = 0 & v1 = 0)))
% 51.84/18.41 |
% 51.84/18.41 | Instantiating formula (70) with all_375_6_796, all_285_7_623, all_61_4_176 and discharging atoms pair(all_61_4_176, all_285_7_623) = all_375_6_796, yields:
% 51.84/18.41 | (1213) ? [v0] : ? [v1] : ? [v2] : ? [v3] : ? [v4] : ? [v5] : ? [v6] : ? [v7] : ? [v8] : ? [v9] : ? [v10] : (fresh_to_b(all_285_7_623) = v2 & generate_b_nonce(all_285_7_623) = v3 & generate_expiration_time(all_285_7_623) = v4 & b_stored(all_375_6_796) = v10 & triple(all_61_4_176, all_285_7_623, v4) = v5 & triple(b, v3, v6) = v7 & encrypt(v5, bt) = v6 & sent(all_61_4_176, b, all_375_6_796) = v0 & sent(b, t, v7) = v8 & message(v8) = v9 & message(v0) = v1 & ( ~ (v2 = 0) | ~ (v1 = 0) | (v10 = 0 & v9 = 0)))
% 51.84/18.41 |
% 51.84/18.41 | Instantiating formula (12) with all_375_6_796, all_285_7_623, all_61_4_176 and discharging atoms pair(all_61_4_176, all_285_7_623) = all_375_6_796, yields:
% 51.84/18.41 | (1214) ? [v0] : ? [v1] : ? [v2] : (intruder_message(all_375_6_796) = v2 & intruder_message(all_285_7_623) = v1 & intruder_message(all_61_4_176) = v0 & ( ~ (v1 = 0) | ~ (v0 = 0) | v2 = 0))
% 51.84/18.41 |
% 51.84/18.41 | Instantiating formula (56) with all_375_6_796, all_285_7_623, all_61_4_176 and discharging atoms pair(all_61_4_176, all_285_7_623) = all_375_6_796, yields:
% 51.84/18.41 | (1215) ? [v0] : ? [v1] : ? [v2] : (intruder_message(all_375_6_796) = v0 & intruder_message(all_285_7_623) = v2 & intruder_message(all_61_4_176) = v1 & ( ~ (v0 = 0) | (v2 = 0 & v1 = 0)))
% 51.84/18.41 |
% 51.84/18.41 | Instantiating formula (73) with all_281_5_601, b, all_15_14_75, all_281_6_602 and discharging atoms sent(all_15_14_75, b, all_281_6_602) = all_281_5_601, yields:
% 51.84/18.41 | (1216) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (party_of_protocol(all_15_14_75) = v1 & party_of_protocol(b) = v2 & intruder_message(all_281_6_602) = v0 & message(all_281_5_601) = v3 & ( ~ (v2 = 0) | ~ (v1 = 0) | ~ (v0 = 0) | v3 = 0))
% 51.84/18.41 |
% 51.84/18.41 | Instantiating formula (73) with all_269_5_559, b, all_15_15_76, all_269_6_560 and discharging atoms sent(all_15_15_76, b, all_269_6_560) = all_269_5_559, yields:
% 51.84/18.41 | (1217) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (party_of_protocol(all_15_15_76) = v1 & party_of_protocol(b) = v2 & intruder_message(all_269_6_560) = v0 & message(all_269_5_559) = v3 & ( ~ (v2 = 0) | ~ (v1 = 0) | ~ (v0 = 0) | v3 = 0))
% 51.84/18.41 |
% 51.84/18.41 | Instantiating formula (73) with all_277_5_581, b, all_13_9_55, all_277_6_582 and discharging atoms sent(all_13_9_55, b, all_277_6_582) = all_277_5_581, yields:
% 51.84/18.41 | (1218) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (party_of_protocol(all_13_9_55) = v1 & party_of_protocol(b) = v2 & intruder_message(all_277_6_582) = v0 & message(all_277_5_581) = v3 & ( ~ (v2 = 0) | ~ (v1 = 0) | ~ (v0 = 0) | v3 = 0))
% 51.84/18.41 |
% 51.84/18.41 | Instantiating formula (73) with all_369_10_781, b, all_11_4_36, all_131_6_319 and discharging atoms sent(all_11_4_36, b, all_131_6_319) = all_369_10_781, yields:
% 51.84/18.41 | (1219) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (party_of_protocol(all_11_4_36) = v1 & party_of_protocol(b) = v2 & intruder_message(all_131_6_319) = v0 & message(all_369_10_781) = v3 & ( ~ (v2 = 0) | ~ (v1 = 0) | ~ (v0 = 0) | v3 = 0))
% 51.84/18.41 |
% 51.84/18.41 | Instantiating formula (73) with all_285_5_621, b, b, all_285_6_622 and discharging atoms sent(b, b, all_285_6_622) = all_285_5_621, yields:
% 51.84/18.41 | (1220) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (party_of_protocol(b) = v2 & party_of_protocol(b) = v1 & intruder_message(all_285_6_622) = v0 & message(all_285_5_621) = v3 & ( ~ (v2 = 0) | ~ (v1 = 0) | ~ (v0 = 0) | v3 = 0))
% 51.84/18.41 |
% 51.84/18.41 | Instantiating formula (73) with all_369_2_773, t, b, all_369_3_774 and discharging atoms sent(b, t, all_369_3_774) = all_369_2_773, yields:
% 51.84/18.41 | (1221) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (party_of_protocol(b) = v1 & party_of_protocol(t) = v2 & intruder_message(all_369_3_774) = v0 & message(all_369_2_773) = v3 & ( ~ (v2 = 0) | ~ (v1 = 0) | ~ (v0 = 0) | v3 = 0))
% 51.84/18.41 |
% 51.84/18.41 | Instantiating formula (73) with all_375_5_795, b, a, all_375_6_796 and discharging atoms sent(a, b, all_375_6_796) = all_375_5_795, yields:
% 51.84/18.41 | (1222) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (party_of_protocol(b) = v2 & party_of_protocol(a) = v1 & intruder_message(all_375_6_796) = v0 & message(all_375_5_795) = v3 & ( ~ (v2 = 0) | ~ (v1 = 0) | ~ (v0 = 0) | v3 = 0))
% 51.84/18.41 |
% 51.84/18.41 | Instantiating formula (4) with all_375_5_795, all_375_6_796, b, a and discharging atoms sent(a, b, all_375_6_796) = all_375_5_795, yields:
% 51.84/18.41 | (1223) ? [v0] : ? [v1] : (intruder_message(all_375_6_796) = v1 & message(all_375_5_795) = v0 & ( ~ (v0 = 0) | v1 = 0))
% 51.84/18.41 |
% 51.84/18.41 | Instantiating formula (57) with all_504_1_3722, b, all_19_7_96 and discharging atoms key(all_19_7_96, b) = all_504_1_3722, yields:
% 51.84/18.41 | (2385) ? [v0] : ? [v1] : ? [v2] : (intruder_holds(all_504_1_3722) = v2 & party_of_protocol(b) = v1 & intruder_message(all_19_7_96) = v0 & ( ~ (v1 = 0) | ~ (v0 = 0) | v2 = 0))
% 51.84/18.41 |
% 51.84/18.41 | Instantiating formula (57) with all_493_1_3716, a, all_19_7_96 and discharging atoms key(all_19_7_96, a) = all_493_1_3716, yields:
% 51.84/18.41 | (2386) ? [v0] : ? [v1] : ? [v2] : (intruder_holds(all_493_1_3716) = v2 & party_of_protocol(a) = v1 & intruder_message(all_19_7_96) = v0 & ( ~ (v1 = 0) | ~ (v0 = 0) | v2 = 0))
% 51.84/18.41 |
% 51.84/18.41 | Instantiating formula (57) with all_499_1_3719, t, all_19_7_96 and discharging atoms key(all_19_7_96, t) = all_499_1_3719, yields:
% 51.84/18.41 | (2387) ? [v0] : ? [v1] : ? [v2] : (intruder_holds(all_499_1_3719) = v2 & party_of_protocol(t) = v1 & intruder_message(all_19_7_96) = v0 & ( ~ (v1 = 0) | ~ (v0 = 0) | v2 = 0))
% 51.84/18.41 |
% 51.84/18.41 | Instantiating formula (39) with all_285_1_617, an_a_nonce and discharging atoms key(an_a_nonce, b) = all_285_1_617, yields:
% 51.84/18.41 | (1225) ? [v0] : ? [v1] : ? [v2] : (intruder_holds(all_285_1_617) = v0 & b_holds(v1) = v2 & key(an_a_nonce, a) = v1 & ( ~ (v2 = 0) | ~ (v0 = 0)))
% 51.84/18.42 |
% 51.84/18.42 | Instantiating formula (57) with all_285_1_617, b, an_a_nonce and discharging atoms key(an_a_nonce, b) = all_285_1_617, yields:
% 51.84/18.42 | (1226) ? [v0] : ? [v1] : ? [v2] : (intruder_holds(all_285_1_617) = v2 & party_of_protocol(b) = v1 & intruder_message(an_a_nonce) = v0 & ( ~ (v1 = 0) | ~ (v0 = 0) | v2 = 0))
% 51.84/18.42 |
% 51.84/18.42 | Instantiating formula (62) with all_375_1_791, an_a_nonce and discharging atoms key(an_a_nonce, a) = all_375_1_791, yields:
% 51.84/18.42 | (1227) ? [v0] : ? [v1] : ? [v2] : (intruder_holds(v0) = v1 & b_holds(all_375_1_791) = v2 & key(an_a_nonce, b) = v0 & ( ~ (v2 = 0) | ~ (v1 = 0)))
% 51.84/18.42 |
% 51.84/18.42 | Instantiating formula (57) with all_375_1_791, a, an_a_nonce and discharging atoms key(an_a_nonce, a) = all_375_1_791, yields:
% 51.84/18.42 | (1228) ? [v0] : ? [v1] : ? [v2] : (intruder_holds(all_375_1_791) = v2 & party_of_protocol(a) = v1 & intruder_message(an_a_nonce) = v0 & ( ~ (v1 = 0) | ~ (v0 = 0) | v2 = 0))
% 51.84/18.42 |
% 51.84/18.42 | Instantiating (1228) with all_764_0_3739, all_764_1_3740, all_764_2_3741 yields:
% 51.84/18.42 | (2392) intruder_holds(all_375_1_791) = all_764_0_3739 & party_of_protocol(a) = all_764_1_3740 & intruder_message(an_a_nonce) = all_764_2_3741 & ( ~ (all_764_1_3740 = 0) | ~ (all_764_2_3741 = 0) | all_764_0_3739 = 0)
% 51.84/18.42 |
% 51.84/18.42 | Applying alpha-rule on (2392) yields:
% 51.84/18.42 | (2393) intruder_holds(all_375_1_791) = all_764_0_3739
% 51.84/18.42 | (2394) party_of_protocol(a) = all_764_1_3740
% 51.84/18.42 | (2395) intruder_message(an_a_nonce) = all_764_2_3741
% 51.84/18.42 | (2396) ~ (all_764_1_3740 = 0) | ~ (all_764_2_3741 = 0) | all_764_0_3739 = 0
% 51.84/18.42 |
% 51.84/18.42 | Instantiating (1227) with all_766_0_3742, all_766_1_3743, all_766_2_3744 yields:
