TSTP Solution File: SWV014+1 by ePrincess---1.0

View Problem - Process Solution

%------------------------------------------------------------------------------
% File     : ePrincess---1.0
% Problem  : SWV014+1 : TPTP v8.1.0. Released v2.4.0.
% Transfm  : none
% Format   : tptp:raw
% Command  : ePrincess-casc -timeout=%d %s

% Computer : n024.cluster.edu
% Model    : x86_64 x86_64
% CPU      : Intel(R) Xeon(R) CPU E5-2620 v4 2.10GHz
% Memory   : 8042.1875MB
% OS       : Linux 3.10.0-693.el7.x86_64
% CPULimit : 300s
% WCLimit  : 600s
% DateTime : Wed Jul 20 17:49:42 EDT 2022

% Result   : Theorem 29.99s 9.19s
% Output   : Proof 51.95s
% Verified : 
% SZS Type : -

% Comments : 
%------------------------------------------------------------------------------
%----WARNING: Could not form TPTP format derivation
%------------------------------------------------------------------------------
%----ORIGINAL SYSTEM OUTPUT
% 0.01/0.12  % Problem  : SWV014+1 : TPTP v8.1.0. Released v2.4.0.
% 0.13/0.13  % Command  : ePrincess-casc -timeout=%d %s
% 0.13/0.34  % Computer : n024.cluster.edu
% 0.13/0.34  % Model    : x86_64 x86_64
% 0.13/0.34  % CPU      : Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz
% 0.13/0.34  % Memory   : 8042.1875MB
% 0.13/0.34  % OS       : Linux 3.10.0-693.el7.x86_64
% 0.13/0.34  % CPULimit : 300
% 0.13/0.34  % WCLimit  : 600
% 0.13/0.34  % DateTime : Wed Jun 15 09:19:33 EDT 2022
% 0.13/0.34  % CPUTime  : 
% 0.56/0.59          ____       _                          
% 0.56/0.59    ___  / __ \_____(_)___  ________  __________
% 0.56/0.59   / _ \/ /_/ / ___/ / __ \/ ___/ _ \/ ___/ ___/
% 0.56/0.59  /  __/ ____/ /  / / / / / /__/  __(__  |__  ) 
% 0.56/0.59  \___/_/   /_/  /_/_/ /_/\___/\___/____/____/  
% 0.56/0.59  
% 0.56/0.59  A Theorem Prover for First-Order Logic
% 0.62/0.59  (ePrincess v.1.0)
% 0.62/0.59  
% 0.62/0.59  (c) Philipp Rümmer, 2009-2015
% 0.62/0.59  (c) Peter Backeman, 2014-2015
% 0.62/0.59  (contributions by Angelo Brillout, Peter Baumgartner)
% 0.62/0.59  Free software under GNU Lesser General Public License (LGPL).
% 0.62/0.59  Bug reports to peter@backeman.se
% 0.62/0.59  
% 0.62/0.59  For more information, visit http://user.uu.se/~petba168/breu/
% 0.62/0.59  
% 0.62/0.59  Loading /export/starexec/sandbox/benchmark/theBenchmark.p ...
% 0.79/0.64  Prover 0: Options:  -triggersInConjecture -genTotalityAxioms -tightFunctionScopes -clausifier=simple -reverseFunctionalityPropagation +boolFunsAsPreds -triggerStrategy=allMaximal -resolutionMethod=nonUnifying +ignoreQuantifiers -generateTriggers=all
% 1.56/0.93  Prover 0: Preprocessing ...
% 2.43/1.20  Prover 0: Warning: ignoring some quantifiers
% 2.57/1.23  Prover 0: Constructing countermodel ...
% 16.16/5.93  Prover 1: Options:  +triggersInConjecture -genTotalityAxioms -tightFunctionScopes -clausifier=simple +reverseFunctionalityPropagation -boolFunsAsPreds -triggerStrategy=maximal -resolutionMethod=normal +ignoreQuantifiers -generateTriggers=all
% 16.44/5.98  Prover 1: Preprocessing ...
% 16.74/6.11  Prover 1: Constructing countermodel ...
% 19.05/6.57  Prover 1: gave up
% 19.05/6.57  Prover 2: Options:  +triggersInConjecture +genTotalityAxioms +tightFunctionScopes -clausifier=simple -reverseFunctionalityPropagation -boolFunsAsPreds -triggerStrategy=allUni -resolutionMethod=nonUnifying +ignoreQuantifiers -generateTriggers=all
% 19.05/6.59  Prover 2: Preprocessing ...
% 19.36/6.65  Prover 2: Warning: ignoring some quantifiers
% 19.36/6.66  Prover 2: Constructing countermodel ...
% 26.27/8.28  Prover 3: Options:  -triggersInConjecture -genTotalityAxioms +tightFunctionScopes -clausifier=simple +reverseFunctionalityPropagation +boolFunsAsPreds -triggerStrategy=maximal -resolutionMethod=nonUnifying +ignoreQuantifiers -generateTriggers=all
% 26.39/8.32  Prover 3: Preprocessing ...
% 26.56/8.37  Prover 3: Warning: ignoring some quantifiers
% 26.56/8.37  Prover 3: Constructing countermodel ...
% 26.99/8.45  Prover 3: gave up
% 26.99/8.45  Prover 4: Options:  +triggersInConjecture -genTotalityAxioms -tightFunctionScopes -clausifier=simple -reverseFunctionalityPropagation -boolFunsAsPreds -triggerStrategy=allUni -resolutionMethod=nonUnifying +ignoreQuantifiers -generateTriggers=complete
% 26.99/8.46  Prover 4: Preprocessing ...
% 27.29/8.54  Prover 4: Warning: ignoring some quantifiers
% 27.29/8.54  Prover 4: Constructing countermodel ...
% 29.99/9.19  Prover 4: proved (743ms)
% 29.99/9.19  Prover 0: stopped
% 29.99/9.19  Prover 2: stopped
% 29.99/9.19  
% 29.99/9.19  No countermodel exists, formula is valid
% 29.99/9.19  % SZS status Theorem for theBenchmark
% 29.99/9.19  
% 29.99/9.19  Generating proof ... Warning: ignoring some quantifiers
% 49.68/17.92  found it (size 1678)
% 49.68/17.92  
% 49.68/17.92  % SZS output start Proof for theBenchmark
% 49.68/17.92  Assumed formulas after preprocessing and simplification: 
% 49.68/17.92  | (0)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] :  ? [v4] :  ? [v5] :  ? [v6] : (party_of_protocol(b) = 0 & party_of_protocol(a) = 0 & party_of_protocol(t) = 0 & t_holds(v1) = 0 & t_holds(v0) = 0 & a_nonce(an_a_nonce) = 0 & b_holds(v2) = 0 & fresh_to_b(an_a_nonce) = 0 & a_stored(v3) = 0 & pair(b, an_a_nonce) = v3 & pair(a, an_a_nonce) = v4 & sent(a, b, v4) = v5 & message(v5) = 0 & key(bt, b) = v0 & key(bt, t) = v2 & key(at, a) = v1 & key(at, t) = v6 & a_holds(v6) = 0 &  ! [v7] :  ! [v8] :  ! [v9] :  ! [v10] :  ! [v11] :  ! [v12] :  ! [v13] :  ! [v14] :  ! [v15] :  ! [v16] :  ! [v17] :  ! [v18] :  ! [v19] : ( ~ (generate_key(v10) = v14) |  ~ (quadruple(v7, v10, v14, v11) = v15) |  ~ (triple(v16, v18, v8) = v19) |  ~ (triple(v9, v14, v11) = v17) |  ~ (encrypt(v17, v12) = v18) |  ~ (encrypt(v15, v13) = v16) |  ? [v20] :  ? [v21] :  ? [v22] :  ? [v23] :  ? [v24] :  ? [v25] :  ? [v26] :  ? [v27] :  ? [v28] :  ? [v29] :  ? [v30] :  ? [v31] : (t_holds(v27) = v28 & t_holds(v25) = v26 & a_nonce(v10) = v29 & triple(v9, v10, v11) = v20 & triple(v7, v8, v21) = v22 & encrypt(v20, v12) = v21 & sent(v7, t, v22) = v23 & sent(t, v9, v19) = v30 & message(v30) = v31 & message(v23) = v24 & key(v13, v9) = v27 & key(v12, v7) = v25 & ( ~ (v29 = 0) |  ~ (v28 = 0) |  ~ (v26 = 0) |  ~ (v24 = 0) | v31 = 0))) &  ! [v7] :  ! [v8] :  ! [v9] :  ! [v10] :  ! [v11] :  ! [v12] :  ! [v13] :  ! [v14] :  ! [v15] : ( ~ (quadruple(v11, v12, v9, v8) = v13) |  ~ (triple(v14, v10, v7) = v15) |  ~ (encrypt(v13, at) = v14) |  ? [v16] :  ? [v17] :  ? [v18] :  ? [v19] :  ? [v20] :  ? [v21] :  ? [v22] :  ? [v23] :  ? [v24] :  ? [v25] : (a_stored(v18) = v19 & encrypt(v7, v9) = v20 & pair(v11, v12) = v18 & pair(v10, v20) = v21 & sent(a, v11, v21) = v22 & sent(t, a, v15) = v16 & message(v22) = v23 & message(v16) = v17 & key(v9, v11) = v24 & a_holds(v24) = v25 & ( ~ (v19 = 0) |  ~ (v17 = 0) | (v25 = 0 & v23 = 0)))) &  ! [v7] :  ! [v8] :  ! [v9] :  ! [v10] :  ! [v11] :  ! [v12] : (v12 = 0 |  ~ (intruder_holds(v10) = 0) |  ~ (intruder_message(v11) = v12) |  ~ (encrypt(v7, v8) = v11) |  ~ (key(v8, v9) = v10) |  ? [v13] :  ? [v14] : (party_of_protocol(v9) = v14 & intruder_message(v7) = v13 & ( ~ (v14 = 0) |  ~ (v13 = 0)))) &  ! [v7] :  ! [v8] :  ! [v9] :  ! [v10] :  ! [v11] :  ! [v12] : (v8 = v7 |  ~ (quadruple(v12, v11, v10, v9) = v8) |  ~ (quadruple(v12, v11, v10, v9) = v7)) &  ! [v7] :  ! [v8] :  ! [v9] :  ! [v10] :  ! [v11] : (v11 = 0 |  ~ (party_of_protocol(v9) = 0) |  ~ (intruder_message(v10) = v11) |  ~ (encrypt(v7, v8) = v10) |  ? [v12] :  ? [v13] :  ? [v14] : (intruder_holds(v13) = v14 & intruder_message(v7) = v12 & key(v8, v9) = v13 & ( ~ (v14 = 0) |  ~ (v12 = 0)))) &  ! [v7] :  ! [v8] :  ! [v9] :  ! [v10] :  ! [v11] : (v8 = v7 |  ~ (triple(v11, v10, v9) = v8) |  ~ (triple(v11, v10, v9) = v7)) &  ! [v7] :  ! [v8] :  ! [v9] :  ! [v10] :  ! [v11] : (v8 = v7 |  ~ (sent(v11, v10, v9) = v8) |  ~ (sent(v11, v10, v9) = v7)) &  ! [v7] :  ! [v8] :  ! [v9] :  ! [v10] :  ! [v11] : ( ~ (intruder_holds(v11) = 0) |  ~ (intruder_message(v10) = 0) |  ~ (encrypt(v7, v8) = v10) |  ~ (key(v8, v9) = v11) |  ? [v12] :  ? [v13] : (party_of_protocol(v9) = v12 & intruder_message(v8) = v13 & ( ~ (v12 = 0) | v13 = 0))) &  ! [v7] :  ! [v8] :  ! [v9] :  ! [v10] :  ! [v11] : ( ~ (generate_expiration_time(v9) = v10) |  ~ (triple(v8, v7, v10) = v11) |  ? [v12] :  ? [v13] :  ? [v14] :  ? [v15] :  ? [v16] :  ? [v17] :  ? [v18] :  ? [v19] :  ? [v20] :  ? [v21] : (b_holds(v20) = v21 & generate_b_nonce(v9) = v13 & b_stored(v18) = v19 & encrypt(v13, v7) = v14 & encrypt(v11, bt) = v12 & pair(v12, v14) = v15 & pair(v8, v9) = v18 & sent(v8, b, v15) = v16 & message(v16) = v17 & key(v7, v8) = v20 & ( ~ (v19 = 0) |  ~ (v17 = 0) | v21 = 0))) &  ! [v7] :  ! [v8] :  ! [v9] :  ! [v10] :  ! [v11] : ( ~ (quadruple(v7, v8, v9, v10) = v11) |  ? [v12] :  ? [v13] :  ? [v14] :  ? [v15] :  ? [v16] : (intruder_message(v11) = v16 & intruder_message(v10) = v15 & intruder_message(v9) = v14 & intruder_message(v8) = v13 & intruder_message(v7) = v12 & ( ~ (v15 = 0) |  ~ (v14 = 0) |  ~ (v13 = 0) |  ~ (v12 = 0) | v16 = 0))) &  ! [v7] :  ! [v8] :  ! [v9] :  ! [v10] :  ! [v11] : ( ~ (quadruple(v7, v8, v9, v10) = v11) |  ? [v12] :  ? [v13] :  ? [v14] :  ? [v15] :  ? [v16] : (intruder_message(v11) = v12 & intruder_message(v10) = v16 & intruder_message(v9) = v15 & intruder_message(v8) = v14 & intruder_message(v7) = v13 & ( ~ (v12 = 0) | (v16 = 0 & v15 = 0 & v14 = 0 & v13 = 0)))) &  ! [v7] :  ! [v8] :  ! [v9] :  ! [v10] : (v8 = v7 |  ~ (encrypt(v10, v9) = v8) |  ~ (encrypt(v10, v9) = v7)) &  ! [v7] :  ! [v8] :  ! [v9] :  ! [v10] : (v8 = v7 |  ~ (pair(v10, v9) = v8) |  ~ (pair(v10, v9) = v7)) &  ! [v7] :  ! [v8] :  ! [v9] :  ! [v10] : (v8 = v7 |  ~ (key(v10, v9) = v8) |  ~ (key(v10, v9) = v7)) &  ! [v7] :  ! [v8] :  ! [v9] :  ! [v10] : ( ~ (intruder_holds(v10) = 0) |  ~ (intruder_message(v7) = 0) |  ~ (key(v8, v9) = v10) |  ? [v11] :  ? [v12] :  ? [v13] : (party_of_protocol(v9) = v11 & intruder_message(v12) = v13 & encrypt(v7, v8) = v12 & ( ~ (v11 = 0) | v13 = 0))) &  ! [v7] :  ! [v8] :  ! [v9] :  ! [v10] : ( ~ (party_of_protocol(v9) = 0) |  ~ (intruder_message(v10) = 0) |  ~ (encrypt(v7, v8) = v10) |  ? [v11] :  ? [v12] :  ? [v13] : (intruder_holds(v11) = v12 & intruder_message(v8) = v13 & key(v8, v9) = v11 & ( ~ (v12 = 0) | v13 = 0))) &  ! [v7] :  ! [v8] :  ! [v9] :  ! [v10] : ( ~ (generate_expiration_time(v8) = v9) |  ~ (triple(v7, v8, v9) = v10) |  ? [v11] :  ? [v12] :  ? [v13] :  ? [v14] :  ? [v15] :  ? [v16] :  ? [v17] :  ? [v18] :  ? [v19] :  ? [v20] : (fresh_to_b(v8) = v14 & generate_b_nonce(v8) = v15 & b_stored(v11) = v20 & triple(b, v15, v16) = v17 & encrypt(v10, bt) = v16 & pair(v7, v8) = v11 & sent(v7, b, v11) = v12 & sent(b, t, v17) = v18 & message(v18) = v19 & message(v12) = v13 & ( ~ (v14 = 0) |  ~ (v13 = 0) | (v20 = 0 & v19 = 0)))) &  ! [v7] :  ! [v8] :  ! [v9] :  ! [v10] : ( ~ (triple(v7, v8, v9) = v10) |  ? [v11] :  ? [v12] :  ? [v13] :  ? [v14] : (intruder_message(v10) = v14 & intruder_message(v9) = v13 & intruder_message(v8) = v12 & intruder_message(v7) = v11 & ( ~ (v13 = 0) |  ~ (v12 = 0) |  ~ (v11 = 0) | v14 = 0))) &  ! [v7] :  ! [v8] :  ! [v9] :  ! [v10] : ( ~ (triple(v7, v8, v9) = v10) |  ? [v11] :  ? [v12] :  ? [v13] :  ? [v14] : (intruder_message(v10) = v11 & intruder_message(v9) = v14 & intruder_message(v8) = v13 & intruder_message(v7) = v12 & ( ~ (v11 = 0) | (v14 = 0 & v13 = 0 & v12 = 0)))) &  ! [v7] :  ! [v8] :  ! [v9] :  ! [v10] : ( ~ (sent(v8, v9, v7) = v10) |  ? [v11] :  ? [v12] :  ? [v13] :  ? [v14] : (party_of_protocol(v9) = v13 & party_of_protocol(v8) = v12 & intruder_message(v7) = v11 & message(v10) = v14 & ( ~ (v13 = 0) |  ~ (v12 = 0) |  ~ (v11 = 0) | v14 = 0))) &  ! [v7] :  ! [v8] :  ! [v9] :  ! [v10] : ( ~ (sent(v7, v8, v9) = v10) |  ? [v11] :  ? [v12] : (intruder_message(v9) = v12 & message(v10) = v11 & ( ~ (v11 = 0) | v12 = 0))) &  ! [v7] :  ! [v8] :  ! [v9] : (v8 = v7 |  ~ (intruder_holds(v9) = v8) |  ~ (intruder_holds(v9) = v7)) &  ! [v7] :  ! [v8] :  ! [v9] : (v8 = v7 |  ~ (party_of_protocol(v9) = v8) |  ~ (party_of_protocol(v9) = v7)) &  ! [v7] :  ! [v8] :  ! [v9] : (v8 = v7 |  ~ (intruder_message(v9) = v8) |  ~ (intruder_message(v9) = v7)) &  ! [v7] :  ! [v8] :  ! [v9] : (v8 = v7 |  ~ (t_holds(v9) = v8) |  ~ (t_holds(v9) = v7)) &  ! [v7] :  ! [v8] :  ! [v9] : (v8 = v7 |  ~ (a_nonce(v9) = v8) |  ~ (a_nonce(v9) = v7)) &  ! [v7] :  ! [v8] :  ! [v9] : (v8 = v7 |  ~ (generate_key(v9) = v8) |  ~ (generate_key(v9) = v7)) &  ! [v7] :  ! [v8] :  ! [v9] : (v8 = v7 |  ~ (b_holds(v9) = v8) |  ~ (b_holds(v9) = v7)) &  ! [v7] :  ! [v8] :  ! [v9] : (v8 = v7 |  ~ (fresh_to_b(v9) = v8) |  ~ (fresh_to_b(v9) = v7)) &  ! [v7] :  ! [v8] :  ! [v9] : (v8 = v7 |  ~ (generate_b_nonce(v9) = v8) |  ~ (generate_b_nonce(v9) = v7)) &  ! [v7] :  ! [v8] :  ! [v9] : (v8 = v7 |  ~ (generate_expiration_time(v9) = v8) |  ~ (generate_expiration_time(v9) = v7)) &  ! [v7] :  ! [v8] :  ! [v9] : (v8 = v7 |  ~ (b_stored(v9) = v8) |  ~ (b_stored(v9) = v7)) &  ! [v7] :  ! [v8] :  ! [v9] : (v8 = v7 |  ~ (a_stored(v9) = v8) |  ~ (a_stored(v9) = v7)) &  ! [v7] :  ! [v8] :  ! [v9] : (v8 = v7 |  ~ (message(v9) = v8) |  ~ (message(v9) = v7)) &  ! [v7] :  ! [v8] :  ! [v9] : (v8 = v7 |  ~ (a_holds(v9) = v8) |  ~ (a_holds(v9) = v7)) &  ! [v7] :  ! [v8] :  ! [v9] : ( ~ (pair(v7, v8) = v9) |  ? [v10] :  ? [v11] :  ? [v12] :  ? [v13] :  ? [v14] :  ? [v15] :  ? [v16] :  ? [v17] :  ? [v18] :  ? [v19] :  ? [v20] : (fresh_to_b(v8) = v12 & generate_b_nonce(v8) = v13 & generate_expiration_time(v8) = v14 & b_stored(v9) = v20 & triple(v7, v8, v14) = v15 & triple(b, v13, v16) = v17 & encrypt(v15, bt) = v16 & sent(v7, b, v9) = v10 & sent(b, t, v17) = v18 & message(v18) = v19 & message(v10) = v11 & ( ~ (v12 = 0) |  ~ (v11 = 0) | (v20 = 0 & v19 = 0)))) &  ! [v7] :  ! [v8] :  ! [v9] : ( ~ (pair(v7, v8) = v9) |  ? [v10] :  ? [v11] :  ? [v12] : (intruder_message(v9) = v12 & intruder_message(v8) = v11 & intruder_message(v7) = v10 & ( ~ (v11 = 0) |  ~ (v10 = 0) | v12 = 0))) &  ! [v7] :  ! [v8] :  ! [v9] : ( ~ (pair(v7, v8) = v9) |  ? [v10] :  ? [v11] :  ? [v12] : (intruder_message(v9) = v10 & intruder_message(v8) = v12 & intruder_message(v7) = v11 & ( ~ (v10 = 0) | (v12 = 0 & v11 = 0)))) &  ! [v7] :  ! [v8] :  ! [v9] : ( ~ (key(v7, v8) = v9) |  ? [v10] :  ? [v11] :  ? [v12] : (intruder_holds(v9) = v12 & party_of_protocol(v8) = v11 & intruder_message(v7) = v10 & ( ~ (v11 = 0) |  ~ (v10 = 0) | v12 = 0))) &  ! [v7] :  ! [v8] : ( ~ (generate_key(v7) = v8) |  ? [v9] : ( ~ (v9 = 0) & a_nonce(v8) = v9)) &  ! [v7] :  ! [v8] : ( ~ (generate_b_nonce(v7) = v8) | a_nonce(v8) = 0) &  ! [v7] :  ! [v8] : ( ~ (generate_expiration_time(v7) = v8) | a_nonce(v8) = 0) &  ! [v7] :  ! [v8] : ( ~ (key(v7, b) = v8) |  ? [v9] :  ? [v10] :  ? [v11] : (intruder_holds(v8) = v9 & b_holds(v10) = v11 & key(v7, a) = v10 & ( ~ (v11 = 0) |  ~ (v9 = 0)))) &  ! [v7] :  ! [v8] : ( ~ (key(v7, a) = v8) |  ? [v9] :  ? [v10] :  ? [v11] : (intruder_holds(v9) = v10 & b_holds(v8) = v11 & key(v7, b) = v9 & ( ~ (v11 = 0) |  ~ (v10 = 0)))) &  ? [v7] :  ? [v8] :  ? [v9] :  ? [v10] :  ? [v11] :  ? [v12] :  ? [v13] :  ? [v14] :  ? [v15] :  ? [v16] :  ? [v17] :  ? [v18] :  ? [v19] :  ? [v20] :  ? [v21] :  ? [v22] :  ? [v23] :  ? [v24] :  ? [v25] :  ? [v26] :  ? [v27] :  ? [v28] :  ? [v29] :  ? [v30] :  ? [v31] : (t_holds(v21) = v22 & t_holds(v19) = v20 & a_nonce(v10) = v23 & generate_key(v10) = v24 & quadruple(v7, v10, v24, v11) = v25 & triple(v26, v28, v8) = v29 & triple(v9, v24, v11) = v27 & triple(v9, v10, v11) = v14 & triple(v7, v8, v15) = v16 & encrypt(v27, v12) = v28 & encrypt(v25, v13) = v26 & encrypt(v14, v12) = v15 & sent(v7, t, v16) = v17 & sent(t, v9, v29) = v30 & message(v30) = v31 & message(v17) = v18 & key(v13, v9) = v21 & key(v12, v7) = v19 & ( ~ (v23 = 0) |  ~ (v22 = 0) |  ~ (v20 = 0) |  ~ (v18 = 0) | v31 = 0)) &  ? [v7] :  ? [v8] :  ? [v9] :  ? [v10] :  ? [v11] :  ? [v12] :  ? [v13] :  ? [v14] :  ? [v15] :  ? [v16] :  ? [v17] :  ? [v18] :  ? [v19] :  ? [v20] :  ? [v21] :  ? [v22] :  ? [v23] :  ? [v24] :  ? [v25] : (quadruple(v11, v12, v9, v8) = v13 & triple(v14, v10, v7) = v15 & a_stored(v18) = v19 & encrypt(v13, at) = v14 & encrypt(v7, v9) = v20 & pair(v11, v12) = v18 & pair(v10, v20) = v21 & sent(a, v11, v21) = v22 & sent(t, a, v15) = v16 & message(v22) = v23 & message(v16) = v17 & key(v9, v11) = v24 & a_holds(v24) = v25 & ( ~ (v19 = 0) |  ~ (v17 = 0) | (v25 = 0 & v23 = 0))) &  ? [v7] :  ? [v8] :  ? [v9] :  ? [v10] :  ? [v11] :  ? [v12] :  ? [v13] :  ? [v14] :  ? [v15] :  ? [v16] :  ? [v17] :  ? [v18] :  ? [v19] :  ? [v20] :  ? [v21] : (b_holds(v20) = v21 & generate_b_nonce(v9) = v13 & generate_expiration_time(v9) = v10 & b_stored(v18) = v19 & triple(v8, v7, v10) = v11 & encrypt(v13, v7) = v14 & encrypt(v11, bt) = v12 & pair(v12, v14) = v15 & pair(v8, v9) = v18 & sent(v8, b, v15) = v16 & message(v16) = v17 & key(v7, v8) = v20 & ( ~ (v19 = 0) |  ~ (v17 = 0) | v21 = 0)) &  ? [v7] :  ? [v8] :  ? [v9] :  ? [v10] :  ? [v11] :  ? [v12] :  ? [v13] :  ? [v14] :  ? [v15] :  ? [v16] :  ? [v17] :  ? [v18] :  ? [v19] :  ? [v20] : (fresh_to_b(v8) = v12 & generate_b_nonce(v8) = v13 & generate_expiration_time(v8) = v14 & b_stored(v9) = v20 & triple(v7, v8, v14) = v15 & triple(b, v13, v16) = v17 & encrypt(v15, bt) = v16 & pair(v7, v8) = v9 & sent(v7, b, v9) = v10 & sent(b, t, v17) = v18 & message(v18) = v19 & message(v10) = v11 & ( ~ (v12 = 0) |  ~ (v11 = 0) | (v20 = 0 & v19 = 0))) &  ? [v7] :  ? [v8] :  ? [v9] :  ? [v10] :  ? [v11] :  ? [v12] :  ? [v13] :  ? [v14] :  ? [v15] : (intruder_holds(v12) = v13 & party_of_protocol(v9) = v14 & intruder_message(v10) = v11 & intruder_message(v8) = v15 & encrypt(v7, v8) = v10 & key(v8, v9) = v12 & ( ~ (v14 = 0) |  ~ (v13 = 0) |  ~ (v11 = 0) | v15 = 0)) &  ? [v7] :  ? [v8] :  ? [v9] :  ? [v10] :  ? [v11] :  ? [v12] :  ? [v13] :  ? [v14] :  ? [v15] : (intruder_holds(v11) = v12 & party_of_protocol(v9) = v13 & intruder_message(v14) = v15 & intruder_message(v7) = v10 & encrypt(v7, v8) = v14 & key(v8, v9) = v11 & ( ~ (v13 = 0) |  ~ (v12 = 0) |  ~ (v10 = 0) | v15 = 0)) &  ? [v7] :  ? [v8] :  ? [v9] :  ? [v10] :  ? [v11] :  ? [v12] :  ? [v13] :  ? [v14] : (party_of_protocol(v9) = v12 & party_of_protocol(v8) = v11 & intruder_message(v7) = v10 & sent(v8, v9, v7) = v13 & message(v13) = v14 & ( ~ (v12 = 0) |  ~ (v11 = 0) |  ~ (v10 = 0) | v14 = 0)) &  ? [v7] :  ? [v8] :  ? [v9] :  ? [v10] :  ? [v11] :  ? [v12] : (intruder_holds(v11) = v12 & party_of_protocol(v8) = v10 & intruder_message(v7) = v9 & key(v7, v8) = v11 & ( ~ (v10 = 0) |  ~ (v9 = 0) | v12 = 0)) &  ? [v7] :  ? [v8] :  ? [v9] :  ? [v10] :  ? [v11] :  ? [v12] : (intruder_message(v9) = v12 & sent(v7, v8, v9) = v10 & message(v10) = v11 & ( ~ (v11 = 0) | v12 = 0)) &  ? [v7] :  ? [v8] :  ? [v9] :  ? [v10] :  ? [v11] : (intruder_holds(v8) = v9 & b_holds(v10) = v11 & key(v7, b) = v8 & key(v7, a) = v10 & ( ~ (v11 = 0) |  ~ (v9 = 0))))
% 49.89/17.98  | Instantiating (0) with all_0_0_0, all_0_1_1, all_0_2_2, all_0_3_3, all_0_4_4, all_0_5_5, all_0_6_6 yields:
% 49.89/17.98  | (1) party_of_protocol(b) = 0 & party_of_protocol(a) = 0 & party_of_protocol(t) = 0 & t_holds(all_0_5_5) = 0 & t_holds(all_0_6_6) = 0 & a_nonce(an_a_nonce) = 0 & b_holds(all_0_4_4) = 0 & fresh_to_b(an_a_nonce) = 0 & a_stored(all_0_3_3) = 0 & pair(b, an_a_nonce) = all_0_3_3 & pair(a, an_a_nonce) = all_0_2_2 & sent(a, b, all_0_2_2) = all_0_1_1 & message(all_0_1_1) = 0 & key(bt, b) = all_0_6_6 & key(bt, t) = all_0_4_4 & key(at, a) = all_0_5_5 & key(at, t) = all_0_0_0 & a_holds(all_0_0_0) = 0 &  ! [v0] :  ! [v1] :  ! [v2] :  ! [v3] :  ! [v4] :  ! [v5] :  ! [v6] :  ! [v7] :  ! [v8] :  ! [v9] :  ! [v10] :  ! [v11] :  ! [v12] : ( ~ (generate_key(v3) = v7) |  ~ (quadruple(v0, v3, v7, v4) = v8) |  ~ (triple(v9, v11, v1) = v12) |  ~ (triple(v2, v7, v4) = v10) |  ~ (encrypt(v10, v5) = v11) |  ~ (encrypt(v8, v6) = v9) |  ? [v13] :  ? [v14] :  ? [v15] :  ? [v16] :  ? [v17] :  ? [v18] :  ? [v19] :  ? [v20] :  ? [v21] :  ? [v22] :  ? [v23] :  ? [v24] : (t_holds(v20) = v21 & t_holds(v18) = v19 & a_nonce(v3) = v22 & triple(v2, v3, v4) = v13 & triple(v0, v1, v14) = v15 & encrypt(v13, v5) = v14 & sent(v0, t, v15) = v16 & sent(t, v2, v12) = v23 & message(v23) = v24 & message(v16) = v17 & key(v6, v2) = v20 & key(v5, v0) = v18 & ( ~ (v22 = 0) |  ~ (v21 = 0) |  ~ (v19 = 0) |  ~ (v17 = 0) | v24 = 0))) &  ! [v0] :  ! [v1] :  ! [v2] :  ! [v3] :  ! [v4] :  ! [v5] :  ! [v6] :  ! [v7] :  ! [v8] : ( ~ (quadruple(v4, v5, v2, v1) = v6) |  ~ (triple(v7, v3, v0) = v8) |  ~ (encrypt(v6, at) = v7) |  ? [v9] :  ? [v10] :  ? [v11] :  ? [v12] :  ? [v13] :  ? [v14] :  ? [v15] :  ? [v16] :  ? [v17] :  ? [v18] : (a_stored(v11) = v12 & encrypt(v0, v2) = v13 & pair(v4, v5) = v11 & pair(v3, v13) = v14 & sent(a, v4, v14) = v15 & sent(t, a, v8) = v9 & message(v15) = v16 & message(v9) = v10 & key(v2, v4) = v17 & a_holds(v17) = v18 & ( ~ (v12 = 0) |  ~ (v10 = 0) | (v18 = 0 & v16 = 0)))) &  ! [v0] :  ! [v1] :  ! [v2] :  ! [v3] :  ! [v4] :  ! [v5] : (v5 = 0 |  ~ (intruder_holds(v3) = 0) |  ~ (intruder_message(v4) = v5) |  ~ (encrypt(v0, v1) = v4) |  ~ (key(v1, v2) = v3) |  ? [v6] :  ? [v7] : (party_of_protocol(v2) = v7 & intruder_message(v0) = v6 & ( ~ (v7 = 0) |  ~ (v6 = 0)))) &  ! [v0] :  ! [v1] :  ! [v2] :  ! [v3] :  ! [v4] :  ! [v5] : (v1 = v0 |  ~ (quadruple(v5, v4, v3, v2) = v1) |  ~ (quadruple(v5, v4, v3, v2) = v0)) &  ! [v0] :  ! [v1] :  ! [v2] :  ! [v3] :  ! [v4] : (v4 = 0 |  ~ (party_of_protocol(v2) = 0) |  ~ (intruder_message(v3) = v4) |  ~ (encrypt(v0, v1) = v3) |  ? [v5] :  ? [v6] :  ? [v7] : (intruder_holds(v6) = v7 & intruder_message(v0) = v5 & key(v1, v2) = v6 & ( ~ (v7 = 0) |  ~ (v5 = 0)))) &  ! [v0] :  ! [v1] :  ! [v2] :  ! [v3] :  ! [v4] : (v1 = v0 |  ~ (triple(v4, v3, v2) = v1) |  ~ (triple(v4, v3, v2) = v0)) &  ! [v0] :  ! [v1] :  ! [v2] :  ! [v3] :  ! [v4] : (v1 = v0 |  ~ (sent(v4, v3, v2) = v1) |  ~ (sent(v4, v3, v2) = v0)) &  ! [v0] :  ! [v1] :  ! [v2] :  ! [v3] :  ! [v4] : ( ~ (intruder_holds(v4) = 0) |  ~ (intruder_message(v3) = 0) |  ~ (encrypt(v0, v1) = v3) |  ~ (key(v1, v2) = v4) |  ? [v5] :  ? [v6] : (party_of_protocol(v2) = v5 & intruder_message(v1) = v6 & ( ~ (v5 = 0) | v6 = 0))) &  ! [v0] :  ! [v1] :  ! [v2] :  ! [v3] :  ! [v4] : ( ~ (generate_expiration_time(v2) = v3) |  ~ (triple(v1, v0, v3) = v4) |  ? [v5] :  ? [v6] :  ? [v7] :  ? [v8] :  ? [v9] :  ? [v10] :  ? [v11] :  ? [v12] :  ? [v13] :  ? [v14] : (b_holds(v13) = v14 & generate_b_nonce(v2) = v6 & b_stored(v11) = v12 & encrypt(v6, v0) = v7 & encrypt(v4, bt) = v5 & pair(v5, v7) = v8 & pair(v1, v2) = v11 & sent(v1, b, v8) = v9 & message(v9) = v10 & key(v0, v1) = v13 & ( ~ (v12 = 0) |  ~ (v10 = 0) | v14 = 0))) &  ! [v0] :  ! [v1] :  ! [v2] :  ! [v3] :  ! [v4] : ( ~ (quadruple(v0, v1, v2, v3) = v4) |  ? [v5] :  ? [v6] :  ? [v7] :  ? [v8] :  ? [v9] : (intruder_message(v4) = v9 & intruder_message(v3) = v8 & intruder_message(v2) = v7 & intruder_message(v1) = v6 & intruder_message(v0) = v5 & ( ~ (v8 = 0) |  ~ (v7 = 0) |  ~ (v6 = 0) |  ~ (v5 = 0) | v9 = 0))) &  ! [v0] :  ! [v1] :  ! [v2] :  ! [v3] :  ! [v4] : ( ~ (quadruple(v0, v1, v2, v3) = v4) |  ? [v5] :  ? [v6] :  ? [v7] :  ? [v8] :  ? [v9] : (intruder_message(v4) = v5 & intruder_message(v3) = v9 & intruder_message(v2) = v8 & intruder_message(v1) = v7 & intruder_message(v0) = v6 & ( ~ (v5 = 0) | (v9 = 0 & v8 = 0 & v7 = 0 & v6 = 0)))) &  ! [v0] :  ! [v1] :  ! [v2] :  ! [v3] : (v1 = v0 |  ~ (encrypt(v3, v2) = v1) |  ~ (encrypt(v3, v2) = v0)) &  ! [v0] :  ! [v1] :  ! [v2] :  ! [v3] : (v1 = v0 |  ~ (pair(v3, v2) = v1) |  ~ (pair(v3, v2) = v0)) &  ! [v0] :  ! [v1] :  ! [v2] :  ! [v3] : (v1 = v0 |  ~ (key(v3, v2) = v1) |  ~ (key(v3, v2) = v0)) &  ! [v0] :  ! [v1] :  ! [v2] :  ! [v3] : ( ~ (intruder_holds(v3) = 0) |  ~ (intruder_message(v0) = 0) |  ~ (key(v1, v2) = v3) |  ? [v4] :  ? [v5] :  ? [v6] : (party_of_protocol(v2) = v4 & intruder_message(v5) = v6 & encrypt(v0, v1) = v5 & ( ~ (v4 = 0) | v6 = 0))) &  ! [v0] :  ! [v1] :  ! [v2] :  ! [v3] : ( ~ (party_of_protocol(v2) = 0) |  ~ (intruder_message(v3) = 0) |  ~ (encrypt(v0, v1) = v3) |  ? [v4] :  ? [v5] :  ? [v6] : (intruder_holds(v4) = v5 & intruder_message(v1) = v6 & key(v1, v2) = v4 & ( ~ (v5 = 0) | v6 = 0))) &  ! [v0] :  ! [v1] :  ! [v2] :  ! [v3] : ( ~ (generate_expiration_time(v1) = v2) |  ~ (triple(v0, v1, v2) = v3) |  ? [v4] :  ? [v5] :  ? [v6] :  ? [v7] :  ? [v8] :  ? [v9] :  ? [v10] :  ? [v11] :  ? [v12] :  ? [v13] : (fresh_to_b(v1) = v7 & generate_b_nonce(v1) = v8 & b_stored(v4) = v13 & triple(b, v8, v9) = v10 & encrypt(v3, bt) = v9 & pair(v0, v1) = v4 & sent(v0, b, v4) = v5 & sent(b, t, v10) = v11 & message(v11) = v12 & message(v5) = v6 & ( ~ (v7 = 0) |  ~ (v6 = 0) | (v13 = 0 & v12 = 0)))) &  ! [v0] :  ! [v1] :  ! [v2] :  ! [v3] : ( ~ (triple(v0, v1, v2) = v3) |  ? [v4] :  ? [v5] :  ? [v6] :  ? [v7] : (intruder_message(v3) = v7 & intruder_message(v2) = v6 & intruder_message(v1) = v5 & intruder_message(v0) = v4 & ( ~ (v6 = 0) |  ~ (v5 = 0) |  ~ (v4 = 0) | v7 = 0))) &  ! [v0] :  ! [v1] :  ! [v2] :  ! [v3] : ( ~ (triple(v0, v1, v2) = v3) |  ? [v4] :  ? [v5] :  ? [v6] :  ? [v7] : (intruder_message(v3) = v4 & intruder_message(v2) = v7 & intruder_message(v1) = v6 & intruder_message(v0) = v5 & ( ~ (v4 = 0) | (v7 = 0 & v6 = 0 & v5 = 0)))) &  ! [v0] :  ! [v1] :  ! [v2] :  ! [v3] : ( ~ (sent(v1, v2, v0) = v3) |  ? [v4] :  ? [v5] :  ? [v6] :  ? [v7] : (party_of_protocol(v2) = v6 & party_of_protocol(v1) = v5 & intruder_message(v0) = v4 & message(v3) = v7 & ( ~ (v6 = 0) |  ~ (v5 = 0) |  ~ (v4 = 0) | v7 = 0))) &  ! [v0] :  ! [v1] :  ! [v2] :  ! [v3] : ( ~ (sent(v0, v1, v2) = v3) |  ? [v4] :  ? [v5] : (intruder_message(v2) = v5 & message(v3) = v4 & ( ~ (v4 = 0) | v5 = 0))) &  ! [v0] :  ! [v1] :  ! [v2] : (v1 = v0 |  ~ (intruder_holds(v2) = v1) |  ~ (intruder_holds(v2) = v0)) &  ! [v0] :  ! [v1] :  ! [v2] : (v1 = v0 |  ~ (party_of_protocol(v2) = v1) |  ~ (party_of_protocol(v2) = v0)) &  ! [v0] :  ! [v1] :  ! [v2] : (v1 = v0 |  ~ (intruder_message(v2) = v1) |  ~ (intruder_message(v2) = v0)) &  ! [v0] :  ! [v1] :  ! [v2] : (v1 = v0 |  ~ (t_holds(v2) = v1) |  ~ (t_holds(v2) = v0)) &  ! [v0] :  ! [v1] :  ! [v2] : (v1 = v0 |  ~ (a_nonce(v2) = v1) |  ~ (a_nonce(v2) = v0)) &  ! [v0] :  ! [v1] :  ! [v2] : (v1 = v0 |  ~ (generate_key(v2) = v1) |  ~ (generate_key(v2) = v0)) &  ! [v0] :  ! [v1] :  ! [v2] : (v1 = v0 |  ~ (b_holds(v2) = v1) |  ~ (b_holds(v2) = v0)) &  ! [v0] :  ! [v1] :  ! [v2] : (v1 = v0 |  ~ (fresh_to_b(v2) = v1) |  ~ (fresh_to_b(v2) = v0)) &  ! [v0] :  ! [v1] :  ! [v2] : (v1 = v0 |  ~ (generate_b_nonce(v2) = v1) |  ~ (generate_b_nonce(v2) = v0)) &  ! [v0] :  ! [v1] :  ! [v2] : (v1 = v0 |  ~ (generate_expiration_time(v2) = v1) |  ~ (generate_expiration_time(v2) = v0)) &  ! [v0] :  ! [v1] :  ! [v2] : (v1 = v0 |  ~ (b_stored(v2) = v1) |  ~ (b_stored(v2) = v0)) &  ! [v0] :  ! [v1] :  ! [v2] : (v1 = v0 |  ~ (a_stored(v2) = v1) |  ~ (a_stored(v2) = v0)) &  ! [v0] :  ! [v1] :  ! [v2] : (v1 = v0 |  ~ (message(v2) = v1) |  ~ (message(v2) = v0)) &  ! [v0] :  ! [v1] :  ! [v2] : (v1 = v0 |  ~ (a_holds(v2) = v1) |  ~ (a_holds(v2) = v0)) &  ! [v0] :  ! [v1] :  ! [v2] : ( ~ (pair(v0, v1) = v2) |  ? [v3] :  ? [v4] :  ? [v5] :  ? [v6] :  ? [v7] :  ? [v8] :  ? [v9] :  ? [v10] :  ? [v11] :  ? [v12] :  ? [v13] : (fresh_to_b(v1) = v5 & generate_b_nonce(v1) = v6 & generate_expiration_time(v1) = v7 & b_stored(v2) = v13 & triple(v0, v1, v7) = v8 & triple(b, v6, v9) = v10 & encrypt(v8, bt) = v9 & sent(v0, b, v2) = v3 & sent(b, t, v10) = v11 & message(v11) = v12 & message(v3) = v4 & ( ~ (v5 = 0) |  ~ (v4 = 0) | (v13 = 0 & v12 = 0)))) &  ! [v0] :  ! [v1] :  ! [v2] : ( ~ (pair(v0, v1) = v2) |  ? [v3] :  ? [v4] :  ? [v5] : (intruder_message(v2) = v5 & intruder_message(v1) = v4 & intruder_message(v0) = v3 & ( ~ (v4 = 0) |  ~ (v3 = 0) | v5 = 0))) &  ! [v0] :  ! [v1] :  ! [v2] : ( ~ (pair(v0, v1) = v2) |  ? [v3] :  ? [v4] :  ? [v5] : (intruder_message(v2) = v3 & intruder_message(v1) = v5 & intruder_message(v0) = v4 & ( ~ (v3 = 0) | (v5 = 0 & v4 = 0)))) &  ! [v0] :  ! [v1] :  ! [v2] : ( ~ (key(v0, v1) = v2) |  ? [v3] :  ? [v4] :  ? [v5] : (intruder_holds(v2) = v5 & party_of_protocol(v1) = v4 & intruder_message(v0) = v3 & ( ~ (v4 = 0) |  ~ (v3 = 0) | v5 = 0))) &  ! [v0] :  ! [v1] : ( ~ (generate_key(v0) = v1) |  ? [v2] : ( ~ (v2 = 0) & a_nonce(v1) = v2)) &  ! [v0] :  ! [v1] : ( ~ (generate_b_nonce(v0) = v1) | a_nonce(v1) = 0) &  ! [v0] :  ! [v1] : ( ~ (generate_expiration_time(v0) = v1) | a_nonce(v1) = 0) &  ! [v0] :  ! [v1] : ( ~ (key(v0, b) = v1) |  ? [v2] :  ? [v3] :  ? [v4] : (intruder_holds(v1) = v2 & b_holds(v3) = v4 & key(v0, a) = v3 & ( ~ (v4 = 0) |  ~ (v2 = 0)))) &  ! [v0] :  ! [v1] : ( ~ (key(v0, a) = v1) |  ? [v2] :  ? [v3] :  ? [v4] : (intruder_holds(v2) = v3 & b_holds(v1) = v4 & key(v0, b) = v2 & ( ~ (v4 = 0) |  ~ (v3 = 0)))) &  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] :  ? [v4] :  ? [v5] :  ? [v6] :  ? [v7] :  ? [v8] :  ? [v9] :  ? [v10] :  ? [v11] :  ? [v12] :  ? [v13] :  ? [v14] :  ? [v15] :  ? [v16] :  ? [v17] :  ? [v18] :  ? [v19] :  ? [v20] :  ? [v21] :  ? [v22] :  ? [v23] :  ? [v24] : (t_holds(v14) = v15 & t_holds(v12) = v13 & a_nonce(v3) = v16 & generate_key(v3) = v17 & quadruple(v0, v3, v17, v4) = v18 & triple(v19, v21, v1) = v22 & triple(v2, v17, v4) = v20 & triple(v2, v3, v4) = v7 & triple(v0, v1, v8) = v9 & encrypt(v20, v5) = v21 & encrypt(v18, v6) = v19 & encrypt(v7, v5) = v8 & sent(v0, t, v9) = v10 & sent(t, v2, v22) = v23 & message(v23) = v24 & message(v10) = v11 & key(v6, v2) = v14 & key(v5, v0) = v12 & ( ~ (v16 = 0) |  ~ (v15 = 0) |  ~ (v13 = 0) |  ~ (v11 = 0) | v24 = 0)) &  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] :  ? [v4] :  ? [v5] :  ? [v6] :  ? [v7] :  ? [v8] :  ? [v9] :  ? [v10] :  ? [v11] :  ? [v12] :  ? [v13] :  ? [v14] :  ? [v15] :  ? [v16] :  ? [v17] :  ? [v18] : (quadruple(v4, v5, v2, v1) = v6 & triple(v7, v3, v0) = v8 & a_stored(v11) = v12 & encrypt(v6, at) = v7 & encrypt(v0, v2) = v13 & pair(v4, v5) = v11 & pair(v3, v13) = v14 & sent(a, v4, v14) = v15 & sent(t, a, v8) = v9 & message(v15) = v16 & message(v9) = v10 & key(v2, v4) = v17 & a_holds(v17) = v18 & ( ~ (v12 = 0) |  ~ (v10 = 0) | (v18 = 0 & v16 = 0))) &  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] :  ? [v4] :  ? [v5] :  ? [v6] :  ? [v7] :  ? [v8] :  ? [v9] :  ? [v10] :  ? [v11] :  ? [v12] :  ? [v13] :  ? [v14] : (b_holds(v13) = v14 & generate_b_nonce(v2) = v6 & generate_expiration_time(v2) = v3 & b_stored(v11) = v12 & triple(v1, v0, v3) = v4 & encrypt(v6, v0) = v7 & encrypt(v4, bt) = v5 & pair(v5, v7) = v8 & pair(v1, v2) = v11 & sent(v1, b, v8) = v9 & message(v9) = v10 & key(v0, v1) = v13 & ( ~ (v12 = 0) |  ~ (v10 = 0) | v14 = 0)) &  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] :  ? [v4] :  ? [v5] :  ? [v6] :  ? [v7] :  ? [v8] :  ? [v9] :  ? [v10] :  ? [v11] :  ? [v12] :  ? [v13] : (fresh_to_b(v1) = v5 & generate_b_nonce(v1) = v6 & generate_expiration_time(v1) = v7 & b_stored(v2) = v13 & triple(v0, v1, v7) = v8 & triple(b, v6, v9) = v10 & encrypt(v8, bt) = v9 & pair(v0, v1) = v2 & sent(v0, b, v2) = v3 & sent(b, t, v10) = v11 & message(v11) = v12 & message(v3) = v4 & ( ~ (v5 = 0) |  ~ (v4 = 0) | (v13 = 0 & v12 = 0))) &  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] :  ? [v4] :  ? [v5] :  ? [v6] :  ? [v7] :  ? [v8] : (intruder_holds(v5) = v6 & party_of_protocol(v2) = v7 & intruder_message(v3) = v4 & intruder_message(v1) = v8 & encrypt(v0, v1) = v3 & key(v1, v2) = v5 & ( ~ (v7 = 0) |  ~ (v6 = 0) |  ~ (v4 = 0) | v8 = 0)) &  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] :  ? [v4] :  ? [v5] :  ? [v6] :  ? [v7] :  ? [v8] : (intruder_holds(v4) = v5 & party_of_protocol(v2) = v6 & intruder_message(v7) = v8 & intruder_message(v0) = v3 & encrypt(v0, v1) = v7 & key(v1, v2) = v4 & ( ~ (v6 = 0) |  ~ (v5 = 0) |  ~ (v3 = 0) | v8 = 0)) &  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] :  ? [v4] :  ? [v5] :  ? [v6] :  ? [v7] : (party_of_protocol(v2) = v5 & party_of_protocol(v1) = v4 & intruder_message(v0) = v3 & sent(v1, v2, v0) = v6 & message(v6) = v7 & ( ~ (v5 = 0) |  ~ (v4 = 0) |  ~ (v3 = 0) | v7 = 0)) &  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] :  ? [v4] :  ? [v5] : (intruder_holds(v4) = v5 & party_of_protocol(v1) = v3 & intruder_message(v0) = v2 & key(v0, v1) = v4 & ( ~ (v3 = 0) |  ~ (v2 = 0) | v5 = 0)) &  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] :  ? [v4] :  ? [v5] : (intruder_message(v2) = v5 & sent(v0, v1, v2) = v3 & message(v3) = v4 & ( ~ (v4 = 0) | v5 = 0)) &  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] :  ? [v4] : (intruder_holds(v1) = v2 & b_holds(v3) = v4 & key(v0, b) = v1 & key(v0, a) = v3 & ( ~ (v4 = 0) |  ~ (v2 = 0)))
% 50.08/18.00  |
% 50.08/18.00  | Applying alpha-rule on (1) yields:
% 50.08/18.00  | (2)  ! [v0] :  ! [v1] : ( ~ (generate_key(v0) = v1) |  ? [v2] : ( ~ (v2 = 0) & a_nonce(v1) = v2))
% 50.08/18.01  | (3) key(at, t) = all_0_0_0
% 50.08/18.01  | (4)  ! [v0] :  ! [v1] :  ! [v2] :  ! [v3] : ( ~ (sent(v0, v1, v2) = v3) |  ? [v4] :  ? [v5] : (intruder_message(v2) = v5 & message(v3) = v4 & ( ~ (v4 = 0) | v5 = 0)))
% 50.08/18.01  | (5)  ! [v0] :  ! [v1] :  ! [v2] : (v1 = v0 |  ~ (a_nonce(v2) = v1) |  ~ (a_nonce(v2) = v0))
% 50.08/18.01  | (6) t_holds(all_0_5_5) = 0
% 50.08/18.01  | (7)  ! [v0] :  ! [v1] :  ! [v2] :  ! [v3] :  ! [v4] : (v4 = 0 |  ~ (party_of_protocol(v2) = 0) |  ~ (intruder_message(v3) = v4) |  ~ (encrypt(v0, v1) = v3) |  ? [v5] :  ? [v6] :  ? [v7] : (intruder_holds(v6) = v7 & intruder_message(v0) = v5 & key(v1, v2) = v6 & ( ~ (v7 = 0) |  ~ (v5 = 0))))
% 50.08/18.01  | (8)  ! [v0] :  ! [v1] :  ! [v2] :  ! [v3] : (v1 = v0 |  ~ (encrypt(v3, v2) = v1) |  ~ (encrypt(v3, v2) = v0))
% 50.08/18.01  | (9)  ! [v0] :  ! [v1] :  ! [v2] : (v1 = v0 |  ~ (generate_key(v2) = v1) |  ~ (generate_key(v2) = v0))
% 50.08/18.01  | (10) party_of_protocol(b) = 0
% 50.08/18.01  | (11) pair(b, an_a_nonce) = all_0_3_3
% 50.08/18.01  | (12)  ! [v0] :  ! [v1] :  ! [v2] : ( ~ (pair(v0, v1) = v2) |  ? [v3] :  ? [v4] :  ? [v5] : (intruder_message(v2) = v5 & intruder_message(v1) = v4 & intruder_message(v0) = v3 & ( ~ (v4 = 0) |  ~ (v3 = 0) | v5 = 0)))
% 50.08/18.01  | (13)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] :  ? [v4] :  ? [v5] : (intruder_holds(v4) = v5 & party_of_protocol(v1) = v3 & intruder_message(v0) = v2 & key(v0, v1) = v4 & ( ~ (v3 = 0) |  ~ (v2 = 0) | v5 = 0))
% 50.08/18.01  | (14)  ! [v0] :  ! [v1] :  ! [v2] :  ! [v3] :  ! [v4] :  ! [v5] : (v1 = v0 |  ~ (quadruple(v5, v4, v3, v2) = v1) |  ~ (quadruple(v5, v4, v3, v2) = v0))
% 50.08/18.01  | (15)  ! [v0] :  ! [v1] :  ! [v2] : (v1 = v0 |  ~ (message(v2) = v1) |  ~ (message(v2) = v0))
% 50.08/18.01  | (16) fresh_to_b(an_a_nonce) = 0
% 50.08/18.01  | (17)  ! [v0] :  ! [v1] :  ! [v2] :  ! [v3] :  ! [v4] : ( ~ (quadruple(v0, v1, v2, v3) = v4) |  ? [v5] :  ? [v6] :  ? [v7] :  ? [v8] :  ? [v9] : (intruder_message(v4) = v5 & intruder_message(v3) = v9 & intruder_message(v2) = v8 & intruder_message(v1) = v7 & intruder_message(v0) = v6 & ( ~ (v5 = 0) | (v9 = 0 & v8 = 0 & v7 = 0 & v6 = 0))))
% 50.08/18.01  | (18)  ! [v0] :  ! [v1] :  ! [v2] : (v1 = v0 |  ~ (generate_expiration_time(v2) = v1) |  ~ (generate_expiration_time(v2) = v0))
% 50.08/18.01  | (19)  ! [v0] :  ! [v1] :  ! [v2] :  ! [v3] : ( ~ (party_of_protocol(v2) = 0) |  ~ (intruder_message(v3) = 0) |  ~ (encrypt(v0, v1) = v3) |  ? [v4] :  ? [v5] :  ? [v6] : (intruder_holds(v4) = v5 & intruder_message(v1) = v6 & key(v1, v2) = v4 & ( ~ (v5 = 0) | v6 = 0)))
% 50.08/18.01  | (20) t_holds(all_0_6_6) = 0
% 50.08/18.01  | (21) a_nonce(an_a_nonce) = 0
% 50.08/18.01  | (22)  ! [v0] :  ! [v1] :  ! [v2] :  ! [v3] :  ! [v4] : ( ~ (generate_expiration_time(v2) = v3) |  ~ (triple(v1, v0, v3) = v4) |  ? [v5] :  ? [v6] :  ? [v7] :  ? [v8] :  ? [v9] :  ? [v10] :  ? [v11] :  ? [v12] :  ? [v13] :  ? [v14] : (b_holds(v13) = v14 & generate_b_nonce(v2) = v6 & b_stored(v11) = v12 & encrypt(v6, v0) = v7 & encrypt(v4, bt) = v5 & pair(v5, v7) = v8 & pair(v1, v2) = v11 & sent(v1, b, v8) = v9 & message(v9) = v10 & key(v0, v1) = v13 & ( ~ (v12 = 0) |  ~ (v10 = 0) | v14 = 0)))
% 50.08/18.01  | (23)  ! [v0] :  ! [v1] :  ! [v2] : (v1 = v0 |  ~ (a_holds(v2) = v1) |  ~ (a_holds(v2) = v0))
% 50.08/18.01  | (24) key(bt, b) = all_0_6_6
% 50.08/18.01  | (25) b_holds(all_0_4_4) = 0
% 50.08/18.01  | (26)  ! [v0] :  ! [v1] :  ! [v2] : (v1 = v0 |  ~ (b_holds(v2) = v1) |  ~ (b_holds(v2) = v0))
% 50.08/18.01  | (27)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] :  ? [v4] :  ? [v5] :  ? [v6] :  ? [v7] :  ? [v8] :  ? [v9] :  ? [v10] :  ? [v11] :  ? [v12] :  ? [v13] : (fresh_to_b(v1) = v5 & generate_b_nonce(v1) = v6 & generate_expiration_time(v1) = v7 & b_stored(v2) = v13 & triple(v0, v1, v7) = v8 & triple(b, v6, v9) = v10 & encrypt(v8, bt) = v9 & pair(v0, v1) = v2 & sent(v0, b, v2) = v3 & sent(b, t, v10) = v11 & message(v11) = v12 & message(v3) = v4 & ( ~ (v5 = 0) |  ~ (v4 = 0) | (v13 = 0 & v12 = 0)))