% 51.84/18.42 | (2397) intruder_holds(all_766_2_3744) = all_766_1_3743 & b_holds(all_375_1_791) = all_766_0_3742 & key(an_a_nonce, b) = all_766_2_3744 & ( ~ (all_766_0_3742 = 0) | ~ (all_766_1_3743 = 0))
% 51.84/18.42 |
% 51.84/18.42 | Applying alpha-rule on (2397) yields:
% 51.84/18.42 | (2398) intruder_holds(all_766_2_3744) = all_766_1_3743
% 51.84/18.42 | (2399) b_holds(all_375_1_791) = all_766_0_3742
% 51.84/18.42 | (2400) key(an_a_nonce, b) = all_766_2_3744
% 51.84/18.42 | (2401) ~ (all_766_0_3742 = 0) | ~ (all_766_1_3743 = 0)
% 51.84/18.42 |
% 51.84/18.42 | Instantiating (1219) with all_772_0_3749, all_772_1_3750, all_772_2_3751, all_772_3_3752 yields:
% 51.84/18.42 | (2402) party_of_protocol(all_11_4_36) = all_772_2_3751 & party_of_protocol(b) = all_772_1_3750 & intruder_message(all_131_6_319) = all_772_3_3752 & message(all_369_10_781) = all_772_0_3749 & ( ~ (all_772_1_3750 = 0) | ~ (all_772_2_3751 = 0) | ~ (all_772_3_3752 = 0) | all_772_0_3749 = 0)
% 51.84/18.42 |
% 51.84/18.42 | Applying alpha-rule on (2402) yields:
% 51.84/18.42 | (2403) message(all_369_10_781) = all_772_0_3749
% 51.84/18.42 | (2404) party_of_protocol(b) = all_772_1_3750
% 51.84/18.42 | (2405) intruder_message(all_131_6_319) = all_772_3_3752
% 51.84/18.42 | (2406) ~ (all_772_1_3750 = 0) | ~ (all_772_2_3751 = 0) | ~ (all_772_3_3752 = 0) | all_772_0_3749 = 0
% 51.84/18.42 | (2407) party_of_protocol(all_11_4_36) = all_772_2_3751
% 51.84/18.42 |
% 51.84/18.42 | Instantiating (2387) with all_780_0_3762, all_780_1_3763, all_780_2_3764 yields:
% 51.84/18.42 | (2408) intruder_holds(all_499_1_3719) = all_780_0_3762 & party_of_protocol(t) = all_780_1_3763 & intruder_message(all_19_7_96) = all_780_2_3764 & ( ~ (all_780_1_3763 = 0) | ~ (all_780_2_3764 = 0) | all_780_0_3762 = 0)
% 51.84/18.42 |
% 51.84/18.42 | Applying alpha-rule on (2408) yields:
% 51.84/18.42 | (2409) intruder_holds(all_499_1_3719) = all_780_0_3762
% 51.84/18.42 | (2410) party_of_protocol(t) = all_780_1_3763
% 51.84/18.42 | (2411) intruder_message(all_19_7_96) = all_780_2_3764
% 51.84/18.42 | (2412) ~ (all_780_1_3763 = 0) | ~ (all_780_2_3764 = 0) | all_780_0_3762 = 0
% 51.84/18.42 |
% 51.84/18.42 | Instantiating (1216) with all_784_0_3767, all_784_1_3768, all_784_2_3769, all_784_3_3770 yields:
% 51.84/18.42 | (2413) party_of_protocol(all_15_14_75) = all_784_2_3769 & party_of_protocol(b) = all_784_1_3768 & intruder_message(all_281_6_602) = all_784_3_3770 & message(all_281_5_601) = all_784_0_3767 & ( ~ (all_784_1_3768 = 0) | ~ (all_784_2_3769 = 0) | ~ (all_784_3_3770 = 0) | all_784_0_3767 = 0)
% 51.84/18.42 |
% 51.84/18.42 | Applying alpha-rule on (2413) yields:
% 51.84/18.42 | (2414) party_of_protocol(b) = all_784_1_3768
% 51.84/18.42 | (2415) intruder_message(all_281_6_602) = all_784_3_3770
% 51.84/18.42 | (2416) party_of_protocol(all_15_14_75) = all_784_2_3769
% 51.84/18.42 | (2417) ~ (all_784_1_3768 = 0) | ~ (all_784_2_3769 = 0) | ~ (all_784_3_3770 = 0) | all_784_0_3767 = 0
% 51.84/18.42 | (2418) message(all_281_5_601) = all_784_0_3767
% 51.84/18.42 |
% 51.84/18.42 | Instantiating (1213) with all_786_0_3771, all_786_1_3772, all_786_2_3773, all_786_3_3774, all_786_4_3775, all_786_5_3776, all_786_6_3777, all_786_7_3778, all_786_8_3779, all_786_9_3780, all_786_10_3781 yields:
% 51.84/18.42 | (2419) fresh_to_b(all_285_7_623) = all_786_8_3779 & generate_b_nonce(all_285_7_623) = all_786_7_3778 & generate_expiration_time(all_285_7_623) = all_786_6_3777 & b_stored(all_375_6_796) = all_786_0_3771 & triple(all_61_4_176, all_285_7_623, all_786_6_3777) = all_786_5_3776 & triple(b, all_786_7_3778, all_786_4_3775) = all_786_3_3774 & encrypt(all_786_5_3776, bt) = all_786_4_3775 & sent(all_61_4_176, b, all_375_6_796) = all_786_10_3781 & sent(b, t, all_786_3_3774) = all_786_2_3773 & message(all_786_2_3773) = all_786_1_3772 & message(all_786_10_3781) = all_786_9_3780 & ( ~ (all_786_8_3779 = 0) | ~ (all_786_9_3780 = 0) | (all_786_0_3771 = 0 & all_786_1_3772 = 0))
% 51.84/18.42 |
% 51.84/18.42 | Applying alpha-rule on (2419) yields:
% 51.84/18.42 | (2420) message(all_786_2_3773) = all_786_1_3772
% 51.84/18.42 | (2421) b_stored(all_375_6_796) = all_786_0_3771
% 51.84/18.42 | (2422) generate_b_nonce(all_285_7_623) = all_786_7_3778
% 51.84/18.42 | (2423) encrypt(all_786_5_3776, bt) = all_786_4_3775
% 51.84/18.42 | (2424) generate_expiration_time(all_285_7_623) = all_786_6_3777
% 51.84/18.42 | (2425) fresh_to_b(all_285_7_623) = all_786_8_3779
% 51.84/18.42 | (2426) ~ (all_786_8_3779 = 0) | ~ (all_786_9_3780 = 0) | (all_786_0_3771 = 0 & all_786_1_3772 = 0)
% 51.84/18.42 | (2427) triple(b, all_786_7_3778, all_786_4_3775) = all_786_3_3774
% 51.84/18.42 | (2428) message(all_786_10_3781) = all_786_9_3780
% 51.84/18.42 | (2429) sent(b, t, all_786_3_3774) = all_786_2_3773
% 51.84/18.42 | (2430) triple(all_61_4_176, all_285_7_623, all_786_6_3777) = all_786_5_3776
% 51.84/18.42 | (2431) sent(all_61_4_176, b, all_375_6_796) = all_786_10_3781
% 51.84/18.42 |
% 51.84/18.42 | Instantiating (1212) with all_788_0_3782, all_788_1_3783, all_788_2_3784 yields:
% 51.84/18.42 | (2432) intruder_message(all_285_6_622) = all_788_2_3784 & intruder_message(all_285_7_623) = all_788_0_3782 & intruder_message(all_63_4_187) = all_788_1_3783 & ( ~ (all_788_2_3784 = 0) | (all_788_0_3782 = 0 & all_788_1_3783 = 0))
% 51.84/18.42 |
% 51.84/18.42 | Applying alpha-rule on (2432) yields:
% 51.84/18.42 | (2433) intruder_message(all_285_6_622) = all_788_2_3784
% 51.84/18.42 | (2434) intruder_message(all_285_7_623) = all_788_0_3782
% 51.84/18.42 | (2435) intruder_message(all_63_4_187) = all_788_1_3783
% 51.84/18.42 | (2436) ~ (all_788_2_3784 = 0) | (all_788_0_3782 = 0 & all_788_1_3783 = 0)
% 51.84/18.42 |
% 51.84/18.42 | Instantiating (1215) with all_790_0_3785, all_790_1_3786, all_790_2_3787 yields:
% 51.84/18.42 | (2437) intruder_message(all_375_6_796) = all_790_2_3787 & intruder_message(all_285_7_623) = all_790_0_3785 & intruder_message(all_61_4_176) = all_790_1_3786 & ( ~ (all_790_2_3787 = 0) | (all_790_0_3785 = 0 & all_790_1_3786 = 0))
% 51.84/18.42 |
% 51.84/18.42 | Applying alpha-rule on (2437) yields:
% 51.84/18.42 | (2438) intruder_message(all_375_6_796) = all_790_2_3787
% 51.84/18.42 | (2439) intruder_message(all_285_7_623) = all_790_0_3785
% 51.84/18.42 | (2440) intruder_message(all_61_4_176) = all_790_1_3786
% 51.84/18.42 | (2441) ~ (all_790_2_3787 = 0) | (all_790_0_3785 = 0 & all_790_1_3786 = 0)
% 51.84/18.42 |
% 51.84/18.42 | Instantiating (1220) with all_792_0_3788, all_792_1_3789, all_792_2_3790, all_792_3_3791 yields:
% 51.84/18.42 | (2442) party_of_protocol(b) = all_792_1_3789 & party_of_protocol(b) = all_792_2_3790 & intruder_message(all_285_6_622) = all_792_3_3791 & message(all_285_5_621) = all_792_0_3788 & ( ~ (all_792_1_3789 = 0) | ~ (all_792_2_3790 = 0) | ~ (all_792_3_3791 = 0) | all_792_0_3788 = 0)
% 51.84/18.42 |
% 51.84/18.42 | Applying alpha-rule on (2442) yields:
% 51.84/18.42 | (2443) message(all_285_5_621) = all_792_0_3788
% 51.84/18.42 | (2444) ~ (all_792_1_3789 = 0) | ~ (all_792_2_3790 = 0) | ~ (all_792_3_3791 = 0) | all_792_0_3788 = 0
% 51.84/18.42 | (2445) party_of_protocol(b) = all_792_1_3789
% 51.84/18.42 | (2446) intruder_message(all_285_6_622) = all_792_3_3791
% 51.84/18.42 | (2447) party_of_protocol(b) = all_792_2_3790
% 51.84/18.42 |
% 51.84/18.42 | Instantiating (1218) with all_796_0_3794, all_796_1_3795, all_796_2_3796, all_796_3_3797 yields:
% 51.84/18.42 | (2448) party_of_protocol(all_13_9_55) = all_796_2_3796 & party_of_protocol(b) = all_796_1_3795 & intruder_message(all_277_6_582) = all_796_3_3797 & message(all_277_5_581) = all_796_0_3794 & ( ~ (all_796_1_3795 = 0) | ~ (all_796_2_3796 = 0) | ~ (all_796_3_3797 = 0) | all_796_0_3794 = 0)
% 51.84/18.42 |
% 51.84/18.42 | Applying alpha-rule on (2448) yields:
% 51.84/18.42 | (2449) ~ (all_796_1_3795 = 0) | ~ (all_796_2_3796 = 0) | ~ (all_796_3_3797 = 0) | all_796_0_3794 = 0
% 51.84/18.42 | (2450) party_of_protocol(all_13_9_55) = all_796_2_3796
% 51.84/18.42 | (2451) intruder_message(all_277_6_582) = all_796_3_3797
% 51.84/18.42 | (2452) party_of_protocol(b) = all_796_1_3795
% 51.84/18.42 | (2453) message(all_277_5_581) = all_796_0_3794
% 51.84/18.42 |
% 51.84/18.42 | Instantiating (1214) with all_800_0_3800, all_800_1_3801, all_800_2_3802 yields:
% 51.84/18.42 | (2454) intruder_message(all_375_6_796) = all_800_0_3800 & intruder_message(all_285_7_623) = all_800_1_3801 & intruder_message(all_61_4_176) = all_800_2_3802 & ( ~ (all_800_1_3801 = 0) | ~ (all_800_2_3802 = 0) | all_800_0_3800 = 0)
% 51.84/18.43 |
% 51.84/18.43 | Applying alpha-rule on (2454) yields:
% 51.84/18.43 | (2455) intruder_message(all_375_6_796) = all_800_0_3800
% 51.84/18.43 | (2456) intruder_message(all_285_7_623) = all_800_1_3801
% 51.84/18.43 | (2457) intruder_message(all_61_4_176) = all_800_2_3802
% 51.84/18.43 | (2458) ~ (all_800_1_3801 = 0) | ~ (all_800_2_3802 = 0) | all_800_0_3800 = 0
% 51.84/18.43 |
% 51.84/18.43 | Instantiating (1211) with all_802_0_3803, all_802_1_3804, all_802_2_3805 yields:
% 51.84/18.43 | (2459) intruder_message(all_285_6_622) = all_802_0_3803 & intruder_message(all_285_7_623) = all_802_1_3804 & intruder_message(all_63_4_187) = all_802_2_3805 & ( ~ (all_802_1_3804 = 0) | ~ (all_802_2_3805 = 0) | all_802_0_3803 = 0)
% 51.84/18.43 |
% 51.84/18.43 | Applying alpha-rule on (2459) yields:
% 51.84/18.43 | (2460) intruder_message(all_285_6_622) = all_802_0_3803
% 51.84/18.43 | (2461) intruder_message(all_285_7_623) = all_802_1_3804
% 51.84/18.43 | (2462) intruder_message(all_63_4_187) = all_802_2_3805
% 51.84/18.43 | (2463) ~ (all_802_1_3804 = 0) | ~ (all_802_2_3805 = 0) | all_802_0_3803 = 0
% 51.84/18.43 |
% 51.84/18.43 | Instantiating (1217) with all_804_0_3806, all_804_1_3807, all_804_2_3808, all_804_3_3809 yields:
% 51.84/18.43 | (2464) party_of_protocol(all_15_15_76) = all_804_2_3808 & party_of_protocol(b) = all_804_1_3807 & intruder_message(all_269_6_560) = all_804_3_3809 & message(all_269_5_559) = all_804_0_3806 & ( ~ (all_804_1_3807 = 0) | ~ (all_804_2_3808 = 0) | ~ (all_804_3_3809 = 0) | all_804_0_3806 = 0)
% 51.84/18.43 |
% 51.84/18.43 | Applying alpha-rule on (2464) yields:
% 51.84/18.43 | (2465) party_of_protocol(b) = all_804_1_3807
% 51.84/18.43 | (2466) message(all_269_5_559) = all_804_0_3806
% 51.84/18.43 | (2467) ~ (all_804_1_3807 = 0) | ~ (all_804_2_3808 = 0) | ~ (all_804_3_3809 = 0) | all_804_0_3806 = 0
% 51.84/18.43 | (2468) party_of_protocol(all_15_15_76) = all_804_2_3808
% 51.84/18.43 | (2469) intruder_message(all_269_6_560) = all_804_3_3809
% 51.84/18.43 |
% 51.84/18.43 | Instantiating (1226) with all_806_0_3810, all_806_1_3811, all_806_2_3812 yields:
% 51.84/18.43 | (2470) intruder_holds(all_285_1_617) = all_806_0_3810 & party_of_protocol(b) = all_806_1_3811 & intruder_message(an_a_nonce) = all_806_2_3812 & ( ~ (all_806_1_3811 = 0) | ~ (all_806_2_3812 = 0) | all_806_0_3810 = 0)
% 51.84/18.43 |
% 51.84/18.43 | Applying alpha-rule on (2470) yields:
% 51.84/18.43 | (2471) intruder_holds(all_285_1_617) = all_806_0_3810
% 51.84/18.43 | (2472) party_of_protocol(b) = all_806_1_3811
% 51.84/18.43 | (2473) intruder_message(an_a_nonce) = all_806_2_3812
% 51.84/18.43 | (2474) ~ (all_806_1_3811 = 0) | ~ (all_806_2_3812 = 0) | all_806_0_3810 = 0
% 51.84/18.43 |
% 51.84/18.43 | Instantiating (1225) with all_808_0_3813, all_808_1_3814, all_808_2_3815 yields:
% 51.84/18.43 | (2475) intruder_holds(all_285_1_617) = all_808_2_3815 & b_holds(all_808_1_3814) = all_808_0_3813 & key(an_a_nonce, a) = all_808_1_3814 & ( ~ (all_808_0_3813 = 0) | ~ (all_808_2_3815 = 0))
% 51.84/18.43 |
% 51.84/18.43 | Applying alpha-rule on (2475) yields:
% 51.84/18.43 | (2476) intruder_holds(all_285_1_617) = all_808_2_3815
% 51.84/18.43 | (2477) b_holds(all_808_1_3814) = all_808_0_3813
% 51.84/18.43 | (2478) key(an_a_nonce, a) = all_808_1_3814
% 51.84/18.43 | (2479) ~ (all_808_0_3813 = 0) | ~ (all_808_2_3815 = 0)
% 51.84/18.43 |
% 51.84/18.43 | Instantiating (2386) with all_816_0_3832, all_816_1_3833, all_816_2_3834 yields:
% 51.84/18.43 | (2480) intruder_holds(all_493_1_3716) = all_816_0_3832 & party_of_protocol(a) = all_816_1_3833 & intruder_message(all_19_7_96) = all_816_2_3834 & ( ~ (all_816_1_3833 = 0) | ~ (all_816_2_3834 = 0) | all_816_0_3832 = 0)
% 51.84/18.43 |
% 51.84/18.43 | Applying alpha-rule on (2480) yields:
% 51.84/18.43 | (2481) intruder_holds(all_493_1_3716) = all_816_0_3832
% 51.84/18.43 | (2482) party_of_protocol(a) = all_816_1_3833
% 51.84/18.43 | (2483) intruder_message(all_19_7_96) = all_816_2_3834
% 51.84/18.43 | (2484) ~ (all_816_1_3833 = 0) | ~ (all_816_2_3834 = 0) | all_816_0_3832 = 0
% 51.84/18.43 |
% 51.84/18.43 | Instantiating (2385) with all_818_0_3835, all_818_1_3836, all_818_2_3837 yields:
% 51.84/18.43 | (2485) intruder_holds(all_504_1_3722) = all_818_0_3835 & party_of_protocol(b) = all_818_1_3836 & intruder_message(all_19_7_96) = all_818_2_3837 & ( ~ (all_818_1_3836 = 0) | ~ (all_818_2_3837 = 0) | all_818_0_3835 = 0)
% 51.84/18.43 |
% 51.84/18.43 | Applying alpha-rule on (2485) yields:
% 51.84/18.43 | (2486) intruder_holds(all_504_1_3722) = all_818_0_3835
% 51.84/18.43 | (2487) party_of_protocol(b) = all_818_1_3836
% 51.84/18.43 | (2488) intruder_message(all_19_7_96) = all_818_2_3837
% 51.84/18.43 | (2489) ~ (all_818_1_3836 = 0) | ~ (all_818_2_3837 = 0) | all_818_0_3835 = 0
% 51.84/18.43 |
% 51.84/18.43 | Instantiating (1210) with all_834_0_3861, all_834_1_3862, all_834_2_3863, all_834_3_3864, all_834_4_3865, all_834_5_3866, all_834_6_3867, all_834_7_3868, all_834_8_3869, all_834_9_3870, all_834_10_3871 yields:
% 51.84/18.43 | (2490) fresh_to_b(all_285_7_623) = all_834_8_3869 & generate_b_nonce(all_285_7_623) = all_834_7_3868 & generate_expiration_time(all_285_7_623) = all_834_6_3867 & b_stored(all_285_6_622) = all_834_0_3861 & triple(all_63_4_187, all_285_7_623, all_834_6_3867) = all_834_5_3866 & triple(b, all_834_7_3868, all_834_4_3865) = all_834_3_3864 & encrypt(all_834_5_3866, bt) = all_834_4_3865 & sent(all_63_4_187, b, all_285_6_622) = all_834_10_3871 & sent(b, t, all_834_3_3864) = all_834_2_3863 & message(all_834_2_3863) = all_834_1_3862 & message(all_834_10_3871) = all_834_9_3870 & ( ~ (all_834_8_3869 = 0) | ~ (all_834_9_3870 = 0) | (all_834_0_3861 = 0 & all_834_1_3862 = 0))
% 51.84/18.43 |
% 51.84/18.43 | Applying alpha-rule on (2490) yields:
% 51.84/18.43 | (2491) sent(b, t, all_834_3_3864) = all_834_2_3863
% 51.84/18.43 | (2492) triple(all_63_4_187, all_285_7_623, all_834_6_3867) = all_834_5_3866
% 51.84/18.43 | (2493) b_stored(all_285_6_622) = all_834_0_3861
% 51.84/18.43 | (2494) generate_expiration_time(all_285_7_623) = all_834_6_3867
% 51.84/18.43 | (2495) message(all_834_10_3871) = all_834_9_3870
% 51.84/18.43 | (2496) ~ (all_834_8_3869 = 0) | ~ (all_834_9_3870 = 0) | (all_834_0_3861 = 0 & all_834_1_3862 = 0)
% 51.84/18.43 | (2497) message(all_834_2_3863) = all_834_1_3862
% 51.84/18.43 | (2498) encrypt(all_834_5_3866, bt) = all_834_4_3865
% 51.84/18.43 | (2499) triple(b, all_834_7_3868, all_834_4_3865) = all_834_3_3864
% 51.84/18.43 | (2500) fresh_to_b(all_285_7_623) = all_834_8_3869
% 51.84/18.43 | (2501) sent(all_63_4_187, b, all_285_6_622) = all_834_10_3871
% 51.84/18.43 | (2502) generate_b_nonce(all_285_7_623) = all_834_7_3868
% 51.84/18.43 |
% 51.84/18.43 | Instantiating (1223) with all_836_0_3872, all_836_1_3873 yields:
% 51.84/18.43 | (2503) intruder_message(all_375_6_796) = all_836_0_3872 & message(all_375_5_795) = all_836_1_3873 & ( ~ (all_836_1_3873 = 0) | all_836_0_3872 = 0)
% 51.84/18.43 |
% 51.84/18.43 | Applying alpha-rule on (2503) yields:
% 51.84/18.43 | (2504) intruder_message(all_375_6_796) = all_836_0_3872
% 51.84/18.43 | (2505) message(all_375_5_795) = all_836_1_3873
% 51.84/18.43 | (2506) ~ (all_836_1_3873 = 0) | all_836_0_3872 = 0
% 51.84/18.43 |
% 51.84/18.43 | Instantiating (1222) with all_840_0_3876, all_840_1_3877, all_840_2_3878, all_840_3_3879 yields:
% 51.84/18.43 | (2507) party_of_protocol(b) = all_840_1_3877 & party_of_protocol(a) = all_840_2_3878 & intruder_message(all_375_6_796) = all_840_3_3879 & message(all_375_5_795) = all_840_0_3876 & ( ~ (all_840_1_3877 = 0) | ~ (all_840_2_3878 = 0) | ~ (all_840_3_3879 = 0) | all_840_0_3876 = 0)