% 50.08/18.01  | (28) pair(a, an_a_nonce) = all_0_2_2
% 50.08/18.01  | (29)  ! [v0] :  ! [v1] :  ! [v2] : (v1 = v0 |  ~ (generate_b_nonce(v2) = v1) |  ~ (generate_b_nonce(v2) = v0))
% 50.08/18.01  | (30)  ! [v0] :  ! [v1] :  ! [v2] : (v1 = v0 |  ~ (t_holds(v2) = v1) |  ~ (t_holds(v2) = v0))
% 50.08/18.01  | (31)  ! [v0] :  ! [v1] :  ! [v2] : (v1 = v0 |  ~ (intruder_message(v2) = v1) |  ~ (intruder_message(v2) = v0))
% 50.08/18.01  | (32) a_stored(all_0_3_3) = 0
% 50.08/18.01  | (33)  ! [v0] :  ! [v1] :  ! [v2] : (v1 = v0 |  ~ (a_stored(v2) = v1) |  ~ (a_stored(v2) = v0))
% 50.08/18.01  | (34) party_of_protocol(t) = 0
% 50.08/18.01  | (35)  ! [v0] :  ! [v1] :  ! [v2] :  ! [v3] :  ! [v4] :  ! [v5] :  ! [v6] :  ! [v7] :  ! [v8] : ( ~ (quadruple(v4, v5, v2, v1) = v6) |  ~ (triple(v7, v3, v0) = v8) |  ~ (encrypt(v6, at) = v7) |  ? [v9] :  ? [v10] :  ? [v11] :  ? [v12] :  ? [v13] :  ? [v14] :  ? [v15] :  ? [v16] :  ? [v17] :  ? [v18] : (a_stored(v11) = v12 & encrypt(v0, v2) = v13 & pair(v4, v5) = v11 & pair(v3, v13) = v14 & sent(a, v4, v14) = v15 & sent(t, a, v8) = v9 & message(v15) = v16 & message(v9) = v10 & key(v2, v4) = v17 & a_holds(v17) = v18 & ( ~ (v12 = 0) |  ~ (v10 = 0) | (v18 = 0 & v16 = 0))))
% 50.08/18.02  | (36)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] :  ? [v4] : (intruder_holds(v1) = v2 & b_holds(v3) = v4 & key(v0, b) = v1 & key(v0, a) = v3 & ( ~ (v4 = 0) |  ~ (v2 = 0)))
% 50.08/18.02  | (37)  ! [v0] :  ! [v1] :  ! [v2] : (v1 = v0 |  ~ (intruder_holds(v2) = v1) |  ~ (intruder_holds(v2) = v0))
% 50.08/18.02  | (38)  ! [v0] :  ! [v1] : ( ~ (generate_b_nonce(v0) = v1) | a_nonce(v1) = 0)
% 50.08/18.02  | (39)  ! [v0] :  ! [v1] : ( ~ (key(v0, b) = v1) |  ? [v2] :  ? [v3] :  ? [v4] : (intruder_holds(v1) = v2 & b_holds(v3) = v4 & key(v0, a) = v3 & ( ~ (v4 = 0) |  ~ (v2 = 0))))
% 50.08/18.02  | (40)  ! [v0] :  ! [v1] :  ! [v2] :  ! [v3] : ( ~ (triple(v0, v1, v2) = v3) |  ? [v4] :  ? [v5] :  ? [v6] :  ? [v7] : (intruder_message(v3) = v7 & intruder_message(v2) = v6 & intruder_message(v1) = v5 & intruder_message(v0) = v4 & ( ~ (v6 = 0) |  ~ (v5 = 0) |  ~ (v4 = 0) | v7 = 0)))
% 50.08/18.02  | (41) sent(a, b, all_0_2_2) = all_0_1_1
% 50.08/18.02  | (42)  ! [v0] :  ! [v1] :  ! [v2] :  ! [v3] :  ! [v4] :  ! [v5] :  ! [v6] :  ! [v7] :  ! [v8] :  ! [v9] :  ! [v10] :  ! [v11] :  ! [v12] : ( ~ (generate_key(v3) = v7) |  ~ (quadruple(v0, v3, v7, v4) = v8) |  ~ (triple(v9, v11, v1) = v12) |  ~ (triple(v2, v7, v4) = v10) |  ~ (encrypt(v10, v5) = v11) |  ~ (encrypt(v8, v6) = v9) |  ? [v13] :  ? [v14] :  ? [v15] :  ? [v16] :  ? [v17] :  ? [v18] :  ? [v19] :  ? [v20] :  ? [v21] :  ? [v22] :  ? [v23] :  ? [v24] : (t_holds(v20) = v21 & t_holds(v18) = v19 & a_nonce(v3) = v22 & triple(v2, v3, v4) = v13 & triple(v0, v1, v14) = v15 & encrypt(v13, v5) = v14 & sent(v0, t, v15) = v16 & sent(t, v2, v12) = v23 & message(v23) = v24 & message(v16) = v17 & key(v6, v2) = v20 & key(v5, v0) = v18 & ( ~ (v22 = 0) |  ~ (v21 = 0) |  ~ (v19 = 0) |  ~ (v17 = 0) | v24 = 0)))
% 50.08/18.02  | (43) party_of_protocol(a) = 0
% 50.08/18.02  | (44)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] :  ? [v4] :  ? [v5] :  ? [v6] :  ? [v7] :  ? [v8] : (intruder_holds(v4) = v5 & party_of_protocol(v2) = v6 & intruder_message(v7) = v8 & intruder_message(v0) = v3 & encrypt(v0, v1) = v7 & key(v1, v2) = v4 & ( ~ (v6 = 0) |  ~ (v5 = 0) |  ~ (v3 = 0) | v8 = 0))
% 50.08/18.02  | (45)  ! [v0] :  ! [v1] :  ! [v2] :  ! [v3] :  ! [v4] :  ! [v5] : (v5 = 0 |  ~ (intruder_holds(v3) = 0) |  ~ (intruder_message(v4) = v5) |  ~ (encrypt(v0, v1) = v4) |  ~ (key(v1, v2) = v3) |  ? [v6] :  ? [v7] : (party_of_protocol(v2) = v7 & intruder_message(v0) = v6 & ( ~ (v7 = 0) |  ~ (v6 = 0))))
% 50.08/18.02  | (46)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] :  ? [v4] :  ? [v5] :  ? [v6] :  ? [v7] :  ? [v8] :  ? [v9] :  ? [v10] :  ? [v11] :  ? [v12] :  ? [v13] :  ? [v14] :  ? [v15] :  ? [v16] :  ? [v17] :  ? [v18] : (quadruple(v4, v5, v2, v1) = v6 & triple(v7, v3, v0) = v8 & a_stored(v11) = v12 & encrypt(v6, at) = v7 & encrypt(v0, v2) = v13 & pair(v4, v5) = v11 & pair(v3, v13) = v14 & sent(a, v4, v14) = v15 & sent(t, a, v8) = v9 & message(v15) = v16 & message(v9) = v10 & key(v2, v4) = v17 & a_holds(v17) = v18 & ( ~ (v12 = 0) |  ~ (v10 = 0) | (v18 = 0 & v16 = 0)))
% 50.08/18.02  | (47)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] :  ? [v4] :  ? [v5] :  ? [v6] :  ? [v7] : (party_of_protocol(v2) = v5 & party_of_protocol(v1) = v4 & intruder_message(v0) = v3 & sent(v1, v2, v0) = v6 & message(v6) = v7 & ( ~ (v5 = 0) |  ~ (v4 = 0) |  ~ (v3 = 0) | v7 = 0))
% 50.08/18.02  | (48)  ! [v0] :  ! [v1] :  ! [v2] : (v1 = v0 |  ~ (fresh_to_b(v2) = v1) |  ~ (fresh_to_b(v2) = v0))
% 50.08/18.02  | (49) message(all_0_1_1) = 0
% 50.08/18.02  | (50)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] :  ? [v4] :  ? [v5] :  ? [v6] :  ? [v7] :  ? [v8] :  ? [v9] :  ? [v10] :  ? [v11] :  ? [v12] :  ? [v13] :  ? [v14] : (b_holds(v13) = v14 & generate_b_nonce(v2) = v6 & generate_expiration_time(v2) = v3 & b_stored(v11) = v12 & triple(v1, v0, v3) = v4 & encrypt(v6, v0) = v7 & encrypt(v4, bt) = v5 & pair(v5, v7) = v8 & pair(v1, v2) = v11 & sent(v1, b, v8) = v9 & message(v9) = v10 & key(v0, v1) = v13 & ( ~ (v12 = 0) |  ~ (v10 = 0) | v14 = 0))
% 50.08/18.02  | (51)  ! [v0] :  ! [v1] :  ! [v2] :  ! [v3] :  ! [v4] : ( ~ (quadruple(v0, v1, v2, v3) = v4) |  ? [v5] :  ? [v6] :  ? [v7] :  ? [v8] :  ? [v9] : (intruder_message(v4) = v9 & intruder_message(v3) = v8 & intruder_message(v2) = v7 & intruder_message(v1) = v6 & intruder_message(v0) = v5 & ( ~ (v8 = 0) |  ~ (v7 = 0) |  ~ (v6 = 0) |  ~ (v5 = 0) | v9 = 0)))
% 50.08/18.02  | (52) a_holds(all_0_0_0) = 0
% 50.08/18.02  | (53) key(at, a) = all_0_5_5
% 50.08/18.02  | (54)  ! [v0] :  ! [v1] : ( ~ (generate_expiration_time(v0) = v1) | a_nonce(v1) = 0)
% 50.08/18.02  | (55)  ! [v0] :  ! [v1] :  ! [v2] :  ! [v3] : (v1 = v0 |  ~ (key(v3, v2) = v1) |  ~ (key(v3, v2) = v0))
% 50.08/18.02  | (56)  ! [v0] :  ! [v1] :  ! [v2] : ( ~ (pair(v0, v1) = v2) |  ? [v3] :  ? [v4] :  ? [v5] : (intruder_message(v2) = v3 & intruder_message(v1) = v5 & intruder_message(v0) = v4 & ( ~ (v3 = 0) | (v5 = 0 & v4 = 0))))
% 50.08/18.02  | (57)  ! [v0] :  ! [v1] :  ! [v2] : ( ~ (key(v0, v1) = v2) |  ? [v3] :  ? [v4] :  ? [v5] : (intruder_holds(v2) = v5 & party_of_protocol(v1) = v4 & intruder_message(v0) = v3 & ( ~ (v4 = 0) |  ~ (v3 = 0) | v5 = 0)))
% 50.08/18.02  | (58)  ! [v0] :  ! [v1] :  ! [v2] :  ! [v3] : ( ~ (generate_expiration_time(v1) = v2) |  ~ (triple(v0, v1, v2) = v3) |  ? [v4] :  ? [v5] :  ? [v6] :  ? [v7] :  ? [v8] :  ? [v9] :  ? [v10] :  ? [v11] :  ? [v12] :  ? [v13] : (fresh_to_b(v1) = v7 & generate_b_nonce(v1) = v8 & b_stored(v4) = v13 & triple(b, v8, v9) = v10 & encrypt(v3, bt) = v9 & pair(v0, v1) = v4 & sent(v0, b, v4) = v5 & sent(b, t, v10) = v11 & message(v11) = v12 & message(v5) = v6 & ( ~ (v7 = 0) |  ~ (v6 = 0) | (v13 = 0 & v12 = 0))))
% 50.08/18.03  | (59) key(bt, t) = all_0_4_4
% 50.08/18.03  | (60)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] :  ? [v4] :  ? [v5] :  ? [v6] :  ? [v7] :  ? [v8] : (intruder_holds(v5) = v6 & party_of_protocol(v2) = v7 & intruder_message(v3) = v4 & intruder_message(v1) = v8 & encrypt(v0, v1) = v3 & key(v1, v2) = v5 & ( ~ (v7 = 0) |  ~ (v6 = 0) |  ~ (v4 = 0) | v8 = 0))
% 50.08/18.03  | (61)  ! [v0] :  ! [v1] :  ! [v2] :  ! [v3] :  ! [v4] : (v1 = v0 |  ~ (triple(v4, v3, v2) = v1) |  ~ (triple(v4, v3, v2) = v0))
% 50.08/18.03  | (62)  ! [v0] :  ! [v1] : ( ~ (key(v0, a) = v1) |  ? [v2] :  ? [v3] :  ? [v4] : (intruder_holds(v2) = v3 & b_holds(v1) = v4 & key(v0, b) = v2 & ( ~ (v4 = 0) |  ~ (v3 = 0))))
% 50.08/18.03  | (63)  ! [v0] :  ! [v1] :  ! [v2] :  ! [v3] : ( ~ (intruder_holds(v3) = 0) |  ~ (intruder_message(v0) = 0) |  ~ (key(v1, v2) = v3) |  ? [v4] :  ? [v5] :  ? [v6] : (party_of_protocol(v2) = v4 & intruder_message(v5) = v6 & encrypt(v0, v1) = v5 & ( ~ (v4 = 0) | v6 = 0)))
% 50.08/18.03  | (64)  ! [v0] :  ! [v1] :  ! [v2] : (v1 = v0 |  ~ (b_stored(v2) = v1) |  ~ (b_stored(v2) = v0))
% 50.08/18.03  | (65)  ! [v0] :  ! [v1] :  ! [v2] :  ! [v3] :  ! [v4] : (v1 = v0 |  ~ (sent(v4, v3, v2) = v1) |  ~ (sent(v4, v3, v2) = v0))
% 50.08/18.03  | (66)  ! [v0] :  ! [v1] :  ! [v2] : (v1 = v0 |  ~ (party_of_protocol(v2) = v1) |  ~ (party_of_protocol(v2) = v0))
% 50.08/18.03  | (67)  ! [v0] :  ! [v1] :  ! [v2] :  ! [v3] :  ! [v4] : ( ~ (intruder_holds(v4) = 0) |  ~ (intruder_message(v3) = 0) |  ~ (encrypt(v0, v1) = v3) |  ~ (key(v1, v2) = v4) |  ? [v5] :  ? [v6] : (party_of_protocol(v2) = v5 & intruder_message(v1) = v6 & ( ~ (v5 = 0) | v6 = 0)))
% 50.08/18.03  | (68)  ! [v0] :  ! [v1] :  ! [v2] :  ! [v3] : ( ~ (triple(v0, v1, v2) = v3) |  ? [v4] :  ? [v5] :  ? [v6] :  ? [v7] : (intruder_message(v3) = v4 & intruder_message(v2) = v7 & intruder_message(v1) = v6 & intruder_message(v0) = v5 & ( ~ (v4 = 0) | (v7 = 0 & v6 = 0 & v5 = 0))))
% 50.08/18.03  | (69)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] :  ? [v4] :  ? [v5] :  ? [v6] :  ? [v7] :  ? [v8] :  ? [v9] :  ? [v10] :  ? [v11] :  ? [v12] :  ? [v13] :  ? [v14] :  ? [v15] :  ? [v16] :  ? [v17] :  ? [v18] :  ? [v19] :  ? [v20] :  ? [v21] :  ? [v22] :  ? [v23] :  ? [v24] : (t_holds(v14) = v15 & t_holds(v12) = v13 & a_nonce(v3) = v16 & generate_key(v3) = v17 & quadruple(v0, v3, v17, v4) = v18 & triple(v19, v21, v1) = v22 & triple(v2, v17, v4) = v20 & triple(v2, v3, v4) = v7 & triple(v0, v1, v8) = v9 & encrypt(v20, v5) = v21 & encrypt(v18, v6) = v19 & encrypt(v7, v5) = v8 & sent(v0, t, v9) = v10 & sent(t, v2, v22) = v23 & message(v23) = v24 & message(v10) = v11 & key(v6, v2) = v14 & key(v5, v0) = v12 & ( ~ (v16 = 0) |  ~ (v15 = 0) |  ~ (v13 = 0) |  ~ (v11 = 0) | v24 = 0))
% 50.08/18.03  | (70)  ! [v0] :  ! [v1] :  ! [v2] : ( ~ (pair(v0, v1) = v2) |  ? [v3] :  ? [v4] :  ? [v5] :  ? [v6] :  ? [v7] :  ? [v8] :  ? [v9] :  ? [v10] :  ? [v11] :  ? [v12] :  ? [v13] : (fresh_to_b(v1) = v5 & generate_b_nonce(v1) = v6 & generate_expiration_time(v1) = v7 & b_stored(v2) = v13 & triple(v0, v1, v7) = v8 & triple(b, v6, v9) = v10 & encrypt(v8, bt) = v9 & sent(v0, b, v2) = v3 & sent(b, t, v10) = v11 & message(v11) = v12 & message(v3) = v4 & ( ~ (v5 = 0) |  ~ (v4 = 0) | (v13 = 0 & v12 = 0))))
% 50.08/18.03  | (71)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] :  ? [v4] :  ? [v5] : (intruder_message(v2) = v5 & sent(v0, v1, v2) = v3 & message(v3) = v4 & ( ~ (v4 = 0) | v5 = 0))
% 50.08/18.03  | (72)  ! [v0] :  ! [v1] :  ! [v2] :  ! [v3] : (v1 = v0 |  ~ (pair(v3, v2) = v1) |  ~ (pair(v3, v2) = v0))
% 50.08/18.03  | (73)  ! [v0] :  ! [v1] :  ! [v2] :  ! [v3] : ( ~ (sent(v1, v2, v0) = v3) |  ? [v4] :  ? [v5] :  ? [v6] :  ? [v7] : (party_of_protocol(v2) = v6 & party_of_protocol(v1) = v5 & intruder_message(v0) = v4 & message(v3) = v7 & ( ~ (v6 = 0) |  ~ (v5 = 0) |  ~ (v4 = 0) | v7 = 0)))
% 50.08/18.03  |
% 50.08/18.03  | Instantiating (36) with all_3_0_7, all_3_1_8, all_3_2_9, all_3_3_10, all_3_4_11 yields:
% 50.08/18.03  | (74) intruder_holds(all_3_3_10) = all_3_2_9 & b_holds(all_3_1_8) = all_3_0_7 & key(all_3_4_11, b) = all_3_3_10 & key(all_3_4_11, a) = all_3_1_8 & ( ~ (all_3_0_7 = 0) |  ~ (all_3_2_9 = 0))
% 50.08/18.03  |
% 50.08/18.03  | Applying alpha-rule on (74) yields:
% 50.08/18.03  | (75)  ~ (all_3_0_7 = 0) |  ~ (all_3_2_9 = 0)
% 50.08/18.03  | (76) b_holds(all_3_1_8) = all_3_0_7
% 50.08/18.03  | (77) key(all_3_4_11, a) = all_3_1_8
% 50.08/18.03  | (78) key(all_3_4_11, b) = all_3_3_10
% 50.08/18.03  | (79) intruder_holds(all_3_3_10) = all_3_2_9
% 50.08/18.03  |
% 50.08/18.03  | Instantiating (27) with all_11_0_32, all_11_1_33, all_11_2_34, all_11_3_35, all_11_4_36, all_11_5_37, all_11_6_38, all_11_7_39, all_11_8_40, all_11_9_41, all_11_10_42, all_11_11_43, all_11_12_44, all_11_13_45 yields:
% 50.08/18.03  | (80) fresh_to_b(all_11_12_44) = all_11_8_40 & generate_b_nonce(all_11_12_44) = all_11_7_39 & generate_expiration_time(all_11_12_44) = all_11_6_38 & b_stored(all_11_11_43) = all_11_0_32 & triple(all_11_13_45, all_11_12_44, all_11_6_38) = all_11_5_37 & triple(b, all_11_7_39, all_11_4_36) = all_11_3_35 & encrypt(all_11_5_37, bt) = all_11_4_36 & pair(all_11_13_45, all_11_12_44) = all_11_11_43 & sent(all_11_13_45, b, all_11_11_43) = all_11_10_42 & sent(b, t, all_11_3_35) = all_11_2_34 & message(all_11_2_34) = all_11_1_33 & message(all_11_10_42) = all_11_9_41 & ( ~ (all_11_8_40 = 0) |  ~ (all_11_9_41 = 0) | (all_11_0_32 = 0 & all_11_1_33 = 0))