% 51.84/18.43 |
% 51.84/18.43 | Applying alpha-rule on (2507) yields:
% 51.84/18.43 | (2508) message(all_375_5_795) = all_840_0_3876
% 51.84/18.43 | (2509) party_of_protocol(a) = all_840_2_3878
% 51.84/18.43 | (2510) ~ (all_840_1_3877 = 0) | ~ (all_840_2_3878 = 0) | ~ (all_840_3_3879 = 0) | all_840_0_3876 = 0
% 51.84/18.43 | (2511) intruder_message(all_375_6_796) = all_840_3_3879
% 51.84/18.43 | (2512) party_of_protocol(b) = all_840_1_3877
% 51.84/18.43 |
% 51.84/18.43 | Instantiating (1221) with all_864_0_3937, all_864_1_3938, all_864_2_3939, all_864_3_3940 yields:
% 51.84/18.43 | (2513) party_of_protocol(b) = all_864_2_3939 & party_of_protocol(t) = all_864_1_3938 & intruder_message(all_369_3_774) = all_864_3_3940 & message(all_369_2_773) = all_864_0_3937 & ( ~ (all_864_1_3938 = 0) | ~ (all_864_2_3939 = 0) | ~ (all_864_3_3940 = 0) | all_864_0_3937 = 0)
% 51.84/18.43 |
% 51.84/18.43 | Applying alpha-rule on (2513) yields:
% 51.84/18.43 | (2514) party_of_protocol(b) = all_864_2_3939
% 51.84/18.43 | (2515) ~ (all_864_1_3938 = 0) | ~ (all_864_2_3939 = 0) | ~ (all_864_3_3940 = 0) | all_864_0_3937 = 0
% 51.84/18.43 | (2516) intruder_message(all_369_3_774) = all_864_3_3940
% 51.84/18.43 | (2517) message(all_369_2_773) = all_864_0_3937
% 51.84/18.43 | (2518) party_of_protocol(t) = all_864_1_3938
% 51.84/18.43 |
% 51.84/18.43 | Instantiating formula (37) with all_285_1_617, all_806_0_3810, all_808_2_3815 and discharging atoms intruder_holds(all_285_1_617) = all_808_2_3815, intruder_holds(all_285_1_617) = all_806_0_3810, yields:
% 51.84/18.43 | (2519) all_808_2_3815 = all_806_0_3810
% 51.84/18.43 |
% 51.84/18.43 | Instantiating formula (66) with b, all_864_2_3939, 0 and discharging atoms party_of_protocol(b) = all_864_2_3939, party_of_protocol(b) = 0, yields:
% 51.84/18.43 | (2520) all_864_2_3939 = 0
% 51.84/18.43 |
% 51.84/18.43 | Instantiating formula (66) with b, all_818_1_3836, all_864_2_3939 and discharging atoms party_of_protocol(b) = all_864_2_3939, party_of_protocol(b) = all_818_1_3836, yields:
% 51.84/18.43 | (2521) all_864_2_3939 = all_818_1_3836
% 51.84/18.43 |
% 51.84/18.43 | Instantiating formula (66) with b, all_818_1_3836, all_840_1_3877 and discharging atoms party_of_protocol(b) = all_840_1_3877, party_of_protocol(b) = all_818_1_3836, yields:
% 51.84/18.43 | (2522) all_840_1_3877 = all_818_1_3836
% 51.84/18.43 |
% 51.84/18.43 | Instantiating formula (66) with b, all_806_1_3811, all_818_1_3836 and discharging atoms party_of_protocol(b) = all_818_1_3836, party_of_protocol(b) = all_806_1_3811, yields:
% 51.84/18.43 | (2523) all_818_1_3836 = all_806_1_3811
% 51.84/18.43 |
% 51.84/18.43 | Instantiating formula (66) with b, all_804_1_3807, all_840_1_3877 and discharging atoms party_of_protocol(b) = all_840_1_3877, party_of_protocol(b) = all_804_1_3807, yields:
% 51.84/18.44 | (2524) all_840_1_3877 = all_804_1_3807
% 51.84/18.44 |
% 51.84/18.44 | Instantiating formula (66) with b, all_796_1_3795, all_818_1_3836 and discharging atoms party_of_protocol(b) = all_818_1_3836, party_of_protocol(b) = all_796_1_3795, yields:
% 51.84/18.44 | (2525) all_818_1_3836 = all_796_1_3795
% 51.84/18.44 |
% 51.84/18.44 | Instantiating formula (66) with b, all_792_1_3789, all_796_1_3795 and discharging atoms party_of_protocol(b) = all_796_1_3795, party_of_protocol(b) = all_792_1_3789, yields:
% 51.84/18.44 | (2526) all_796_1_3795 = all_792_1_3789
% 51.84/18.44 |
% 51.84/18.44 | Instantiating formula (66) with b, all_792_2_3790, all_792_1_3789 and discharging atoms party_of_protocol(b) = all_792_1_3789, party_of_protocol(b) = all_792_2_3790, yields:
% 51.84/18.44 | (2527) all_792_1_3789 = all_792_2_3790
% 51.84/18.44 |
% 51.84/18.44 | Instantiating formula (66) with b, all_784_1_3768, all_792_2_3790 and discharging atoms party_of_protocol(b) = all_792_2_3790, party_of_protocol(b) = all_784_1_3768, yields:
% 51.84/18.44 | (2528) all_792_2_3790 = all_784_1_3768
% 51.84/18.44 |
% 51.84/18.44 | Instantiating formula (66) with b, all_772_1_3750, all_784_1_3768 and discharging atoms party_of_protocol(b) = all_784_1_3768, party_of_protocol(b) = all_772_1_3750, yields:
% 51.84/18.44 | (2529) all_784_1_3768 = all_772_1_3750
% 51.84/18.44 |
% 51.84/18.44 | Instantiating formula (66) with a, all_840_2_3878, 0 and discharging atoms party_of_protocol(a) = all_840_2_3878, party_of_protocol(a) = 0, yields:
% 51.84/18.44 | (2530) all_840_2_3878 = 0
% 51.84/18.44 |
% 51.84/18.44 | Instantiating formula (66) with a, all_816_1_3833, all_840_2_3878 and discharging atoms party_of_protocol(a) = all_840_2_3878, party_of_protocol(a) = all_816_1_3833, yields:
% 51.84/18.44 | (2531) all_840_2_3878 = all_816_1_3833
% 51.84/18.44 |
% 51.84/18.44 | Instantiating formula (66) with a, all_764_1_3740, all_840_2_3878 and discharging atoms party_of_protocol(a) = all_840_2_3878, party_of_protocol(a) = all_764_1_3740, yields:
% 51.84/18.44 | (2532) all_840_2_3878 = all_764_1_3740
% 51.84/18.44 |
% 51.84/18.44 | Instantiating formula (66) with t, all_864_1_3938, 0 and discharging atoms party_of_protocol(t) = all_864_1_3938, party_of_protocol(t) = 0, yields:
% 51.84/18.44 | (2533) all_864_1_3938 = 0
% 51.84/18.44 |
% 51.84/18.44 | Instantiating formula (66) with t, all_780_1_3763, all_864_1_3938 and discharging atoms party_of_protocol(t) = all_864_1_3938, party_of_protocol(t) = all_780_1_3763, yields:
% 51.84/18.44 | (2534) all_864_1_3938 = all_780_1_3763
% 51.84/18.44 |
% 51.84/18.44 | Instantiating formula (31) with all_375_6_796, all_836_0_3872, all_840_3_3879 and discharging atoms intruder_message(all_375_6_796) = all_840_3_3879, intruder_message(all_375_6_796) = all_836_0_3872, yields:
% 51.84/18.44 | (2535) all_840_3_3879 = all_836_0_3872
% 51.84/18.44 |
% 51.84/18.44 | Instantiating formula (31) with all_375_6_796, all_800_0_3800, all_840_3_3879 and discharging atoms intruder_message(all_375_6_796) = all_840_3_3879, intruder_message(all_375_6_796) = all_800_0_3800, yields:
% 51.84/18.44 | (2536) all_840_3_3879 = all_800_0_3800
% 51.84/18.44 |
% 51.84/18.44 | Instantiating formula (31) with all_375_6_796, all_790_2_3787, all_840_3_3879 and discharging atoms intruder_message(all_375_6_796) = all_840_3_3879, intruder_message(all_375_6_796) = all_790_2_3787, yields:
% 51.84/18.44 | (2537) all_840_3_3879 = all_790_2_3787
% 51.84/18.44 |
% 51.84/18.44 | Instantiating formula (31) with all_285_7_623, all_800_1_3801, all_802_1_3804 and discharging atoms intruder_message(all_285_7_623) = all_802_1_3804, intruder_message(all_285_7_623) = all_800_1_3801, yields:
% 51.84/18.44 | (2538) all_802_1_3804 = all_800_1_3801
% 51.84/18.44 |
% 51.84/18.44 | Instantiating formula (31) with all_285_7_623, all_790_0_3785, all_800_1_3801 and discharging atoms intruder_message(all_285_7_623) = all_800_1_3801, intruder_message(all_285_7_623) = all_790_0_3785, yields:
% 51.84/18.44 | (2539) all_800_1_3801 = all_790_0_3785
% 51.84/18.44 |
% 51.84/18.44 | Instantiating formula (31) with all_285_7_623, all_788_0_3782, all_802_1_3804 and discharging atoms intruder_message(all_285_7_623) = all_802_1_3804, intruder_message(all_285_7_623) = all_788_0_3782, yields:
% 51.84/18.44 | (2540) all_802_1_3804 = all_788_0_3782
% 51.84/18.44 |
% 51.84/18.44 | Instantiating formula (31) with all_61_4_176, all_800_2_3802, 0 and discharging atoms intruder_message(all_61_4_176) = all_800_2_3802, intruder_message(all_61_4_176) = 0, yields:
% 51.84/18.44 | (2541) all_800_2_3802 = 0
% 51.84/18.44 |
% 51.84/18.44 | Instantiating formula (31) with an_a_nonce, all_806_2_3812, 0 and discharging atoms intruder_message(an_a_nonce) = all_806_2_3812, intruder_message(an_a_nonce) = 0, yields:
% 51.84/18.44 | (2542) all_806_2_3812 = 0
% 51.84/18.44 |
% 51.84/18.44 | Instantiating formula (31) with an_a_nonce, all_764_2_3741, all_806_2_3812 and discharging atoms intruder_message(an_a_nonce) = all_806_2_3812, intruder_message(an_a_nonce) = all_764_2_3741, yields:
% 51.84/18.44 | (2543) all_806_2_3812 = all_764_2_3741
% 51.84/18.44 |
% 51.84/18.44 | Instantiating formula (26) with all_375_1_791, all_766_0_3742, all_375_0_790 and discharging atoms b_holds(all_375_1_791) = all_766_0_3742, b_holds(all_375_1_791) = all_375_0_790, yields:
% 51.84/18.44 | (2544) all_766_0_3742 = all_375_0_790
% 51.84/18.44 |
% 51.84/18.44 | Instantiating formula (18) with all_285_7_623, all_786_6_3777, all_834_6_3867 and discharging atoms generate_expiration_time(all_285_7_623) = all_834_6_3867, generate_expiration_time(all_285_7_623) = all_786_6_3777, yields:
% 51.84/18.44 | (2545) all_834_6_3867 = all_786_6_3777
% 51.84/18.44 |
% 51.84/18.44 | Instantiating formula (15) with all_375_5_795, all_840_0_3876, all_375_4_794 and discharging atoms message(all_375_5_795) = all_840_0_3876, message(all_375_5_795) = all_375_4_794, yields:
% 51.84/18.44 | (2546) all_840_0_3876 = all_375_4_794
% 51.84/18.44 |
% 51.84/18.44 | Instantiating formula (55) with an_a_nonce, b, all_766_2_3744, all_285_1_617 and discharging atoms key(an_a_nonce, b) = all_766_2_3744, key(an_a_nonce, b) = all_285_1_617, yields:
% 51.84/18.44 | (2547) all_766_2_3744 = all_285_1_617
% 51.84/18.44 |
% 51.84/18.44 | Instantiating formula (55) with an_a_nonce, a, all_808_1_3814, all_375_1_791 and discharging atoms key(an_a_nonce, a) = all_808_1_3814, key(an_a_nonce, a) = all_375_1_791, yields:
% 51.84/18.44 | (2548) all_808_1_3814 = all_375_1_791
% 51.84/18.44 |
% 51.84/18.44 | Combining equations (2533,2534) yields a new equation:
% 51.84/18.44 | (2549) all_780_1_3763 = 0
% 51.84/18.44 |
% 51.84/18.44 | Combining equations (2521,2520) yields a new equation:
% 51.84/18.44 | (2550) all_818_1_3836 = 0
% 51.84/18.44 |
% 51.84/18.44 | Simplifying 2550 yields:
% 51.84/18.44 | (2551) all_818_1_3836 = 0
% 51.84/18.44 |
% 51.84/18.44 | Combining equations (2522,2524) yields a new equation:
% 51.84/18.44 | (2552) all_818_1_3836 = all_804_1_3807
% 51.84/18.44 |
% 51.84/18.44 | Simplifying 2552 yields:
% 51.84/18.44 | (2553) all_818_1_3836 = all_804_1_3807
% 51.84/18.44 |
% 51.84/18.44 | Combining equations (2530,2531) yields a new equation:
% 51.84/18.44 | (2554) all_816_1_3833 = 0
% 51.84/18.44 |
% 51.84/18.44 | Combining equations (2532,2531) yields a new equation:
% 51.84/18.44 | (2555) all_816_1_3833 = all_764_1_3740
% 51.84/18.44 |
% 51.84/18.44 | Combining equations (2536,2535) yields a new equation:
% 51.84/18.44 | (2556) all_836_0_3872 = all_800_0_3800
% 51.84/18.44 |
% 51.84/18.44 | Combining equations (2537,2535) yields a new equation:
% 51.84/18.44 | (2557) all_836_0_3872 = all_790_2_3787
% 51.84/18.44 |
% 51.84/18.44 | Combining equations (2557,2556) yields a new equation:
% 51.84/18.44 | (2558) all_800_0_3800 = all_790_2_3787
% 51.84/18.44 |
% 51.84/18.44 | Combining equations (2553,2523) yields a new equation:
% 51.84/18.44 | (2559) all_806_1_3811 = all_804_1_3807
% 51.84/18.44 |
% 51.84/18.44 | Combining equations (2551,2523) yields a new equation:
% 51.84/18.44 | (2560) all_806_1_3811 = 0
% 51.84/18.44 |
% 51.84/18.44 | Combining equations (2525,2523) yields a new equation:
% 51.84/18.44 | (2561) all_806_1_3811 = all_796_1_3795
% 51.84/18.44 |
% 51.84/18.44 | Combining equations (2554,2555) yields a new equation:
% 51.84/18.44 | (2562) all_764_1_3740 = 0
% 51.84/18.44 |
% 51.84/18.44 | Combining equations (2560,2559) yields a new equation:
% 51.84/18.44 | (2563) all_804_1_3807 = 0
% 51.84/18.44 |
% 51.84/18.44 | Combining equations (2561,2559) yields a new equation:
% 51.84/18.44 | (2564) all_804_1_3807 = all_796_1_3795
% 51.84/18.44 |
% 51.84/18.44 | Combining equations (2542,2543) yields a new equation:
% 51.84/18.44 | (2565) all_764_2_3741 = 0
% 51.84/18.44 |
% 51.84/18.44 | Combining equations (2564,2563) yields a new equation:
% 51.84/18.44 | (2566) all_796_1_3795 = 0
% 51.84/18.44 |
% 51.84/18.44 | Simplifying 2566 yields:
% 51.84/18.44 | (2567) all_796_1_3795 = 0
% 51.84/18.44 |
% 51.84/18.44 | Combining equations (2538,2540) yields a new equation:
% 51.84/18.44 | (2568) all_800_1_3801 = all_788_0_3782
% 51.84/18.44 |
% 51.84/18.44 | Simplifying 2568 yields:
% 51.84/18.44 | (2569) all_800_1_3801 = all_788_0_3782
% 51.84/18.44 |
% 51.84/18.44 | Combining equations (2539,2569) yields a new equation:
% 51.84/18.44 | (2570) all_790_0_3785 = all_788_0_3782
% 51.84/18.44 |
% 51.84/18.44 | Simplifying 2570 yields:
% 51.84/18.44 | (2571) all_790_0_3785 = all_788_0_3782
% 51.84/18.44 |
% 51.84/18.44 | Combining equations (2526,2567) yields a new equation:
% 51.84/18.44 | (2572) all_792_1_3789 = 0
% 51.84/18.44 |
% 51.84/18.44 | Simplifying 2572 yields:
% 51.84/18.44 | (2573) all_792_1_3789 = 0
% 51.84/18.44 |
% 51.84/18.44 | Combining equations (2527,2573) yields a new equation:
% 51.84/18.44 | (2574) all_792_2_3790 = 0
% 51.84/18.44 |
% 51.84/18.44 | Simplifying 2574 yields:
% 51.84/18.44 | (2575) all_792_2_3790 = 0
% 51.84/18.44 |
% 51.84/18.44 | Combining equations (2528,2575) yields a new equation:
% 51.84/18.44 | (2576) all_784_1_3768 = 0
% 51.84/18.44 |
% 51.84/18.44 | Simplifying 2576 yields:
% 51.84/18.44 | (2577) all_784_1_3768 = 0
% 51.84/18.44 |
% 51.84/18.44 | Combining equations (2529,2577) yields a new equation:
% 51.84/18.44 | (2578) all_772_1_3750 = 0
% 51.84/18.44 |
% 51.84/18.44 | Simplifying 2578 yields:
% 51.84/18.44 | (2579) all_772_1_3750 = 0
% 51.84/18.44 |
% 51.84/18.44 | Combining equations (2565,2543) yields a new equation:
% 51.84/18.44 | (2542) all_806_2_3812 = 0
% 51.84/18.44 |
% 51.84/18.44 | Combining equations (2563,2559) yields a new equation:
% 51.84/18.44 | (2560) all_806_1_3811 = 0
% 51.84/18.44 |
% 51.84/18.44 | Combining equations (2562,2555) yields a new equation:
% 51.84/18.44 | (2554) all_816_1_3833 = 0
% 51.84/18.44 |
% 51.84/18.45 | Combining equations (2558,2556) yields a new equation:
% 51.84/18.45 | (2557) all_836_0_3872 = all_790_2_3787
% 51.84/18.45 |
% 51.84/18.45 | Combining equations (2557,2535) yields a new equation:
% 51.84/18.45 | (2537) all_840_3_3879 = all_790_2_3787
% 51.84/18.45 |
% 51.84/18.45 | Combining equations (2554,2531) yields a new equation:
% 51.84/18.45 | (2530) all_840_2_3878 = 0
% 51.84/18.45 |
% 51.84/18.45 | Combining equations (2563,2524) yields a new equation:
% 51.84/18.45 | (2586) all_840_1_3877 = 0
% 51.84/18.45 |
% 51.84/18.45 | From (2547) and (2398) follows:
% 51.84/18.45 | (2587) intruder_holds(all_285_1_617) = all_766_1_3743
% 51.84/18.45 |
% 51.84/18.45 | From (2519) and (2476) follows:
% 51.84/18.45 | (2471) intruder_holds(all_285_1_617) = all_806_0_3810
% 51.84/18.45 |
% 51.84/18.45 | From (2579) and (2404) follows:
% 51.84/18.45 | (10) party_of_protocol(b) = 0
% 51.84/18.45 |
% 51.84/18.45 | From (2562) and (2394) follows:
% 51.84/18.45 | (43) party_of_protocol(a) = 0
% 51.84/18.45 |
% 51.84/18.45 | From (2549) and (2410) follows:
% 51.84/18.45 | (34) party_of_protocol(t) = 0
% 51.84/18.45 |
% 51.84/18.45 | From (2571) and (2439) follows:
% 51.84/18.45 | (2434) intruder_message(all_285_7_623) = all_788_0_3782
% 51.84/18.45 |
% 51.84/18.45 | From (2548) and (2477) follows:
% 51.84/18.45 | (2593) b_holds(all_375_1_791) = all_808_0_3813
% 51.84/18.45 |
% 51.84/18.45 | From (2544) and (2399) follows:
% 51.84/18.45 | (918) b_holds(all_375_1_791) = all_375_0_790
% 51.84/18.45 |
% 51.84/18.45 | From (2545) and (2492) follows:
% 51.84/18.45 | (2595) triple(all_63_4_187, all_285_7_623, all_786_6_3777) = all_834_5_3866
% 51.84/18.45 |
% 51.84/18.45 | From (2547) and (2400) follows:
% 51.84/18.45 | (716) key(an_a_nonce, b) = all_285_1_617
% 51.84/18.45 |
% 51.84/18.45 | From (2548) and (2478) follows:
% 51.84/18.45 | (917) key(an_a_nonce, a) = all_375_1_791
% 51.84/18.45 |
% 51.84/18.45 +-Applying beta-rule and splitting (2474), into two cases.
% 51.84/18.45 |-Branch one:
% 51.84/18.45 | (2598) ~ (all_806_1_3811 = 0)
% 51.84/18.45 |
% 51.84/18.45 | Equations (2560) can reduce 2598 to:
% 51.84/18.45 | (551) $false
% 51.84/18.45 |
% 51.84/18.45 |-The branch is then unsatisfiable
% 51.84/18.45 |-Branch two:
% 51.84/18.45 | (2560) all_806_1_3811 = 0
% 51.84/18.45 | (2601) ~ (all_806_2_3812 = 0) | all_806_0_3810 = 0
% 51.84/18.45 |
% 51.84/18.45 +-Applying beta-rule and splitting (2601), into two cases.