% 50.08/18.03  |
% 50.08/18.03  | Applying alpha-rule on (80) yields:
% 50.08/18.03  | (81) sent(b, t, all_11_3_35) = all_11_2_34
% 50.08/18.03  | (82) message(all_11_10_42) = all_11_9_41
% 50.08/18.04  | (83) triple(all_11_13_45, all_11_12_44, all_11_6_38) = all_11_5_37
% 50.08/18.04  | (84) fresh_to_b(all_11_12_44) = all_11_8_40
% 50.08/18.04  | (85) encrypt(all_11_5_37, bt) = all_11_4_36
% 50.08/18.04  | (86) pair(all_11_13_45, all_11_12_44) = all_11_11_43
% 50.08/18.04  | (87) sent(all_11_13_45, b, all_11_11_43) = all_11_10_42
% 50.08/18.04  | (88) triple(b, all_11_7_39, all_11_4_36) = all_11_3_35
% 50.08/18.04  | (89) generate_b_nonce(all_11_12_44) = all_11_7_39
% 50.08/18.04  | (90) generate_expiration_time(all_11_12_44) = all_11_6_38
% 50.08/18.04  | (91)  ~ (all_11_8_40 = 0) |  ~ (all_11_9_41 = 0) | (all_11_0_32 = 0 & all_11_1_33 = 0)
% 50.08/18.04  | (92) b_stored(all_11_11_43) = all_11_0_32
% 50.08/18.04  | (93) message(all_11_2_34) = all_11_1_33
% 50.08/18.04  |
% 50.08/18.04  | Instantiating (50) with all_13_0_46, all_13_1_47, all_13_2_48, all_13_3_49, all_13_4_50, all_13_5_51, all_13_6_52, all_13_7_53, all_13_8_54, all_13_9_55, all_13_10_56, all_13_11_57, all_13_12_58, all_13_13_59, all_13_14_60 yields:
% 50.08/18.04  | (94) b_holds(all_13_1_47) = all_13_0_46 & generate_b_nonce(all_13_12_58) = all_13_8_54 & generate_expiration_time(all_13_12_58) = all_13_11_57 & b_stored(all_13_3_49) = all_13_2_48 & triple(all_13_13_59, all_13_14_60, all_13_11_57) = all_13_10_56 & encrypt(all_13_8_54, all_13_14_60) = all_13_7_53 & encrypt(all_13_10_56, bt) = all_13_9_55 & pair(all_13_9_55, all_13_7_53) = all_13_6_52 & pair(all_13_13_59, all_13_12_58) = all_13_3_49 & sent(all_13_13_59, b, all_13_6_52) = all_13_5_51 & message(all_13_5_51) = all_13_4_50 & key(all_13_14_60, all_13_13_59) = all_13_1_47 & ( ~ (all_13_2_48 = 0) |  ~ (all_13_4_50 = 0) | all_13_0_46 = 0)
% 50.08/18.04  |
% 50.08/18.04  | Applying alpha-rule on (94) yields:
% 50.08/18.04  | (95) b_holds(all_13_1_47) = all_13_0_46
% 50.08/18.04  | (96) b_stored(all_13_3_49) = all_13_2_48
% 50.08/18.04  | (97)  ~ (all_13_2_48 = 0) |  ~ (all_13_4_50 = 0) | all_13_0_46 = 0
% 50.08/18.04  | (98) generate_expiration_time(all_13_12_58) = all_13_11_57
% 50.08/18.04  | (99) pair(all_13_13_59, all_13_12_58) = all_13_3_49
% 50.08/18.04  | (100) encrypt(all_13_10_56, bt) = all_13_9_55
% 50.08/18.04  | (101) sent(all_13_13_59, b, all_13_6_52) = all_13_5_51
% 50.08/18.04  | (102) key(all_13_14_60, all_13_13_59) = all_13_1_47
% 50.08/18.04  | (103) message(all_13_5_51) = all_13_4_50
% 50.08/18.04  | (104) generate_b_nonce(all_13_12_58) = all_13_8_54
% 50.08/18.04  | (105) triple(all_13_13_59, all_13_14_60, all_13_11_57) = all_13_10_56
% 50.08/18.04  | (106) pair(all_13_9_55, all_13_7_53) = all_13_6_52
% 50.08/18.04  | (107) encrypt(all_13_8_54, all_13_14_60) = all_13_7_53
% 50.08/18.04  |
% 50.08/18.04  | Instantiating (46) with all_15_0_61, all_15_1_62, all_15_2_63, all_15_3_64, all_15_4_65, all_15_5_66, all_15_6_67, all_15_7_68, all_15_8_69, all_15_9_70, all_15_10_71, all_15_11_72, all_15_12_73, all_15_13_74, all_15_14_75, all_15_15_76, all_15_16_77, all_15_17_78, all_15_18_79 yields:
% 50.08/18.04  | (108) quadruple(all_15_14_75, all_15_13_74, all_15_16_77, all_15_17_78) = all_15_12_73 & triple(all_15_11_72, all_15_15_76, all_15_18_79) = all_15_10_71 & a_stored(all_15_7_68) = all_15_6_67 & encrypt(all_15_12_73, at) = all_15_11_72 & encrypt(all_15_18_79, all_15_16_77) = all_15_5_66 & pair(all_15_14_75, all_15_13_74) = all_15_7_68 & pair(all_15_15_76, all_15_5_66) = all_15_4_65 & sent(a, all_15_14_75, all_15_4_65) = all_15_3_64 & sent(t, a, all_15_10_71) = all_15_9_70 & message(all_15_3_64) = all_15_2_63 & message(all_15_9_70) = all_15_8_69 & key(all_15_16_77, all_15_14_75) = all_15_1_62 & a_holds(all_15_1_62) = all_15_0_61 & ( ~ (all_15_6_67 = 0) |  ~ (all_15_8_69 = 0) | (all_15_0_61 = 0 & all_15_2_63 = 0))
% 50.08/18.04  |
% 50.08/18.04  | Applying alpha-rule on (108) yields:
% 50.08/18.04  | (109) message(all_15_3_64) = all_15_2_63
% 50.08/18.04  | (110)  ~ (all_15_6_67 = 0) |  ~ (all_15_8_69 = 0) | (all_15_0_61 = 0 & all_15_2_63 = 0)
% 50.08/18.04  | (111) triple(all_15_11_72, all_15_15_76, all_15_18_79) = all_15_10_71
% 50.08/18.04  | (112) quadruple(all_15_14_75, all_15_13_74, all_15_16_77, all_15_17_78) = all_15_12_73
% 50.08/18.04  | (113) encrypt(all_15_12_73, at) = all_15_11_72
% 50.08/18.04  | (114) pair(all_15_15_76, all_15_5_66) = all_15_4_65
% 50.08/18.04  | (115) encrypt(all_15_18_79, all_15_16_77) = all_15_5_66
% 50.08/18.04  | (116) message(all_15_9_70) = all_15_8_69
% 50.08/18.04  | (117) sent(t, a, all_15_10_71) = all_15_9_70
% 50.08/18.04  | (118) a_holds(all_15_1_62) = all_15_0_61
% 50.08/18.04  | (119) sent(a, all_15_14_75, all_15_4_65) = all_15_3_64
% 50.08/18.04  | (120) pair(all_15_14_75, all_15_13_74) = all_15_7_68
% 50.08/18.04  | (121) key(all_15_16_77, all_15_14_75) = all_15_1_62
% 50.08/18.04  | (122) a_stored(all_15_7_68) = all_15_6_67
% 50.08/18.04  |
% 50.08/18.04  | Instantiating (44) with all_17_0_80, all_17_1_81, all_17_2_82, all_17_3_83, all_17_4_84, all_17_5_85, all_17_6_86, all_17_7_87, all_17_8_88 yields:
% 50.08/18.04  | (123) intruder_holds(all_17_4_84) = all_17_3_83 & party_of_protocol(all_17_6_86) = all_17_2_82 & intruder_message(all_17_1_81) = all_17_0_80 & intruder_message(all_17_8_88) = all_17_5_85 & encrypt(all_17_8_88, all_17_7_87) = all_17_1_81 & key(all_17_7_87, all_17_6_86) = all_17_4_84 & ( ~ (all_17_2_82 = 0) |  ~ (all_17_3_83 = 0) |  ~ (all_17_5_85 = 0) | all_17_0_80 = 0)
% 50.08/18.04  |
% 50.08/18.04  | Applying alpha-rule on (123) yields:
% 50.08/18.04  | (124) party_of_protocol(all_17_6_86) = all_17_2_82
% 50.08/18.04  | (125) intruder_message(all_17_8_88) = all_17_5_85
% 50.08/18.04  | (126) encrypt(all_17_8_88, all_17_7_87) = all_17_1_81
% 50.08/18.04  | (127) key(all_17_7_87, all_17_6_86) = all_17_4_84
% 50.08/18.04  | (128) intruder_message(all_17_1_81) = all_17_0_80
% 50.08/18.04  | (129)  ~ (all_17_2_82 = 0) |  ~ (all_17_3_83 = 0) |  ~ (all_17_5_85 = 0) | all_17_0_80 = 0
% 50.08/18.04  | (130) intruder_holds(all_17_4_84) = all_17_3_83
% 50.08/18.04  |
% 50.08/18.04  | Instantiating (60) with all_19_0_89, all_19_1_90, all_19_2_91, all_19_3_92, all_19_4_93, all_19_5_94, all_19_6_95, all_19_7_96, all_19_8_97 yields:
% 50.08/18.04  | (131) intruder_holds(all_19_3_92) = all_19_2_91 & party_of_protocol(all_19_6_95) = all_19_1_90 & intruder_message(all_19_5_94) = all_19_4_93 & intruder_message(all_19_7_96) = all_19_0_89 & encrypt(all_19_8_97, all_19_7_96) = all_19_5_94 & key(all_19_7_96, all_19_6_95) = all_19_3_92 & ( ~ (all_19_1_90 = 0) |  ~ (all_19_2_91 = 0) |  ~ (all_19_4_93 = 0) | all_19_0_89 = 0)
% 50.08/18.04  |
% 50.08/18.04  | Applying alpha-rule on (131) yields:
% 50.08/18.04  | (132)  ~ (all_19_1_90 = 0) |  ~ (all_19_2_91 = 0) |  ~ (all_19_4_93 = 0) | all_19_0_89 = 0
% 50.08/18.04  | (133) key(all_19_7_96, all_19_6_95) = all_19_3_92
% 50.08/18.04  | (134) intruder_message(all_19_5_94) = all_19_4_93
% 50.08/18.04  | (135) intruder_message(all_19_7_96) = all_19_0_89
% 50.08/18.04  | (136) intruder_holds(all_19_3_92) = all_19_2_91
% 50.08/18.04  | (137) party_of_protocol(all_19_6_95) = all_19_1_90
% 50.08/18.05  | (138) encrypt(all_19_8_97, all_19_7_96) = all_19_5_94
% 50.08/18.05  |
% 50.08/18.05  | Instantiating (69) with all_21_0_98, all_21_1_99, all_21_2_100, all_21_3_101, all_21_4_102, all_21_5_103, all_21_6_104, all_21_7_105, all_21_8_106, all_21_9_107, all_21_10_108, all_21_11_109, all_21_12_110, all_21_13_111, all_21_14_112, all_21_15_113, all_21_16_114, all_21_17_115, all_21_18_116, all_21_19_117, all_21_20_118, all_21_21_119, all_21_22_120, all_21_23_121, all_21_24_122 yields:
% 50.08/18.05  | (139) t_holds(all_21_10_108) = all_21_9_107 & t_holds(all_21_12_110) = all_21_11_109 & a_nonce(all_21_21_119) = all_21_8_106 & generate_key(all_21_21_119) = all_21_7_105 & quadruple(all_21_24_122, all_21_21_119, all_21_7_105, all_21_20_118) = all_21_6_104 & triple(all_21_5_103, all_21_3_101, all_21_23_121) = all_21_2_100 & triple(all_21_22_120, all_21_7_105, all_21_20_118) = all_21_4_102 & triple(all_21_22_120, all_21_21_119, all_21_20_118) = all_21_17_115 & triple(all_21_24_122, all_21_23_121, all_21_16_114) = all_21_15_113 & encrypt(all_21_4_102, all_21_19_117) = all_21_3_101 & encrypt(all_21_6_104, all_21_18_116) = all_21_5_103 & encrypt(all_21_17_115, all_21_19_117) = all_21_16_114 & sent(all_21_24_122, t, all_21_15_113) = all_21_14_112 & sent(t, all_21_22_120, all_21_2_100) = all_21_1_99 & message(all_21_1_99) = all_21_0_98 & message(all_21_14_112) = all_21_13_111 & key(all_21_18_116, all_21_22_120) = all_21_10_108 & key(all_21_19_117, all_21_24_122) = all_21_12_110 & ( ~ (all_21_8_106 = 0) |  ~ (all_21_9_107 = 0) |  ~ (all_21_11_109 = 0) |  ~ (all_21_13_111 = 0) | all_21_0_98 = 0)
% 50.08/18.05  |
% 50.08/18.05  | Applying alpha-rule on (139) yields:
% 50.08/18.05  | (140) triple(all_21_22_120, all_21_7_105, all_21_20_118) = all_21_4_102
% 50.08/18.05  | (141) sent(all_21_24_122, t, all_21_15_113) = all_21_14_112
% 50.08/18.05  | (142) message(all_21_1_99) = all_21_0_98
% 50.08/18.05  | (143) key(all_21_18_116, all_21_22_120) = all_21_10_108
% 50.08/18.05  | (144) generate_key(all_21_21_119) = all_21_7_105
% 50.08/18.05  | (145) a_nonce(all_21_21_119) = all_21_8_106
% 50.08/18.05  | (146) key(all_21_19_117, all_21_24_122) = all_21_12_110
% 50.08/18.05  | (147) quadruple(all_21_24_122, all_21_21_119, all_21_7_105, all_21_20_118) = all_21_6_104
% 50.08/18.05  | (148) message(all_21_14_112) = all_21_13_111
% 50.08/18.05  | (149) sent(t, all_21_22_120, all_21_2_100) = all_21_1_99
% 50.08/18.05  | (150) t_holds(all_21_12_110) = all_21_11_109
% 50.08/18.05  | (151) encrypt(all_21_17_115, all_21_19_117) = all_21_16_114
% 50.08/18.05  | (152) triple(all_21_5_103, all_21_3_101, all_21_23_121) = all_21_2_100
% 50.08/18.05  | (153) t_holds(all_21_10_108) = all_21_9_107
% 50.08/18.05  | (154)  ~ (all_21_8_106 = 0) |  ~ (all_21_9_107 = 0) |  ~ (all_21_11_109 = 0) |  ~ (all_21_13_111 = 0) | all_21_0_98 = 0
% 50.08/18.05  | (155) encrypt(all_21_4_102, all_21_19_117) = all_21_3_101
% 50.08/18.05  | (156) encrypt(all_21_6_104, all_21_18_116) = all_21_5_103
% 50.08/18.05  | (157) triple(all_21_22_120, all_21_21_119, all_21_20_118) = all_21_17_115
% 50.08/18.05  | (158) triple(all_21_24_122, all_21_23_121, all_21_16_114) = all_21_15_113
% 50.08/18.05  |
% 50.08/18.05  | Instantiating formula (22) with all_13_10_56, all_13_11_57, all_13_12_58, all_13_13_59, all_13_14_60 and discharging atoms generate_expiration_time(all_13_12_58) = all_13_11_57, triple(all_13_13_59, all_13_14_60, all_13_11_57) = all_13_10_56, yields:
% 50.08/18.05  | (159)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] :  ? [v4] :  ? [v5] :  ? [v6] :  ? [v7] :  ? [v8] :  ? [v9] : (b_holds(v8) = v9 & generate_b_nonce(all_13_12_58) = v1 & b_stored(v6) = v7 & encrypt(v1, all_13_14_60) = v2 & encrypt(all_13_10_56, bt) = v0 & pair(v0, v2) = v3 & pair(all_13_13_59, all_13_12_58) = v6 & sent(all_13_13_59, b, v3) = v4 & message(v4) = v5 & key(all_13_14_60, all_13_13_59) = v8 & ( ~ (v7 = 0) |  ~ (v5 = 0) | v9 = 0))
% 50.08/18.05  |
% 50.08/18.05  | Instantiating formula (58) with all_11_5_37, all_11_6_38, all_11_12_44, all_11_13_45 and discharging atoms generate_expiration_time(all_11_12_44) = all_11_6_38, triple(all_11_13_45, all_11_12_44, all_11_6_38) = all_11_5_37, yields:
% 50.08/18.05  | (160)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] :  ? [v4] :  ? [v5] :  ? [v6] :  ? [v7] :  ? [v8] :  ? [v9] : (fresh_to_b(all_11_12_44) = v3 & generate_b_nonce(all_11_12_44) = v4 & b_stored(v0) = v9 & triple(b, v4, v5) = v6 & encrypt(all_11_5_37, bt) = v5 & pair(all_11_13_45, all_11_12_44) = v0 & sent(all_11_13_45, b, v0) = v1 & sent(b, t, v6) = v7 & message(v7) = v8 & message(v1) = v2 & ( ~ (v3 = 0) |  ~ (v2 = 0) | (v9 = 0 & v8 = 0)))
% 50.08/18.05  |