% 51.84/18.45 |-Branch one:
% 51.84/18.45 | (2602) ~ (all_806_2_3812 = 0)
% 51.84/18.45 |
% 51.84/18.45 | Equations (2542) can reduce 2602 to:
% 51.84/18.45 | (551) $false
% 51.84/18.45 |
% 51.84/18.45 |-The branch is then unsatisfiable
% 51.84/18.45 |-Branch two:
% 51.84/18.45 | (2542) all_806_2_3812 = 0
% 51.84/18.45 | (2605) all_806_0_3810 = 0
% 51.84/18.45 |
% 51.95/18.45 | Combining equations (2605,2519) yields a new equation:
% 51.95/18.45 | (2606) all_808_2_3815 = 0
% 51.95/18.45 |
% 51.95/18.45 | From (2605) and (2471) follows:
% 51.95/18.45 | (1467) intruder_holds(all_285_1_617) = 0
% 51.95/18.45 |
% 51.95/18.45 +-Applying beta-rule and splitting (2479), into two cases.
% 51.95/18.45 |-Branch one:
% 51.95/18.45 | (2608) ~ (all_808_0_3813 = 0)
% 51.95/18.45 |
% 51.95/18.45 +-Applying beta-rule and splitting (2396), into two cases.
% 51.95/18.45 |-Branch one:
% 51.95/18.45 | (2609) ~ (all_764_1_3740 = 0)
% 51.95/18.45 |
% 51.95/18.45 | Equations (2562) can reduce 2609 to:
% 51.95/18.45 | (551) $false
% 51.95/18.45 |
% 51.95/18.45 |-The branch is then unsatisfiable
% 51.95/18.45 |-Branch two:
% 51.95/18.45 | (2562) all_764_1_3740 = 0
% 51.95/18.45 | (2612) ~ (all_764_2_3741 = 0) | all_764_0_3739 = 0
% 51.95/18.45 |
% 51.95/18.45 +-Applying beta-rule and splitting (2612), into two cases.
% 51.95/18.45 |-Branch one:
% 51.95/18.45 | (2613) ~ (all_764_2_3741 = 0)
% 51.95/18.45 |
% 51.95/18.45 | Equations (2565) can reduce 2613 to:
% 51.95/18.45 | (551) $false
% 51.95/18.45 |
% 51.95/18.45 |-The branch is then unsatisfiable
% 51.95/18.45 |-Branch two:
% 51.95/18.45 | (2565) all_764_2_3741 = 0
% 51.95/18.45 | (2616) all_764_0_3739 = 0
% 51.95/18.45 |
% 51.95/18.45 | From (2616) and (2393) follows:
% 51.95/18.45 | (1461) intruder_holds(all_375_1_791) = 0
% 51.95/18.45 |
% 51.95/18.45 | Instantiating formula (37) with all_285_1_617, 0, all_766_1_3743 and discharging atoms intruder_holds(all_285_1_617) = all_766_1_3743, intruder_holds(all_285_1_617) = 0, yields:
% 51.95/18.45 | (2618) all_766_1_3743 = 0
% 51.95/18.45 |
% 51.95/18.45 | Instantiating formula (26) with all_375_1_791, all_808_0_3813, all_375_0_790 and discharging atoms b_holds(all_375_1_791) = all_808_0_3813, b_holds(all_375_1_791) = all_375_0_790, yields:
% 51.95/18.45 | (2619) all_808_0_3813 = all_375_0_790
% 51.95/18.45 |
% 51.95/18.45 | Equations (2619) can reduce 2608 to:
% 51.95/18.45 | (1471) ~ (all_375_0_790 = 0)
% 51.95/18.45 |
% 51.95/18.45 | From (2618) and (2587) follows:
% 51.95/18.45 | (1467) intruder_holds(all_285_1_617) = 0
% 51.95/18.45 |
% 51.95/18.45 +-Applying beta-rule and splitting (916), into two cases.
% 51.95/18.45 |-Branch one:
% 51.95/18.45 | (1473) ~ (all_375_2_792 = 0)
% 51.95/18.45 |
% 51.95/18.45 | Equations (1198) can reduce 1473 to:
% 51.95/18.45 | (551) $false
% 51.95/18.45 |
% 51.95/18.45 |-The branch is then unsatisfiable
% 51.95/18.45 |-Branch two:
% 51.95/18.45 | (1198) all_375_2_792 = 0
% 51.95/18.45 | (1476) ~ (all_375_4_794 = 0) | all_375_0_790 = 0
% 51.95/18.45 |
% 51.95/18.45 +-Applying beta-rule and splitting (1476), into two cases.
% 51.95/18.45 |-Branch one:
% 51.95/18.45 | (1477) ~ (all_375_4_794 = 0)
% 51.95/18.45 |
% 51.95/18.45 +-Applying beta-rule and splitting (2510), into two cases.
% 51.95/18.45 |-Branch one:
% 51.95/18.45 | (2627) ~ (all_840_1_3877 = 0)
% 51.95/18.45 |
% 51.95/18.45 | Equations (2586) can reduce 2627 to:
% 51.95/18.45 | (551) $false
% 51.95/18.45 |
% 51.95/18.45 |-The branch is then unsatisfiable
% 51.95/18.45 |-Branch two:
% 51.95/18.45 | (2586) all_840_1_3877 = 0
% 51.95/18.45 | (2630) ~ (all_840_2_3878 = 0) | ~ (all_840_3_3879 = 0) | all_840_0_3876 = 0
% 51.95/18.45 |
% 51.95/18.45 +-Applying beta-rule and splitting (2630), into two cases.
% 51.95/18.45 |-Branch one:
% 51.95/18.45 | (2631) ~ (all_840_2_3878 = 0)
% 51.95/18.45 |
% 51.95/18.45 | Equations (2530) can reduce 2631 to:
% 51.95/18.45 | (551) $false
% 51.95/18.45 |
% 51.95/18.45 |-The branch is then unsatisfiable
% 51.95/18.45 |-Branch two:
% 51.95/18.45 | (2530) all_840_2_3878 = 0
% 51.95/18.45 | (2634) ~ (all_840_3_3879 = 0) | all_840_0_3876 = 0
% 51.95/18.45 |
% 51.95/18.45 +-Applying beta-rule and splitting (2634), into two cases.
% 51.95/18.45 |-Branch one:
% 51.95/18.45 | (2635) ~ (all_840_3_3879 = 0)
% 51.95/18.45 |
% 51.95/18.45 | Equations (2537) can reduce 2635 to:
% 51.95/18.45 | (2636) ~ (all_790_2_3787 = 0)
% 51.95/18.45 |
% 51.95/18.45 +-Applying beta-rule and splitting (2458), into two cases.
% 51.95/18.45 |-Branch one:
% 51.95/18.45 | (2637) ~ (all_800_1_3801 = 0)
% 51.95/18.45 |
% 51.95/18.45 | Equations (2569) can reduce 2637 to:
% 51.95/18.45 | (2638) ~ (all_788_0_3782 = 0)
% 51.95/18.45 |
% 51.95/18.45 | Instantiating formula (63) with all_375_1_791, a, an_a_nonce, all_61_3_175 and discharging atoms intruder_holds(all_375_1_791) = 0, intruder_message(all_61_3_175) = 0, key(an_a_nonce, a) = all_375_1_791, yields:
% 51.95/18.45 | (1501) ? [v0] : ? [v1] : ? [v2] : (party_of_protocol(a) = v0 & intruder_message(v1) = v2 & encrypt(all_61_3_175, an_a_nonce) = v1 & ( ~ (v0 = 0) | v2 = 0))
% 51.95/18.45 |
% 51.95/18.45 | Instantiating formula (63) with all_375_1_791, a, an_a_nonce, all_61_7_179 and discharging atoms intruder_holds(all_375_1_791) = 0, intruder_message(all_61_7_179) = 0, key(an_a_nonce, a) = all_375_1_791, yields:
% 51.95/18.45 | (1503) ? [v0] : ? [v1] : ? [v2] : (party_of_protocol(a) = v0 & intruder_message(v1) = v2 & encrypt(all_61_7_179, an_a_nonce) = v1 & ( ~ (v0 = 0) | v2 = 0))
% 51.95/18.45 |
% 51.95/18.45 | Instantiating formula (45) with all_788_0_3782, all_285_7_623, all_375_1_791, a, an_a_nonce, all_61_7_179 and discharging atoms intruder_holds(all_375_1_791) = 0, intruder_message(all_285_7_623) = all_788_0_3782, encrypt(all_61_7_179, an_a_nonce) = all_285_7_623, key(an_a_nonce, a) = all_375_1_791, yields:
% 51.95/18.45 | (2641) all_788_0_3782 = 0 | ? [v0] : ? [v1] : (party_of_protocol(a) = v1 & intruder_message(all_61_7_179) = v0 & ( ~ (v1 = 0) | ~ (v0 = 0)))
% 51.95/18.45 |
% 51.95/18.45 | Instantiating formula (45) with all_788_0_3782, all_285_7_623, all_285_1_617, b, an_a_nonce, all_61_7_179 and discharging atoms intruder_holds(all_285_1_617) = 0, intruder_message(all_285_7_623) = all_788_0_3782, encrypt(all_61_7_179, an_a_nonce) = all_285_7_623, key(an_a_nonce, b) = all_285_1_617, yields:
% 51.95/18.46 | (2642) all_788_0_3782 = 0 | ? [v0] : ? [v1] : (party_of_protocol(b) = v1 & intruder_message(all_61_7_179) = v0 & ( ~ (v1 = 0) | ~ (v0 = 0)))
% 51.95/18.46 |
% 51.95/18.46 | Instantiating formula (7) with all_788_0_3782, all_285_7_623, b, an_a_nonce, all_61_7_179 and discharging atoms party_of_protocol(b) = 0, intruder_message(all_285_7_623) = all_788_0_3782, encrypt(all_61_7_179, an_a_nonce) = all_285_7_623, yields:
% 51.95/18.46 | (2643) all_788_0_3782 = 0 | ? [v0] : ? [v1] : ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_61_7_179) = v0 & key(an_a_nonce, b) = v1 & ( ~ (v2 = 0) | ~ (v0 = 0)))
% 51.95/18.46 |
% 51.95/18.46 | Instantiating formula (7) with all_788_0_3782, all_285_7_623, a, an_a_nonce, all_61_7_179 and discharging atoms party_of_protocol(a) = 0, intruder_message(all_285_7_623) = all_788_0_3782, encrypt(all_61_7_179, an_a_nonce) = all_285_7_623, yields:
% 51.95/18.46 | (2644) all_788_0_3782 = 0 | ? [v0] : ? [v1] : ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_61_7_179) = v0 & key(an_a_nonce, a) = v1 & ( ~ (v2 = 0) | ~ (v0 = 0)))
% 51.95/18.46 |
% 51.95/18.46 | Instantiating formula (7) with all_788_0_3782, all_285_7_623, t, an_a_nonce, all_61_7_179 and discharging atoms party_of_protocol(t) = 0, intruder_message(all_285_7_623) = all_788_0_3782, encrypt(all_61_7_179, an_a_nonce) = all_285_7_623, yields:
% 51.95/18.46 | (2645) all_788_0_3782 = 0 | ? [v0] : ? [v1] : ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_61_7_179) = v0 & key(an_a_nonce, t) = v1 & ( ~ (v2 = 0) | ~ (v0 = 0)))
% 51.95/18.46 |
% 51.95/18.46 | Instantiating formula (40) with all_834_5_3866, all_786_6_3777, all_285_7_623, all_63_4_187 and discharging atoms triple(all_63_4_187, all_285_7_623, all_786_6_3777) = all_834_5_3866, yields:
% 51.95/18.46 | (2646) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (intruder_message(all_834_5_3866) = v3 & intruder_message(all_786_6_3777) = v2 & intruder_message(all_285_7_623) = v1 & intruder_message(all_63_4_187) = v0 & ( ~ (v2 = 0) | ~ (v1 = 0) | ~ (v0 = 0) | v3 = 0))
% 51.95/18.46 |
% 51.95/18.46 | Instantiating formula (68) with all_834_5_3866, all_786_6_3777, all_285_7_623, all_63_4_187 and discharging atoms triple(all_63_4_187, all_285_7_623, all_786_6_3777) = all_834_5_3866, yields:
% 51.95/18.46 | (2647) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (intruder_message(all_834_5_3866) = v0 & intruder_message(all_786_6_3777) = v3 & intruder_message(all_285_7_623) = v2 & intruder_message(all_63_4_187) = v1 & ( ~ (v0 = 0) | (v3 = 0 & v2 = 0 & v1 = 0)))
% 51.95/18.46 |
% 51.95/18.46 | Instantiating formula (40) with all_786_5_3776, all_786_6_3777, all_285_7_623, all_61_4_176 and discharging atoms triple(all_61_4_176, all_285_7_623, all_786_6_3777) = all_786_5_3776, yields:
% 51.95/18.46 | (2648) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (intruder_message(all_786_5_3776) = v3 & intruder_message(all_786_6_3777) = v2 & intruder_message(all_285_7_623) = v1 & intruder_message(all_61_4_176) = v0 & ( ~ (v2 = 0) | ~ (v1 = 0) | ~ (v0 = 0) | v3 = 0))
% 51.95/18.46 |
% 51.95/18.46 | Instantiating formula (68) with all_786_5_3776, all_786_6_3777, all_285_7_623, all_61_4_176 and discharging atoms triple(all_61_4_176, all_285_7_623, all_786_6_3777) = all_786_5_3776, yields:
% 51.95/18.46 | (2649) ? [v0] : ? [v1] : ? [v2] : ? [v3] : (intruder_message(all_786_5_3776) = v0 & intruder_message(all_786_6_3777) = v3 & intruder_message(all_285_7_623) = v2 & intruder_message(all_61_4_176) = v1 & ( ~ (v0 = 0) | (v3 = 0 & v2 = 0 & v1 = 0)))
% 51.95/18.46 |
% 51.95/18.46 | Instantiating (2647) with all_1371_0_4084, all_1371_1_4085, all_1371_2_4086, all_1371_3_4087 yields:
% 51.95/18.46 | (2650) intruder_message(all_834_5_3866) = all_1371_3_4087 & intruder_message(all_786_6_3777) = all_1371_0_4084 & intruder_message(all_285_7_623) = all_1371_1_4085 & intruder_message(all_63_4_187) = all_1371_2_4086 & ( ~ (all_1371_3_4087 = 0) | (all_1371_0_4084 = 0 & all_1371_1_4085 = 0 & all_1371_2_4086 = 0))
% 51.95/18.46 |
% 51.95/18.46 | Applying alpha-rule on (2650) yields:
% 51.95/18.46 | (2651) ~ (all_1371_3_4087 = 0) | (all_1371_0_4084 = 0 & all_1371_1_4085 = 0 & all_1371_2_4086 = 0)
% 51.95/18.46 | (2652) intruder_message(all_786_6_3777) = all_1371_0_4084
% 51.95/18.46 | (2653) intruder_message(all_834_5_3866) = all_1371_3_4087
% 51.95/18.46 | (2654) intruder_message(all_63_4_187) = all_1371_2_4086
% 51.95/18.46 | (2655) intruder_message(all_285_7_623) = all_1371_1_4085
% 51.95/18.46 |
% 51.95/18.46 | Instantiating (2646) with all_1375_0_4098, all_1375_1_4099, all_1375_2_4100, all_1375_3_4101 yields:
% 51.95/18.46 | (2656) intruder_message(all_834_5_3866) = all_1375_0_4098 & intruder_message(all_786_6_3777) = all_1375_1_4099 & intruder_message(all_285_7_623) = all_1375_2_4100 & intruder_message(all_63_4_187) = all_1375_3_4101 & ( ~ (all_1375_1_4099 = 0) | ~ (all_1375_2_4100 = 0) | ~ (all_1375_3_4101 = 0) | all_1375_0_4098 = 0)
% 51.95/18.46 |
% 51.95/18.46 | Applying alpha-rule on (2656) yields:
% 51.95/18.46 | (2657) ~ (all_1375_1_4099 = 0) | ~ (all_1375_2_4100 = 0) | ~ (all_1375_3_4101 = 0) | all_1375_0_4098 = 0
% 51.95/18.46 | (2658) intruder_message(all_63_4_187) = all_1375_3_4101
% 51.95/18.46 | (2659) intruder_message(all_285_7_623) = all_1375_2_4100
% 51.95/18.46 | (2660) intruder_message(all_786_6_3777) = all_1375_1_4099
% 51.95/18.46 | (2661) intruder_message(all_834_5_3866) = all_1375_0_4098
% 51.95/18.46 |
% 51.95/18.46 | Instantiating (2649) with all_1425_0_4216, all_1425_1_4217, all_1425_2_4218, all_1425_3_4219 yields:
% 51.95/18.46 | (2662) intruder_message(all_786_5_3776) = all_1425_3_4219 & intruder_message(all_786_6_3777) = all_1425_0_4216 & intruder_message(all_285_7_623) = all_1425_1_4217 & intruder_message(all_61_4_176) = all_1425_2_4218 & ( ~ (all_1425_3_4219 = 0) | (all_1425_0_4216 = 0 & all_1425_1_4217 = 0 & all_1425_2_4218 = 0))
% 51.95/18.46 |
% 51.95/18.46 | Applying alpha-rule on (2662) yields:
% 51.95/18.46 | (2663) intruder_message(all_285_7_623) = all_1425_1_4217
% 51.95/18.46 | (2664) intruder_message(all_61_4_176) = all_1425_2_4218
% 51.95/18.46 | (2665) intruder_message(all_786_5_3776) = all_1425_3_4219
% 51.95/18.46 | (2666) ~ (all_1425_3_4219 = 0) | (all_1425_0_4216 = 0 & all_1425_1_4217 = 0 & all_1425_2_4218 = 0)
% 51.95/18.46 | (2667) intruder_message(all_786_6_3777) = all_1425_0_4216
% 51.95/18.46 |
% 51.95/18.46 | Instantiating (2648) with all_1427_0_4220, all_1427_1_4221, all_1427_2_4222, all_1427_3_4223 yields:
% 51.95/18.46 | (2668) intruder_message(all_786_5_3776) = all_1427_0_4220 & intruder_message(all_786_6_3777) = all_1427_1_4221 & intruder_message(all_285_7_623) = all_1427_2_4222 & intruder_message(all_61_4_176) = all_1427_3_4223 & ( ~ (all_1427_1_4221 = 0) | ~ (all_1427_2_4222 = 0) | ~ (all_1427_3_4223 = 0) | all_1427_0_4220 = 0)
% 51.95/18.46 |
% 51.95/18.46 | Applying alpha-rule on (2668) yields:
% 51.95/18.46 | (2669) ~ (all_1427_1_4221 = 0) | ~ (all_1427_2_4222 = 0) | ~ (all_1427_3_4223 = 0) | all_1427_0_4220 = 0
% 51.95/18.46 | (2670) intruder_message(all_786_5_3776) = all_1427_0_4220
% 51.95/18.46 | (2671) intruder_message(all_786_6_3777) = all_1427_1_4221
% 51.95/18.46 | (2672) intruder_message(all_61_4_176) = all_1427_3_4223
% 51.95/18.46 | (2673) intruder_message(all_285_7_623) = all_1427_2_4222
% 51.95/18.46 |
% 51.95/18.46 | Instantiating (1503) with all_1475_0_4321, all_1475_1_4322, all_1475_2_4323 yields:
% 51.95/18.46 | (2674) party_of_protocol(a) = all_1475_2_4323 & intruder_message(all_1475_1_4322) = all_1475_0_4321 & encrypt(all_61_7_179, an_a_nonce) = all_1475_1_4322 & ( ~ (all_1475_2_4323 = 0) | all_1475_0_4321 = 0)
% 51.95/18.46 |
% 51.95/18.46 | Applying alpha-rule on (2674) yields:
% 51.95/18.46 | (2675) party_of_protocol(a) = all_1475_2_4323
% 51.95/18.46 | (2676) intruder_message(all_1475_1_4322) = all_1475_0_4321
% 51.95/18.46 | (2677) encrypt(all_61_7_179, an_a_nonce) = all_1475_1_4322
% 51.95/18.46 | (2678) ~ (all_1475_2_4323 = 0) | all_1475_0_4321 = 0
% 51.95/18.46 |
% 51.95/18.46 | Instantiating (1501) with all_1489_0_4342, all_1489_1_4343, all_1489_2_4344 yields:
% 51.95/18.46 | (2679) party_of_protocol(a) = all_1489_2_4344 & intruder_message(all_1489_1_4343) = all_1489_0_4342 & encrypt(all_61_3_175, an_a_nonce) = all_1489_1_4343 & ( ~ (all_1489_2_4344 = 0) | all_1489_0_4342 = 0)
% 51.95/18.46 |
% 51.95/18.46 | Applying alpha-rule on (2679) yields:
% 51.95/18.46 | (2680) party_of_protocol(a) = all_1489_2_4344
% 51.95/18.46 | (2681) intruder_message(all_1489_1_4343) = all_1489_0_4342
% 51.95/18.46 | (2682) encrypt(all_61_3_175, an_a_nonce) = all_1489_1_4343
% 51.95/18.46 | (2683) ~ (all_1489_2_4344 = 0) | all_1489_0_4342 = 0
% 51.95/18.46 |
% 51.95/18.46 +-Applying beta-rule and splitting (2644), into two cases.
% 51.95/18.46 |-Branch one:
% 51.95/18.46 | (2684) all_788_0_3782 = 0
% 51.95/18.46 |
% 51.95/18.46 | Equations (2684) can reduce 2638 to:
% 51.95/18.46 | (551) $false
% 51.95/18.46 |
% 51.95/18.46 |-The branch is then unsatisfiable
% 51.95/18.46 |-Branch two:
% 51.95/18.46 | (2638) ~ (all_788_0_3782 = 0)
% 51.95/18.46 | (1631) ? [v0] : ? [v1] : ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_61_7_179) = v0 & key(an_a_nonce, a) = v1 & ( ~ (v2 = 0) | ~ (v0 = 0)))
% 51.95/18.46 |
% 51.95/18.46 +-Applying beta-rule and splitting (2643), into two cases.
% 51.95/18.46 |-Branch one:
% 51.95/18.46 | (2684) all_788_0_3782 = 0
% 51.95/18.46 |
% 51.95/18.46 | Equations (2684) can reduce 2638 to:
% 51.95/18.46 | (551) $false
% 51.95/18.46 |
% 51.95/18.46 |-The branch is then unsatisfiable
% 51.95/18.46 |-Branch two:
% 51.95/18.46 | (2638) ~ (all_788_0_3782 = 0)
% 51.95/18.46 | (1639) ? [v0] : ? [v1] : ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_61_7_179) = v0 & key(an_a_nonce, b) = v1 & ( ~ (v2 = 0) | ~ (v0 = 0)))
% 51.95/18.46 |
% 51.95/18.46 +-Applying beta-rule and splitting (2645), into two cases.