% 50.08/18.05  | Instantiating formula (22) with all_11_5_37, all_11_6_38, all_11_12_44, all_11_13_45, all_11_12_44 and discharging atoms generate_expiration_time(all_11_12_44) = all_11_6_38, triple(all_11_13_45, all_11_12_44, all_11_6_38) = all_11_5_37, yields:
% 50.08/18.05  | (161)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] :  ? [v4] :  ? [v5] :  ? [v6] :  ? [v7] :  ? [v8] :  ? [v9] : (b_holds(v8) = v9 & generate_b_nonce(all_11_12_44) = v1 & b_stored(v6) = v7 & encrypt(v1, all_11_12_44) = v2 & encrypt(all_11_5_37, bt) = v0 & pair(v0, v2) = v3 & pair(all_11_13_45, all_11_12_44) = v6 & sent(all_11_13_45, b, v3) = v4 & message(v4) = v5 & key(all_11_12_44, all_11_13_45) = v8 & ( ~ (v7 = 0) |  ~ (v5 = 0) | v9 = 0))
% 50.08/18.05  |
% 50.08/18.05  | Instantiating formula (40) with all_11_3_35, all_11_4_36, all_11_7_39, b and discharging atoms triple(b, all_11_7_39, all_11_4_36) = all_11_3_35, yields:
% 50.08/18.05  | (162)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (intruder_message(all_11_3_35) = v3 & intruder_message(all_11_4_36) = v2 & intruder_message(all_11_7_39) = v1 & intruder_message(b) = v0 & ( ~ (v2 = 0) |  ~ (v1 = 0) |  ~ (v0 = 0) | v3 = 0))
% 50.08/18.05  |
% 50.08/18.05  | Instantiating formula (68) with all_11_3_35, all_11_4_36, all_11_7_39, b and discharging atoms triple(b, all_11_7_39, all_11_4_36) = all_11_3_35, yields:
% 50.08/18.05  | (163)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (intruder_message(all_11_3_35) = v0 & intruder_message(all_11_4_36) = v3 & intruder_message(all_11_7_39) = v2 & intruder_message(b) = v1 & ( ~ (v0 = 0) | (v3 = 0 & v2 = 0 & v1 = 0)))
% 50.08/18.05  |
% 50.08/18.05  | Instantiating formula (7) with all_19_4_93, all_19_5_94, b, all_19_7_96, all_19_8_97 and discharging atoms party_of_protocol(b) = 0, intruder_message(all_19_5_94) = all_19_4_93, encrypt(all_19_8_97, all_19_7_96) = all_19_5_94, yields:
% 50.08/18.05  | (164) all_19_4_93 = 0 |  ? [v0] :  ? [v1] :  ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_19_8_97) = v0 & key(all_19_7_96, b) = v1 & ( ~ (v2 = 0) |  ~ (v0 = 0)))
% 50.08/18.06  |
% 50.08/18.06  | Instantiating formula (7) with all_19_4_93, all_19_5_94, a, all_19_7_96, all_19_8_97 and discharging atoms party_of_protocol(a) = 0, intruder_message(all_19_5_94) = all_19_4_93, encrypt(all_19_8_97, all_19_7_96) = all_19_5_94, yields:
% 50.08/18.06  | (165) all_19_4_93 = 0 |  ? [v0] :  ? [v1] :  ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_19_8_97) = v0 & key(all_19_7_96, a) = v1 & ( ~ (v2 = 0) |  ~ (v0 = 0)))
% 50.08/18.06  |
% 50.08/18.06  | Instantiating formula (7) with all_19_4_93, all_19_5_94, t, all_19_7_96, all_19_8_97 and discharging atoms party_of_protocol(t) = 0, intruder_message(all_19_5_94) = all_19_4_93, encrypt(all_19_8_97, all_19_7_96) = all_19_5_94, yields:
% 50.08/18.06  | (166) all_19_4_93 = 0 |  ? [v0] :  ? [v1] :  ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_19_8_97) = v0 & key(all_19_7_96, t) = v1 & ( ~ (v2 = 0) |  ~ (v0 = 0)))
% 50.08/18.06  |
% 50.08/18.06  | Instantiating formula (7) with all_17_0_80, all_17_1_81, b, all_17_7_87, all_17_8_88 and discharging atoms party_of_protocol(b) = 0, intruder_message(all_17_1_81) = all_17_0_80, encrypt(all_17_8_88, all_17_7_87) = all_17_1_81, yields:
% 50.08/18.06  | (167) all_17_0_80 = 0 |  ? [v0] :  ? [v1] :  ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_17_8_88) = v0 & key(all_17_7_87, b) = v1 & ( ~ (v2 = 0) |  ~ (v0 = 0)))
% 50.08/18.06  |
% 50.08/18.06  | Instantiating formula (7) with all_17_0_80, all_17_1_81, a, all_17_7_87, all_17_8_88 and discharging atoms party_of_protocol(a) = 0, intruder_message(all_17_1_81) = all_17_0_80, encrypt(all_17_8_88, all_17_7_87) = all_17_1_81, yields:
% 50.08/18.06  | (168) all_17_0_80 = 0 |  ? [v0] :  ? [v1] :  ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_17_8_88) = v0 & key(all_17_7_87, a) = v1 & ( ~ (v2 = 0) |  ~ (v0 = 0)))
% 50.08/18.06  |
% 50.08/18.06  | Instantiating formula (7) with all_17_0_80, all_17_1_81, t, all_17_7_87, all_17_8_88 and discharging atoms party_of_protocol(t) = 0, intruder_message(all_17_1_81) = all_17_0_80, encrypt(all_17_8_88, all_17_7_87) = all_17_1_81, yields:
% 50.08/18.06  | (169) all_17_0_80 = 0 |  ? [v0] :  ? [v1] :  ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_17_8_88) = v0 & key(all_17_7_87, t) = v1 & ( ~ (v2 = 0) |  ~ (v0 = 0)))
% 50.08/18.06  |
% 50.08/18.06  | Instantiating formula (70) with all_15_7_68, all_15_13_74, all_15_14_75 and discharging atoms pair(all_15_14_75, all_15_13_74) = all_15_7_68, yields:
% 50.08/18.06  | (170)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] :  ? [v4] :  ? [v5] :  ? [v6] :  ? [v7] :  ? [v8] :  ? [v9] :  ? [v10] : (fresh_to_b(all_15_13_74) = v2 & generate_b_nonce(all_15_13_74) = v3 & generate_expiration_time(all_15_13_74) = v4 & b_stored(all_15_7_68) = v10 & triple(all_15_14_75, all_15_13_74, v4) = v5 & triple(b, v3, v6) = v7 & encrypt(v5, bt) = v6 & sent(all_15_14_75, b, all_15_7_68) = v0 & sent(b, t, v7) = v8 & message(v8) = v9 & message(v0) = v1 & ( ~ (v2 = 0) |  ~ (v1 = 0) | (v10 = 0 & v9 = 0)))
% 50.08/18.06  |
% 50.08/18.06  | Instantiating formula (70) with all_15_4_65, all_15_5_66, all_15_15_76 and discharging atoms pair(all_15_15_76, all_15_5_66) = all_15_4_65, yields:
% 50.08/18.06  | (171)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] :  ? [v4] :  ? [v5] :  ? [v6] :  ? [v7] :  ? [v8] :  ? [v9] :  ? [v10] : (fresh_to_b(all_15_5_66) = v2 & generate_b_nonce(all_15_5_66) = v3 & generate_expiration_time(all_15_5_66) = v4 & b_stored(all_15_4_65) = v10 & triple(all_15_15_76, all_15_5_66, v4) = v5 & triple(b, v3, v6) = v7 & encrypt(v5, bt) = v6 & sent(all_15_15_76, b, all_15_4_65) = v0 & sent(b, t, v7) = v8 & message(v8) = v9 & message(v0) = v1 & ( ~ (v2 = 0) |  ~ (v1 = 0) | (v10 = 0 & v9 = 0)))
% 50.08/18.06  |
% 50.08/18.06  | Instantiating formula (70) with all_13_6_52, all_13_7_53, all_13_9_55 and discharging atoms pair(all_13_9_55, all_13_7_53) = all_13_6_52, yields:
% 50.08/18.06  | (172)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] :  ? [v4] :  ? [v5] :  ? [v6] :  ? [v7] :  ? [v8] :  ? [v9] :  ? [v10] : (fresh_to_b(all_13_7_53) = v2 & generate_b_nonce(all_13_7_53) = v3 & generate_expiration_time(all_13_7_53) = v4 & b_stored(all_13_6_52) = v10 & triple(all_13_9_55, all_13_7_53, v4) = v5 & triple(b, v3, v6) = v7 & encrypt(v5, bt) = v6 & sent(all_13_9_55, b, all_13_6_52) = v0 & sent(b, t, v7) = v8 & message(v8) = v9 & message(v0) = v1 & ( ~ (v2 = 0) |  ~ (v1 = 0) | (v10 = 0 & v9 = 0)))
% 50.08/18.06  |
% 50.08/18.06  | Instantiating formula (12) with all_13_6_52, all_13_7_53, all_13_9_55 and discharging atoms pair(all_13_9_55, all_13_7_53) = all_13_6_52, yields:
% 50.08/18.06  | (173)  ? [v0] :  ? [v1] :  ? [v2] : (intruder_message(all_13_6_52) = v2 & intruder_message(all_13_7_53) = v1 & intruder_message(all_13_9_55) = v0 & ( ~ (v1 = 0) |  ~ (v0 = 0) | v2 = 0))
% 50.08/18.06  |
% 50.08/18.06  | Instantiating formula (56) with all_13_6_52, all_13_7_53, all_13_9_55 and discharging atoms pair(all_13_9_55, all_13_7_53) = all_13_6_52, yields:
% 50.08/18.06  | (174)  ? [v0] :  ? [v1] :  ? [v2] : (intruder_message(all_13_6_52) = v0 & intruder_message(all_13_7_53) = v2 & intruder_message(all_13_9_55) = v1 & ( ~ (v0 = 0) | (v2 = 0 & v1 = 0)))
% 50.08/18.06  |
% 50.08/18.06  | Instantiating formula (70) with all_13_3_49, all_13_12_58, all_13_13_59 and discharging atoms pair(all_13_13_59, all_13_12_58) = all_13_3_49, yields:
% 50.08/18.06  | (175)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] :  ? [v4] :  ? [v5] :  ? [v6] :  ? [v7] :  ? [v8] :  ? [v9] :  ? [v10] : (fresh_to_b(all_13_12_58) = v2 & generate_b_nonce(all_13_12_58) = v3 & generate_expiration_time(all_13_12_58) = v4 & b_stored(all_13_3_49) = v10 & triple(all_13_13_59, all_13_12_58, v4) = v5 & triple(b, v3, v6) = v7 & encrypt(v5, bt) = v6 & sent(all_13_13_59, b, all_13_3_49) = v0 & sent(b, t, v7) = v8 & message(v8) = v9 & message(v0) = v1 & ( ~ (v2 = 0) |  ~ (v1 = 0) | (v10 = 0 & v9 = 0)))
% 50.43/18.06  |
% 50.43/18.06  | Instantiating formula (70) with all_0_3_3, an_a_nonce, b and discharging atoms pair(b, an_a_nonce) = all_0_3_3, yields:
% 50.43/18.06  | (176)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] :  ? [v4] :  ? [v5] :  ? [v6] :  ? [v7] :  ? [v8] :  ? [v9] :  ? [v10] : (fresh_to_b(an_a_nonce) = v2 & generate_b_nonce(an_a_nonce) = v3 & generate_expiration_time(an_a_nonce) = v4 & b_stored(all_0_3_3) = v10 & triple(b, v3, v6) = v7 & triple(b, an_a_nonce, v4) = v5 & encrypt(v5, bt) = v6 & sent(b, b, all_0_3_3) = v0 & sent(b, t, v7) = v8 & message(v8) = v9 & message(v0) = v1 & ( ~ (v2 = 0) |  ~ (v1 = 0) | (v10 = 0 & v9 = 0)))
% 50.43/18.06  |
% 50.43/18.06  | Instantiating formula (12) with all_0_3_3, an_a_nonce, b and discharging atoms pair(b, an_a_nonce) = all_0_3_3, yields:
% 50.43/18.06  | (177)  ? [v0] :  ? [v1] :  ? [v2] : (intruder_message(all_0_3_3) = v2 & intruder_message(an_a_nonce) = v1 & intruder_message(b) = v0 & ( ~ (v1 = 0) |  ~ (v0 = 0) | v2 = 0))
% 50.43/18.07  |
% 50.43/18.07  | Instantiating formula (56) with all_0_3_3, an_a_nonce, b and discharging atoms pair(b, an_a_nonce) = all_0_3_3, yields:
% 50.43/18.07  | (178)  ? [v0] :  ? [v1] :  ? [v2] : (intruder_message(all_0_3_3) = v0 & intruder_message(an_a_nonce) = v2 & intruder_message(b) = v1 & ( ~ (v0 = 0) | (v2 = 0 & v1 = 0)))
% 50.43/18.07  |
% 50.43/18.07  | Instantiating formula (70) with all_0_2_2, an_a_nonce, a and discharging atoms pair(a, an_a_nonce) = all_0_2_2, yields:
% 50.43/18.07  | (179)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] :  ? [v4] :  ? [v5] :  ? [v6] :  ? [v7] :  ? [v8] :  ? [v9] :  ? [v10] : (fresh_to_b(an_a_nonce) = v2 & generate_b_nonce(an_a_nonce) = v3 & generate_expiration_time(an_a_nonce) = v4 & b_stored(all_0_2_2) = v10 & triple(b, v3, v6) = v7 & triple(a, an_a_nonce, v4) = v5 & encrypt(v5, bt) = v6 & sent(b, t, v7) = v8 & sent(a, b, all_0_2_2) = v0 & message(v8) = v9 & message(v0) = v1 & ( ~ (v2 = 0) |  ~ (v1 = 0) | (v10 = 0 & v9 = 0)))
% 50.43/18.07  |
% 50.43/18.07  | Instantiating formula (12) with all_0_2_2, an_a_nonce, a and discharging atoms pair(a, an_a_nonce) = all_0_2_2, yields:
% 50.43/18.07  | (180)  ? [v0] :  ? [v1] :  ? [v2] : (intruder_message(all_0_2_2) = v2 & intruder_message(an_a_nonce) = v1 & intruder_message(a) = v0 & ( ~ (v1 = 0) |  ~ (v0 = 0) | v2 = 0))
% 50.45/18.07  |
% 50.45/18.07  | Instantiating formula (56) with all_0_2_2, an_a_nonce, a and discharging atoms pair(a, an_a_nonce) = all_0_2_2, yields:
% 50.45/18.07  | (181)  ? [v0] :  ? [v1] :  ? [v2] : (intruder_message(all_0_2_2) = v0 & intruder_message(an_a_nonce) = v2 & intruder_message(a) = v1 & ( ~ (v0 = 0) | (v2 = 0 & v1 = 0)))
% 50.45/18.07  |
% 50.45/18.07  | Instantiating formula (73) with all_21_14_112, t, all_21_24_122, all_21_15_113 and discharging atoms sent(all_21_24_122, t, all_21_15_113) = all_21_14_112, yields:
% 50.45/18.07  | (182)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (party_of_protocol(all_21_24_122) = v1 & party_of_protocol(t) = v2 & intruder_message(all_21_15_113) = v0 & message(all_21_14_112) = v3 & ( ~ (v2 = 0) |  ~ (v1 = 0) |  ~ (v0 = 0) | v3 = 0))
% 50.45/18.07  |
% 50.45/18.07  | Instantiating formula (73) with all_13_5_51, b, all_13_13_59, all_13_6_52 and discharging atoms sent(all_13_13_59, b, all_13_6_52) = all_13_5_51, yields:
% 50.45/18.07  | (183)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (party_of_protocol(all_13_13_59) = v1 & party_of_protocol(b) = v2 & intruder_message(all_13_6_52) = v0 & message(all_13_5_51) = v3 & ( ~ (v2 = 0) |  ~ (v1 = 0) |  ~ (v0 = 0) | v3 = 0))
% 50.45/18.07  |
% 50.45/18.07  | Instantiating formula (73) with all_11_10_42, b, all_11_13_45, all_11_11_43 and discharging atoms sent(all_11_13_45, b, all_11_11_43) = all_11_10_42, yields:
% 50.45/18.07  | (184)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (party_of_protocol(all_11_13_45) = v1 & party_of_protocol(b) = v2 & intruder_message(all_11_11_43) = v0 & message(all_11_10_42) = v3 & ( ~ (v2 = 0) |  ~ (v1 = 0) |  ~ (v0 = 0) | v3 = 0))
% 50.45/18.07  |
% 50.45/18.07  | Instantiating formula (73) with all_11_2_34, t, b, all_11_3_35 and discharging atoms sent(b, t, all_11_3_35) = all_11_2_34, yields:
% 50.45/18.07  | (185)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (party_of_protocol(b) = v1 & party_of_protocol(t) = v2 & intruder_message(all_11_3_35) = v0 & message(all_11_2_34) = v3 & ( ~ (v2 = 0) |  ~ (v1 = 0) |  ~ (v0 = 0) | v3 = 0))
% 50.45/18.07  |
% 50.45/18.07  | Instantiating formula (73) with all_15_3_64, all_15_14_75, a, all_15_4_65 and discharging atoms sent(a, all_15_14_75, all_15_4_65) = all_15_3_64, yields:
% 50.45/18.07  | (186)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (party_of_protocol(all_15_14_75) = v2 & party_of_protocol(a) = v1 & intruder_message(all_15_4_65) = v0 & message(all_15_3_64) = v3 & ( ~ (v2 = 0) |  ~ (v1 = 0) |  ~ (v0 = 0) | v3 = 0))
% 50.45/18.07  |
% 50.45/18.07  | Instantiating formula (73) with all_0_1_1, b, a, all_0_2_2 and discharging atoms sent(a, b, all_0_2_2) = all_0_1_1, yields:
% 50.45/18.07  | (187)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (party_of_protocol(b) = v2 & party_of_protocol(a) = v1 & intruder_message(all_0_2_2) = v0 & message(all_0_1_1) = v3 & ( ~ (v2 = 0) |  ~ (v1 = 0) |  ~ (v0 = 0) | v3 = 0))
% 50.45/18.07  |
% 50.45/18.07  | Instantiating formula (4) with all_0_1_1, all_0_2_2, b, a and discharging atoms sent(a, b, all_0_2_2) = all_0_1_1, yields:
% 50.45/18.07  | (188)  ? [v0] :  ? [v1] : (intruder_message(all_0_2_2) = v1 & message(all_0_1_1) = v0 & ( ~ (v0 = 0) | v1 = 0))
% 50.45/18.08  |
% 50.45/18.08  | Instantiating formula (73) with all_21_1_99, all_21_22_120, t, all_21_2_100 and discharging atoms sent(t, all_21_22_120, all_21_2_100) = all_21_1_99, yields:
% 50.45/18.08  | (189)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (party_of_protocol(all_21_22_120) = v2 & party_of_protocol(t) = v1 & intruder_message(all_21_2_100) = v0 & message(all_21_1_99) = v3 & ( ~ (v2 = 0) |  ~ (v1 = 0) |  ~ (v0 = 0) | v3 = 0))
% 50.45/18.08  |
% 50.45/18.08  | Instantiating formula (73) with all_15_9_70, a, t, all_15_10_71 and discharging atoms sent(t, a, all_15_10_71) = all_15_9_70, yields:
% 50.45/18.08  | (190)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (party_of_protocol(a) = v2 & party_of_protocol(t) = v1 & intruder_message(all_15_10_71) = v0 & message(all_15_9_70) = v3 & ( ~ (v2 = 0) |  ~ (v1 = 0) |  ~ (v0 = 0) | v3 = 0))
% 50.45/18.08  |
% 50.45/18.08  | Instantiating formula (57) with all_3_3_10, b, all_3_4_11 and discharging atoms key(all_3_4_11, b) = all_3_3_10, yields:
% 50.45/18.08  | (191)  ? [v0] :  ? [v1] :  ? [v2] : (intruder_holds(all_3_3_10) = v2 & party_of_protocol(b) = v1 & intruder_message(all_3_4_11) = v0 & ( ~ (v1 = 0) |  ~ (v0 = 0) | v2 = 0))
% 50.45/18.08  |
% 50.45/18.08  | Instantiating formula (57) with all_3_1_8, a, all_3_4_11 and discharging atoms key(all_3_4_11, a) = all_3_1_8, yields:
% 50.45/18.08  | (192)  ? [v0] :  ? [v1] :  ? [v2] : (intruder_holds(all_3_1_8) = v2 & party_of_protocol(a) = v1 & intruder_message(all_3_4_11) = v0 & ( ~ (v1 = 0) |  ~ (v0 = 0) | v2 = 0))
% 50.45/18.08  |
% 50.45/18.08  | Instantiating formula (39) with all_0_6_6, bt and discharging atoms key(bt, b) = all_0_6_6, yields:
% 50.45/18.08  | (193)  ? [v0] :  ? [v1] :  ? [v2] : (intruder_holds(all_0_6_6) = v0 & b_holds(v1) = v2 & key(bt, a) = v1 & ( ~ (v2 = 0) |  ~ (v0 = 0)))
% 50.45/18.08  |
% 50.45/18.08  | Instantiating formula (57) with all_0_6_6, b, bt and discharging atoms key(bt, b) = all_0_6_6, yields:
% 50.45/18.08  | (194)  ? [v0] :  ? [v1] :  ? [v2] : (intruder_holds(all_0_6_6) = v2 & party_of_protocol(b) = v1 & intruder_message(bt) = v0 & ( ~ (v1 = 0) |  ~ (v0 = 0) | v2 = 0))
% 50.45/18.08  |
% 50.45/18.08  | Instantiating formula (57) with all_0_4_4, t, bt and discharging atoms key(bt, t) = all_0_4_4, yields:
% 50.45/18.08  | (195)  ? [v0] :  ? [v1] :  ? [v2] : (intruder_holds(all_0_4_4) = v2 & party_of_protocol(t) = v1 & intruder_message(bt) = v0 & ( ~ (v1 = 0) |  ~ (v0 = 0) | v2 = 0))
% 50.45/18.08  |
% 50.45/18.08  | Instantiating formula (62) with all_0_5_5, at and discharging atoms key(at, a) = all_0_5_5, yields:
% 50.45/18.08  | (196)  ? [v0] :  ? [v1] :  ? [v2] : (intruder_holds(v0) = v1 & b_holds(all_0_5_5) = v2 & key(at, b) = v0 & ( ~ (v2 = 0) |  ~ (v1 = 0)))
% 50.45/18.08  |
% 50.45/18.08  | Instantiating formula (57) with all_0_5_5, a, at and discharging atoms key(at, a) = all_0_5_5, yields:
% 50.45/18.08  | (197)  ? [v0] :  ? [v1] :  ? [v2] : (intruder_holds(all_0_5_5) = v2 & party_of_protocol(a) = v1 & intruder_message(at) = v0 & ( ~ (v1 = 0) |  ~ (v0 = 0) | v2 = 0))
% 50.45/18.08  |
% 50.45/18.08  | Instantiating formula (57) with all_0_0_0, t, at and discharging atoms key(at, t) = all_0_0_0, yields:
% 50.45/18.08  | (198)  ? [v0] :  ? [v1] :  ? [v2] : (intruder_holds(all_0_0_0) = v2 & party_of_protocol(t) = v1 & intruder_message(at) = v0 & ( ~ (v1 = 0) |  ~ (v0 = 0) | v2 = 0))
% 50.45/18.08  |
% 50.45/18.08  | Instantiating (198) with all_29_0_123, all_29_1_124, all_29_2_125 yields:
% 50.45/18.08  | (199) intruder_holds(all_0_0_0) = all_29_0_123 & party_of_protocol(t) = all_29_1_124 & intruder_message(at) = all_29_2_125 & ( ~ (all_29_1_124 = 0) |  ~ (all_29_2_125 = 0) | all_29_0_123 = 0)
% 50.45/18.08  |
% 50.45/18.08  | Applying alpha-rule on (199) yields:
% 50.45/18.08  | (200) intruder_holds(all_0_0_0) = all_29_0_123
% 50.45/18.08  | (201) party_of_protocol(t) = all_29_1_124
% 50.45/18.08  | (202) intruder_message(at) = all_29_2_125
% 50.45/18.08  | (203)  ~ (all_29_1_124 = 0) |  ~ (all_29_2_125 = 0) | all_29_0_123 = 0
% 50.45/18.08  |
% 50.45/18.08  | Instantiating (197) with all_31_0_126, all_31_1_127, all_31_2_128 yields:
% 50.45/18.08  | (204) intruder_holds(all_0_5_5) = all_31_0_126 & party_of_protocol(a) = all_31_1_127 & intruder_message(at) = all_31_2_128 & ( ~ (all_31_1_127 = 0) |  ~ (all_31_2_128 = 0) | all_31_0_126 = 0)
% 50.45/18.08  |
% 50.45/18.08  | Applying alpha-rule on (204) yields:
% 50.45/18.08  | (205) intruder_holds(all_0_5_5) = all_31_0_126
% 50.45/18.08  | (206) party_of_protocol(a) = all_31_1_127
% 50.45/18.08  | (207) intruder_message(at) = all_31_2_128
% 50.45/18.08  | (208)  ~ (all_31_1_127 = 0) |  ~ (all_31_2_128 = 0) | all_31_0_126 = 0
% 50.45/18.08  |
% 50.45/18.08  | Instantiating (192) with all_33_0_129, all_33_1_130, all_33_2_131 yields:
% 50.45/18.08  | (209) intruder_holds(all_3_1_8) = all_33_0_129 & party_of_protocol(a) = all_33_1_130 & intruder_message(all_3_4_11) = all_33_2_131 & ( ~ (all_33_1_130 = 0) |  ~ (all_33_2_131 = 0) | all_33_0_129 = 0)
% 50.45/18.08  |
% 50.45/18.08  | Applying alpha-rule on (209) yields:
% 50.45/18.08  | (210) intruder_holds(all_3_1_8) = all_33_0_129
% 50.45/18.08  | (211) party_of_protocol(a) = all_33_1_130
% 50.45/18.08  | (212) intruder_message(all_3_4_11) = all_33_2_131
% 50.45/18.08  | (213)  ~ (all_33_1_130 = 0) |  ~ (all_33_2_131 = 0) | all_33_0_129 = 0
% 50.45/18.08  |
% 50.45/18.08  | Instantiating (191) with all_37_0_135, all_37_1_136, all_37_2_137 yields:
% 50.45/18.08  | (214) intruder_holds(all_3_3_10) = all_37_0_135 & party_of_protocol(b) = all_37_1_136 & intruder_message(all_3_4_11) = all_37_2_137 & ( ~ (all_37_1_136 = 0) |  ~ (all_37_2_137 = 0) | all_37_0_135 = 0)
% 50.45/18.08  |
% 50.45/18.08  | Applying alpha-rule on (214) yields:
% 50.45/18.08  | (215) intruder_holds(all_3_3_10) = all_37_0_135
% 50.45/18.08  | (216) party_of_protocol(b) = all_37_1_136
% 50.45/18.08  | (217) intruder_message(all_3_4_11) = all_37_2_137
% 50.45/18.08  | (218)  ~ (all_37_1_136 = 0) |  ~ (all_37_2_137 = 0) | all_37_0_135 = 0
% 50.45/18.08  |
% 50.45/18.08  | Instantiating (184) with all_47_0_151, all_47_1_152, all_47_2_153, all_47_3_154 yields:
% 50.45/18.08  | (219) party_of_protocol(all_11_13_45) = all_47_2_153 & party_of_protocol(b) = all_47_1_152 & intruder_message(all_11_11_43) = all_47_3_154 & message(all_11_10_42) = all_47_0_151 & ( ~ (all_47_1_152 = 0) |  ~ (all_47_2_153 = 0) |  ~ (all_47_3_154 = 0) | all_47_0_151 = 0)
% 50.45/18.08  |
% 50.45/18.08  | Applying alpha-rule on (219) yields:
% 50.45/18.08  | (220) party_of_protocol(all_11_13_45) = all_47_2_153
% 50.45/18.08  | (221)  ~ (all_47_1_152 = 0) |  ~ (all_47_2_153 = 0) |  ~ (all_47_3_154 = 0) | all_47_0_151 = 0
% 50.45/18.08  | (222) intruder_message(all_11_11_43) = all_47_3_154
% 50.45/18.08  | (223) message(all_11_10_42) = all_47_0_151
% 50.45/18.08  | (224) party_of_protocol(b) = all_47_1_152
% 50.45/18.08  |
% 50.45/18.08  | Instantiating (190) with all_51_0_157, all_51_1_158, all_51_2_159, all_51_3_160 yields:
% 50.45/18.08  | (225) party_of_protocol(a) = all_51_1_158 & party_of_protocol(t) = all_51_2_159 & intruder_message(all_15_10_71) = all_51_3_160 & message(all_15_9_70) = all_51_0_157 & ( ~ (all_51_1_158 = 0) |  ~ (all_51_2_159 = 0) |  ~ (all_51_3_160 = 0) | all_51_0_157 = 0)
% 50.45/18.09  |
% 50.45/18.09  | Applying alpha-rule on (225) yields:
% 50.45/18.09  | (226) intruder_message(all_15_10_71) = all_51_3_160
% 50.45/18.09  | (227) message(all_15_9_70) = all_51_0_157
% 50.45/18.09  | (228) party_of_protocol(t) = all_51_2_159
% 50.45/18.09  | (229)  ~ (all_51_1_158 = 0) |  ~ (all_51_2_159 = 0) |  ~ (all_51_3_160 = 0) | all_51_0_157 = 0
% 50.45/18.09  | (230) party_of_protocol(a) = all_51_1_158
% 50.45/18.09  |
% 50.45/18.09  | Instantiating (189) with all_55_0_163, all_55_1_164, all_55_2_165, all_55_3_166 yields:
% 50.45/18.09  | (231) party_of_protocol(all_21_22_120) = all_55_1_164 & party_of_protocol(t) = all_55_2_165 & intruder_message(all_21_2_100) = all_55_3_166 & message(all_21_1_99) = all_55_0_163 & ( ~ (all_55_1_164 = 0) |  ~ (all_55_2_165 = 0) |  ~ (all_55_3_166 = 0) | all_55_0_163 = 0)
% 50.45/18.09  |
% 50.45/18.09  | Applying alpha-rule on (231) yields:
% 50.45/18.09  | (232) intruder_message(all_21_2_100) = all_55_3_166
% 50.45/18.09  | (233) party_of_protocol(all_21_22_120) = all_55_1_164
% 50.45/18.09  | (234) message(all_21_1_99) = all_55_0_163
% 50.45/18.09  | (235) party_of_protocol(t) = all_55_2_165
% 50.45/18.09  | (236)  ~ (all_55_1_164 = 0) |  ~ (all_55_2_165 = 0) |  ~ (all_55_3_166 = 0) | all_55_0_163 = 0
% 50.45/18.09  |
% 50.45/18.09  | Instantiating (188) with all_57_0_167, all_57_1_168 yields:
% 50.45/18.09  | (237) intruder_message(all_0_2_2) = all_57_0_167 & message(all_0_1_1) = all_57_1_168 & ( ~ (all_57_1_168 = 0) | all_57_0_167 = 0)
% 50.45/18.09  |
% 50.45/18.09  | Applying alpha-rule on (237) yields:
% 50.45/18.09  | (238) intruder_message(all_0_2_2) = all_57_0_167
% 50.45/18.09  | (239) message(all_0_1_1) = all_57_1_168
% 50.45/18.09  | (240)  ~ (all_57_1_168 = 0) | all_57_0_167 = 0
% 50.45/18.09  |
% 50.45/18.09  | Instantiating (180) with all_59_0_169, all_59_1_170, all_59_2_171 yields:
% 50.45/18.09  | (241) intruder_message(all_0_2_2) = all_59_0_169 & intruder_message(an_a_nonce) = all_59_1_170 & intruder_message(a) = all_59_2_171 & ( ~ (all_59_1_170 = 0) |  ~ (all_59_2_171 = 0) | all_59_0_169 = 0)
% 50.45/18.09  |
% 50.45/18.09  | Applying alpha-rule on (241) yields:
% 50.45/18.09  | (242) intruder_message(all_0_2_2) = all_59_0_169
% 50.45/18.09  | (243) intruder_message(an_a_nonce) = all_59_1_170
% 50.45/18.09  | (244) intruder_message(a) = all_59_2_171
% 50.45/18.09  | (245)  ~ (all_59_1_170 = 0) |  ~ (all_59_2_171 = 0) | all_59_0_169 = 0
% 50.45/18.09  |
% 50.45/18.09  | Instantiating (179) with all_61_0_172, all_61_1_173, all_61_2_174, all_61_3_175, all_61_4_176, all_61_5_177, all_61_6_178, all_61_7_179, all_61_8_180, all_61_9_181, all_61_10_182 yields:
% 50.45/18.09  | (246) fresh_to_b(an_a_nonce) = all_61_8_180 & generate_b_nonce(an_a_nonce) = all_61_7_179 & generate_expiration_time(an_a_nonce) = all_61_6_178 & b_stored(all_0_2_2) = all_61_0_172 & triple(b, all_61_7_179, all_61_4_176) = all_61_3_175 & triple(a, an_a_nonce, all_61_6_178) = all_61_5_177 & encrypt(all_61_5_177, bt) = all_61_4_176 & sent(b, t, all_61_3_175) = all_61_2_174 & sent(a, b, all_0_2_2) = all_61_10_182 & message(all_61_2_174) = all_61_1_173 & message(all_61_10_182) = all_61_9_181 & ( ~ (all_61_8_180 = 0) |  ~ (all_61_9_181 = 0) | (all_61_0_172 = 0 & all_61_1_173 = 0))
% 50.45/18.09  |
% 50.45/18.09  | Applying alpha-rule on (246) yields:
% 50.45/18.09  | (247) fresh_to_b(an_a_nonce) = all_61_8_180
% 50.45/18.09  | (248) triple(b, all_61_7_179, all_61_4_176) = all_61_3_175
% 50.45/18.09  | (249) sent(a, b, all_0_2_2) = all_61_10_182