% 51.95/18.46 |-Branch one:
% 51.95/18.46 | (2684) all_788_0_3782 = 0
% 51.95/18.46 |
% 51.95/18.46 | Equations (2684) can reduce 2638 to:
% 51.95/18.46 | (551) $false
% 51.95/18.46 |
% 51.95/18.46 |-The branch is then unsatisfiable
% 51.95/18.46 |-Branch two:
% 51.95/18.46 | (2638) ~ (all_788_0_3782 = 0)
% 51.95/18.46 | (1635) ? [v0] : ? [v1] : ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_61_7_179) = v0 & key(an_a_nonce, t) = v1 & ( ~ (v2 = 0) | ~ (v0 = 0)))
% 51.95/18.46 |
% 51.95/18.46 | Instantiating formula (66) with a, all_1489_2_4344, 0 and discharging atoms party_of_protocol(a) = all_1489_2_4344, party_of_protocol(a) = 0, yields:
% 51.95/18.47 | (2696) all_1489_2_4344 = 0
% 51.95/18.47 |
% 51.95/18.47 | Instantiating formula (66) with a, all_1475_2_4323, all_1489_2_4344 and discharging atoms party_of_protocol(a) = all_1489_2_4344, party_of_protocol(a) = all_1475_2_4323, yields:
% 51.95/18.47 | (2697) all_1489_2_4344 = all_1475_2_4323
% 51.95/18.47 |
% 51.95/18.47 | Instantiating formula (31) with all_285_7_623, all_1427_2_4222, all_788_0_3782 and discharging atoms intruder_message(all_285_7_623) = all_1427_2_4222, intruder_message(all_285_7_623) = all_788_0_3782, yields:
% 51.95/18.47 | (2698) all_1427_2_4222 = all_788_0_3782
% 51.95/18.47 |
% 51.95/18.47 | Instantiating formula (31) with all_285_7_623, all_1375_2_4100, all_1427_2_4222 and discharging atoms intruder_message(all_285_7_623) = all_1427_2_4222, intruder_message(all_285_7_623) = all_1375_2_4100, yields:
% 51.95/18.47 | (2699) all_1427_2_4222 = all_1375_2_4100
% 51.95/18.47 |
% 51.95/18.47 | Instantiating formula (31) with all_285_7_623, all_1375_2_4100, all_1425_1_4217 and discharging atoms intruder_message(all_285_7_623) = all_1425_1_4217, intruder_message(all_285_7_623) = all_1375_2_4100, yields:
% 51.95/18.47 | (2700) all_1425_1_4217 = all_1375_2_4100
% 51.95/18.47 |
% 51.95/18.47 | Instantiating formula (31) with all_285_7_623, all_1371_1_4085, all_1425_1_4217 and discharging atoms intruder_message(all_285_7_623) = all_1425_1_4217, intruder_message(all_285_7_623) = all_1371_1_4085, yields:
% 51.95/18.47 | (2701) all_1425_1_4217 = all_1371_1_4085
% 51.95/18.47 |
% 51.95/18.47 | Instantiating formula (8) with all_61_7_179, an_a_nonce, all_1475_1_4322, all_285_7_623 and discharging atoms encrypt(all_61_7_179, an_a_nonce) = all_1475_1_4322, encrypt(all_61_7_179, an_a_nonce) = all_285_7_623, yields:
% 51.95/18.47 | (2702) all_1475_1_4322 = all_285_7_623
% 51.95/18.47 |
% 51.95/18.47 | Combining equations (2697,2696) yields a new equation:
% 51.95/18.47 | (2703) all_1475_2_4323 = 0
% 51.95/18.47 |
% 51.95/18.47 | Simplifying 2703 yields:
% 51.95/18.47 | (2704) all_1475_2_4323 = 0
% 51.95/18.47 |
% 51.95/18.47 | Combining equations (2699,2698) yields a new equation:
% 51.95/18.47 | (2705) all_1375_2_4100 = all_788_0_3782
% 51.95/18.47 |
% 51.95/18.47 | Simplifying 2705 yields:
% 51.95/18.47 | (2706) all_1375_2_4100 = all_788_0_3782
% 51.95/18.47 |
% 51.95/18.47 | Combining equations (2700,2701) yields a new equation:
% 51.95/18.47 | (2707) all_1375_2_4100 = all_1371_1_4085
% 51.95/18.47 |
% 51.95/18.47 | Simplifying 2707 yields:
% 51.95/18.47 | (2708) all_1375_2_4100 = all_1371_1_4085
% 51.95/18.47 |
% 51.95/18.47 | Combining equations (2708,2706) yields a new equation:
% 51.95/18.47 | (2709) all_1371_1_4085 = all_788_0_3782
% 51.95/18.47 |
% 51.95/18.47 | Simplifying 2709 yields:
% 51.95/18.47 | (2710) all_1371_1_4085 = all_788_0_3782
% 51.95/18.47 |
% 51.95/18.47 | From (2702) and (2676) follows:
% 51.95/18.47 | (2711) intruder_message(all_285_7_623) = all_1475_0_4321
% 51.95/18.47 |
% 51.95/18.47 | From (2710) and (2655) follows:
% 51.95/18.47 | (2434) intruder_message(all_285_7_623) = all_788_0_3782
% 51.95/18.47 |
% 51.95/18.47 +-Applying beta-rule and splitting (2641), into two cases.
% 51.95/18.47 |-Branch one:
% 51.95/18.47 | (2684) all_788_0_3782 = 0
% 51.95/18.47 |
% 51.95/18.47 | Equations (2684) can reduce 2638 to:
% 51.95/18.47 | (551) $false
% 51.95/18.47 |
% 51.95/18.47 |-The branch is then unsatisfiable
% 51.95/18.47 |-Branch two:
% 51.95/18.47 | (2638) ~ (all_788_0_3782 = 0)
% 51.95/18.47 | (1703) ? [v0] : ? [v1] : (party_of_protocol(a) = v1 & intruder_message(all_61_7_179) = v0 & ( ~ (v1 = 0) | ~ (v0 = 0)))
% 51.95/18.47 |
% 51.95/18.47 +-Applying beta-rule and splitting (2678), into two cases.
% 51.95/18.47 |-Branch one:
% 51.95/18.47 | (2717) ~ (all_1475_2_4323 = 0)
% 51.95/18.47 |
% 51.95/18.47 | Equations (2704) can reduce 2717 to:
% 51.95/18.47 | (551) $false
% 51.95/18.47 |
% 51.95/18.47 |-The branch is then unsatisfiable
% 51.95/18.47 |-Branch two:
% 51.95/18.47 | (2704) all_1475_2_4323 = 0
% 51.95/18.47 | (2720) all_1475_0_4321 = 0
% 51.95/18.47 |
% 51.95/18.47 | From (2720) and (2711) follows:
% 51.95/18.47 | (1712) intruder_message(all_285_7_623) = 0
% 51.95/18.47 |
% 51.95/18.47 +-Applying beta-rule and splitting (2642), into two cases.
% 51.95/18.47 |-Branch one:
% 51.95/18.47 | (2684) all_788_0_3782 = 0
% 51.95/18.47 |
% 51.95/18.47 | Equations (2684) can reduce 2638 to:
% 51.95/18.47 | (551) $false
% 51.95/18.47 |
% 51.95/18.47 |-The branch is then unsatisfiable
% 51.95/18.47 |-Branch two:
% 51.95/18.47 | (2638) ~ (all_788_0_3782 = 0)
% 51.95/18.47 | (1707) ? [v0] : ? [v1] : (party_of_protocol(b) = v1 & intruder_message(all_61_7_179) = v0 & ( ~ (v1 = 0) | ~ (v0 = 0)))
% 51.95/18.47 |
% 51.95/18.47 | Instantiating formula (31) with all_285_7_623, 0, all_788_0_3782 and discharging atoms intruder_message(all_285_7_623) = all_788_0_3782, intruder_message(all_285_7_623) = 0, yields:
% 51.95/18.47 | (2684) all_788_0_3782 = 0
% 51.95/18.47 |
% 51.95/18.47 | Equations (2684) can reduce 2638 to:
% 51.95/18.47 | (551) $false
% 51.95/18.47 |
% 51.95/18.47 |-The branch is then unsatisfiable
% 51.95/18.47 |-Branch two:
% 51.95/18.47 | (2728) all_800_1_3801 = 0
% 51.95/18.47 | (2729) ~ (all_800_2_3802 = 0) | all_800_0_3800 = 0
% 51.95/18.47 |
% 51.95/18.47 +-Applying beta-rule and splitting (2729), into two cases.
% 51.95/18.47 |-Branch one:
% 51.95/18.47 | (2730) ~ (all_800_2_3802 = 0)
% 51.95/18.47 |
% 51.95/18.47 | Equations (2541) can reduce 2730 to:
% 51.95/18.47 | (551) $false
% 51.95/18.47 |
% 51.95/18.47 |-The branch is then unsatisfiable
% 51.95/18.47 |-Branch two:
% 51.95/18.47 | (2541) all_800_2_3802 = 0
% 51.95/18.47 | (2733) all_800_0_3800 = 0
% 51.95/18.47 |
% 51.95/18.47 | Combining equations (2558,2733) yields a new equation:
% 51.95/18.47 | (2734) all_790_2_3787 = 0
% 51.95/18.47 |
% 51.95/18.47 | Simplifying 2734 yields:
% 51.95/18.47 | (2735) all_790_2_3787 = 0
% 51.95/18.47 |
% 51.95/18.47 | Equations (2735) can reduce 2636 to:
% 51.95/18.47 | (551) $false
% 51.95/18.47 |
% 51.95/18.47 |-The branch is then unsatisfiable
% 51.95/18.47 |-Branch two:
% 51.95/18.47 | (2737) all_840_3_3879 = 0
% 51.95/18.47 | (2738) all_840_0_3876 = 0
% 51.95/18.47 |
% 51.95/18.47 | Combining equations (2738,2546) yields a new equation:
% 51.95/18.47 | (1948) all_375_4_794 = 0
% 51.95/18.47 |
% 51.95/18.47 | Equations (1948) can reduce 1477 to:
% 51.95/18.47 | (551) $false
% 51.95/18.47 |
% 51.95/18.47 |-The branch is then unsatisfiable
% 51.95/18.47 |-Branch two:
% 51.95/18.47 | (1948) all_375_4_794 = 0
% 51.95/18.47 | (1951) all_375_0_790 = 0
% 51.95/18.47 |
% 51.95/18.47 | Equations (1951) can reduce 1471 to:
% 51.95/18.47 | (551) $false
% 51.95/18.47 |
% 51.95/18.47 |-The branch is then unsatisfiable
% 51.95/18.47 |-Branch two:
% 51.95/18.47 | (2744) all_808_0_3813 = 0
% 51.95/18.47 | (2745) ~ (all_808_2_3815 = 0)
% 51.95/18.47 |
% 51.95/18.47 | Equations (2606) can reduce 2745 to:
% 51.95/18.47 | (551) $false
% 51.95/18.47 |
% 51.95/18.47 |-The branch is then unsatisfiable
% 51.95/18.48 % SZS output end Proof for theBenchmark
% 51.95/18.48
% 51.95/18.48 17878ms
%------------------------------------------------------------------------------