% 50.45/18.09  | (250) b_stored(all_0_2_2) = all_61_0_172
% 50.45/18.09  | (251)  ~ (all_61_8_180 = 0) |  ~ (all_61_9_181 = 0) | (all_61_0_172 = 0 & all_61_1_173 = 0)
% 50.45/18.09  | (252) message(all_61_10_182) = all_61_9_181
% 50.45/18.09  | (253) generate_expiration_time(an_a_nonce) = all_61_6_178
% 50.45/18.09  | (254) message(all_61_2_174) = all_61_1_173
% 50.45/18.09  | (255) triple(a, an_a_nonce, all_61_6_178) = all_61_5_177
% 50.45/18.09  | (256) encrypt(all_61_5_177, bt) = all_61_4_176
% 50.45/18.09  | (257) sent(b, t, all_61_3_175) = all_61_2_174
% 50.45/18.09  | (258) generate_b_nonce(an_a_nonce) = all_61_7_179
% 50.45/18.09  |
% 50.45/18.09  | Instantiating (176) with all_63_0_183, all_63_1_184, all_63_2_185, all_63_3_186, all_63_4_187, all_63_5_188, all_63_6_189, all_63_7_190, all_63_8_191, all_63_9_192, all_63_10_193 yields:
% 50.45/18.09  | (259) fresh_to_b(an_a_nonce) = all_63_8_191 & generate_b_nonce(an_a_nonce) = all_63_7_190 & generate_expiration_time(an_a_nonce) = all_63_6_189 & b_stored(all_0_3_3) = all_63_0_183 & triple(b, all_63_7_190, all_63_4_187) = all_63_3_186 & triple(b, an_a_nonce, all_63_6_189) = all_63_5_188 & encrypt(all_63_5_188, bt) = all_63_4_187 & sent(b, b, all_0_3_3) = all_63_10_193 & sent(b, t, all_63_3_186) = all_63_2_185 & message(all_63_2_185) = all_63_1_184 & message(all_63_10_193) = all_63_9_192 & ( ~ (all_63_8_191 = 0) |  ~ (all_63_9_192 = 0) | (all_63_0_183 = 0 & all_63_1_184 = 0))
% 50.45/18.09  |
% 50.45/18.09  | Applying alpha-rule on (259) yields:
% 50.45/18.09  | (260) sent(b, b, all_0_3_3) = all_63_10_193
% 50.45/18.09  | (261) fresh_to_b(an_a_nonce) = all_63_8_191
% 50.45/18.09  | (262) generate_expiration_time(an_a_nonce) = all_63_6_189
% 50.45/18.09  | (263) generate_b_nonce(an_a_nonce) = all_63_7_190
% 50.45/18.09  | (264) message(all_63_10_193) = all_63_9_192
% 50.45/18.09  | (265) triple(b, all_63_7_190, all_63_4_187) = all_63_3_186
% 50.45/18.09  | (266)  ~ (all_63_8_191 = 0) |  ~ (all_63_9_192 = 0) | (all_63_0_183 = 0 & all_63_1_184 = 0)
% 50.45/18.09  | (267) message(all_63_2_185) = all_63_1_184
% 50.45/18.09  | (268) sent(b, t, all_63_3_186) = all_63_2_185
% 50.45/18.09  | (269) triple(b, an_a_nonce, all_63_6_189) = all_63_5_188
% 50.45/18.09  | (270) encrypt(all_63_5_188, bt) = all_63_4_187
% 50.45/18.09  | (271) b_stored(all_0_3_3) = all_63_0_183
% 50.45/18.09  |
% 50.45/18.09  | Instantiating (178) with all_67_0_197, all_67_1_198, all_67_2_199 yields:
% 50.45/18.09  | (272) intruder_message(all_0_3_3) = all_67_2_199 & intruder_message(an_a_nonce) = all_67_0_197 & intruder_message(b) = all_67_1_198 & ( ~ (all_67_2_199 = 0) | (all_67_0_197 = 0 & all_67_1_198 = 0))
% 50.45/18.09  |
% 50.45/18.09  | Applying alpha-rule on (272) yields:
% 50.45/18.09  | (273) intruder_message(all_0_3_3) = all_67_2_199
% 50.45/18.09  | (274) intruder_message(an_a_nonce) = all_67_0_197
% 50.45/18.09  | (275) intruder_message(b) = all_67_1_198
% 50.45/18.09  | (276)  ~ (all_67_2_199 = 0) | (all_67_0_197 = 0 & all_67_1_198 = 0)
% 50.45/18.09  |
% 50.45/18.09  | Instantiating (183) with all_71_0_202, all_71_1_203, all_71_2_204, all_71_3_205 yields:
% 50.45/18.09  | (277) party_of_protocol(all_13_13_59) = all_71_2_204 & party_of_protocol(b) = all_71_1_203 & intruder_message(all_13_6_52) = all_71_3_205 & message(all_13_5_51) = all_71_0_202 & ( ~ (all_71_1_203 = 0) |  ~ (all_71_2_204 = 0) |  ~ (all_71_3_205 = 0) | all_71_0_202 = 0)
% 50.45/18.09  |
% 50.45/18.09  | Applying alpha-rule on (277) yields:
% 50.45/18.09  | (278) party_of_protocol(all_13_13_59) = all_71_2_204
% 50.45/18.09  | (279) message(all_13_5_51) = all_71_0_202
% 50.45/18.09  | (280) party_of_protocol(b) = all_71_1_203
% 50.45/18.09  | (281)  ~ (all_71_1_203 = 0) |  ~ (all_71_2_204 = 0) |  ~ (all_71_3_205 = 0) | all_71_0_202 = 0
% 50.45/18.09  | (282) intruder_message(all_13_6_52) = all_71_3_205
% 50.45/18.09  |
% 50.45/18.09  | Instantiating (182) with all_75_0_208, all_75_1_209, all_75_2_210, all_75_3_211 yields:
% 50.45/18.09  | (283) party_of_protocol(all_21_24_122) = all_75_2_210 & party_of_protocol(t) = all_75_1_209 & intruder_message(all_21_15_113) = all_75_3_211 & message(all_21_14_112) = all_75_0_208 & ( ~ (all_75_1_209 = 0) |  ~ (all_75_2_210 = 0) |  ~ (all_75_3_211 = 0) | all_75_0_208 = 0)
% 50.45/18.09  |
% 50.45/18.09  | Applying alpha-rule on (283) yields:
% 50.45/18.09  | (284) party_of_protocol(t) = all_75_1_209
% 50.45/18.09  | (285) party_of_protocol(all_21_24_122) = all_75_2_210
% 50.45/18.09  | (286)  ~ (all_75_1_209 = 0) |  ~ (all_75_2_210 = 0) |  ~ (all_75_3_211 = 0) | all_75_0_208 = 0
% 50.45/18.09  | (287) message(all_21_14_112) = all_75_0_208
% 50.45/18.09  | (288) intruder_message(all_21_15_113) = all_75_3_211
% 50.45/18.09  |
% 50.45/18.09  | Instantiating (177) with all_77_0_212, all_77_1_213, all_77_2_214 yields:
% 50.45/18.09  | (289) intruder_message(all_0_3_3) = all_77_0_212 & intruder_message(an_a_nonce) = all_77_1_213 & intruder_message(b) = all_77_2_214 & ( ~ (all_77_1_213 = 0) |  ~ (all_77_2_214 = 0) | all_77_0_212 = 0)
% 50.45/18.09  |
% 50.45/18.09  | Applying alpha-rule on (289) yields:
% 50.45/18.09  | (290) intruder_message(all_0_3_3) = all_77_0_212
% 50.45/18.09  | (291) intruder_message(an_a_nonce) = all_77_1_213
% 50.45/18.10  | (292) intruder_message(b) = all_77_2_214
% 50.45/18.10  | (293)  ~ (all_77_1_213 = 0) |  ~ (all_77_2_214 = 0) | all_77_0_212 = 0
% 50.45/18.10  |
% 50.45/18.10  | Instantiating (181) with all_81_0_218, all_81_1_219, all_81_2_220 yields:
% 50.45/18.10  | (294) intruder_message(all_0_2_2) = all_81_2_220 & intruder_message(an_a_nonce) = all_81_0_218 & intruder_message(a) = all_81_1_219 & ( ~ (all_81_2_220 = 0) | (all_81_0_218 = 0 & all_81_1_219 = 0))
% 50.45/18.10  |
% 50.45/18.10  | Applying alpha-rule on (294) yields:
% 50.45/18.10  | (295) intruder_message(all_0_2_2) = all_81_2_220
% 50.45/18.10  | (296) intruder_message(an_a_nonce) = all_81_0_218
% 50.45/18.10  | (297) intruder_message(a) = all_81_1_219
% 50.45/18.10  | (298)  ~ (all_81_2_220 = 0) | (all_81_0_218 = 0 & all_81_1_219 = 0)
% 50.45/18.10  |
% 50.45/18.10  | Instantiating (187) with all_85_0_224, all_85_1_225, all_85_2_226, all_85_3_227 yields:
% 50.45/18.10  | (299) party_of_protocol(b) = all_85_1_225 & party_of_protocol(a) = all_85_2_226 & intruder_message(all_0_2_2) = all_85_3_227 & message(all_0_1_1) = all_85_0_224 & ( ~ (all_85_1_225 = 0) |  ~ (all_85_2_226 = 0) |  ~ (all_85_3_227 = 0) | all_85_0_224 = 0)
% 50.45/18.10  |
% 50.45/18.10  | Applying alpha-rule on (299) yields:
% 50.45/18.10  | (300) party_of_protocol(b) = all_85_1_225
% 50.45/18.10  | (301) message(all_0_1_1) = all_85_0_224
% 50.45/18.10  | (302)  ~ (all_85_1_225 = 0) |  ~ (all_85_2_226 = 0) |  ~ (all_85_3_227 = 0) | all_85_0_224 = 0
% 50.45/18.10  | (303) intruder_message(all_0_2_2) = all_85_3_227
% 50.45/18.10  | (304) party_of_protocol(a) = all_85_2_226
% 50.45/18.10  |
% 50.45/18.10  | Instantiating (185) with all_89_0_230, all_89_1_231, all_89_2_232, all_89_3_233 yields:
% 50.45/18.10  | (305) party_of_protocol(b) = all_89_2_232 & party_of_protocol(t) = all_89_1_231 & intruder_message(all_11_3_35) = all_89_3_233 & message(all_11_2_34) = all_89_0_230 & ( ~ (all_89_1_231 = 0) |  ~ (all_89_2_232 = 0) |  ~ (all_89_3_233 = 0) | all_89_0_230 = 0)
% 50.45/18.10  |
% 50.45/18.10  | Applying alpha-rule on (305) yields:
% 50.45/18.10  | (306)  ~ (all_89_1_231 = 0) |  ~ (all_89_2_232 = 0) |  ~ (all_89_3_233 = 0) | all_89_0_230 = 0
% 50.45/18.10  | (307) message(all_11_2_34) = all_89_0_230
% 50.45/18.10  | (308) party_of_protocol(t) = all_89_1_231
% 50.45/18.10  | (309) party_of_protocol(b) = all_89_2_232
% 50.45/18.10  | (310) intruder_message(all_11_3_35) = all_89_3_233
% 50.45/18.10  |
% 50.45/18.10  | Instantiating (186) with all_95_0_240, all_95_1_241, all_95_2_242, all_95_3_243 yields:
% 50.45/18.10  | (311) party_of_protocol(all_15_14_75) = all_95_1_241 & party_of_protocol(a) = all_95_2_242 & intruder_message(all_15_4_65) = all_95_3_243 & message(all_15_3_64) = all_95_0_240 & ( ~ (all_95_1_241 = 0) |  ~ (all_95_2_242 = 0) |  ~ (all_95_3_243 = 0) | all_95_0_240 = 0)
% 50.45/18.10  |
% 50.45/18.10  | Applying alpha-rule on (311) yields:
% 50.45/18.10  | (312) party_of_protocol(a) = all_95_2_242
% 50.45/18.10  | (313)  ~ (all_95_1_241 = 0) |  ~ (all_95_2_242 = 0) |  ~ (all_95_3_243 = 0) | all_95_0_240 = 0
% 50.45/18.10  | (314) party_of_protocol(all_15_14_75) = all_95_1_241
% 50.45/18.10  | (315) intruder_message(all_15_4_65) = all_95_3_243
% 50.45/18.10  | (316) message(all_15_3_64) = all_95_0_240
% 50.45/18.10  |
% 50.45/18.10  | Instantiating (196) with all_103_0_259, all_103_1_260, all_103_2_261 yields:
% 50.45/18.10  | (317) intruder_holds(all_103_2_261) = all_103_1_260 & b_holds(all_0_5_5) = all_103_0_259 & key(at, b) = all_103_2_261 & ( ~ (all_103_0_259 = 0) |  ~ (all_103_1_260 = 0))
% 50.45/18.10  |
% 50.45/18.10  | Applying alpha-rule on (317) yields:
% 50.45/18.10  | (318) intruder_holds(all_103_2_261) = all_103_1_260
% 50.45/18.10  | (319) b_holds(all_0_5_5) = all_103_0_259
% 50.45/18.10  | (320) key(at, b) = all_103_2_261
% 50.45/18.10  | (321)  ~ (all_103_0_259 = 0) |  ~ (all_103_1_260 = 0)
% 50.45/18.10  |
% 50.45/18.10  | Instantiating (194) with all_105_0_262, all_105_1_263, all_105_2_264 yields:
% 50.45/18.10  | (322) intruder_holds(all_0_6_6) = all_105_0_262 & party_of_protocol(b) = all_105_1_263 & intruder_message(bt) = all_105_2_264 & ( ~ (all_105_1_263 = 0) |  ~ (all_105_2_264 = 0) | all_105_0_262 = 0)
% 50.45/18.10  |
% 50.45/18.10  | Applying alpha-rule on (322) yields:
% 50.45/18.10  | (323) intruder_holds(all_0_6_6) = all_105_0_262
% 50.45/18.10  | (324) party_of_protocol(b) = all_105_1_263
% 50.45/18.10  | (325) intruder_message(bt) = all_105_2_264
% 50.45/18.10  | (326)  ~ (all_105_1_263 = 0) |  ~ (all_105_2_264 = 0) | all_105_0_262 = 0
% 50.45/18.10  |
% 50.45/18.10  | Instantiating (193) with all_109_0_267, all_109_1_268, all_109_2_269 yields:
% 50.45/18.10  | (327) intruder_holds(all_0_6_6) = all_109_2_269 & b_holds(all_109_1_268) = all_109_0_267 & key(bt, a) = all_109_1_268 & ( ~ (all_109_0_267 = 0) |  ~ (all_109_2_269 = 0))
% 50.45/18.10  |
% 50.45/18.10  | Applying alpha-rule on (327) yields:
% 50.45/18.10  | (328) intruder_holds(all_0_6_6) = all_109_2_269
% 50.45/18.10  | (329) b_holds(all_109_1_268) = all_109_0_267
% 50.45/18.10  | (330) key(bt, a) = all_109_1_268
% 50.45/18.10  | (331)  ~ (all_109_0_267 = 0) |  ~ (all_109_2_269 = 0)
% 50.45/18.10  |
% 50.45/18.10  | Instantiating (195) with all_111_0_270, all_111_1_271, all_111_2_272 yields:
% 50.45/18.10  | (332) intruder_holds(all_0_4_4) = all_111_0_270 & party_of_protocol(t) = all_111_1_271 & intruder_message(bt) = all_111_2_272 & ( ~ (all_111_1_271 = 0) |  ~ (all_111_2_272 = 0) | all_111_0_270 = 0)
% 50.62/18.10  |
% 50.62/18.10  | Applying alpha-rule on (332) yields:
% 50.62/18.10  | (333) intruder_holds(all_0_4_4) = all_111_0_270
% 50.62/18.10  | (334) party_of_protocol(t) = all_111_1_271
% 50.62/18.10  | (335) intruder_message(bt) = all_111_2_272
% 50.62/18.10  | (336)  ~ (all_111_1_271 = 0) |  ~ (all_111_2_272 = 0) | all_111_0_270 = 0
% 50.62/18.10  |
% 50.62/18.10  | Instantiating (163) with all_123_0_297, all_123_1_298, all_123_2_299, all_123_3_300 yields:
% 50.62/18.10  | (337) intruder_message(all_11_3_35) = all_123_3_300 & intruder_message(all_11_4_36) = all_123_0_297 & intruder_message(all_11_7_39) = all_123_1_298 & intruder_message(b) = all_123_2_299 & ( ~ (all_123_3_300 = 0) | (all_123_0_297 = 0 & all_123_1_298 = 0 & all_123_2_299 = 0))
% 50.62/18.10  |
% 50.62/18.10  | Applying alpha-rule on (337) yields:
% 50.62/18.10  | (338)  ~ (all_123_3_300 = 0) | (all_123_0_297 = 0 & all_123_1_298 = 0 & all_123_2_299 = 0)
% 50.62/18.10  | (339) intruder_message(b) = all_123_2_299
% 50.62/18.10  | (340) intruder_message(all_11_4_36) = all_123_0_297
% 50.62/18.10  | (341) intruder_message(all_11_7_39) = all_123_1_298
% 50.62/18.10  | (342) intruder_message(all_11_3_35) = all_123_3_300
% 50.62/18.10  |
% 50.62/18.10  | Instantiating (162) with all_125_0_301, all_125_1_302, all_125_2_303, all_125_3_304 yields:
% 50.62/18.10  | (343) intruder_message(all_11_3_35) = all_125_0_301 & intruder_message(all_11_4_36) = all_125_1_302 & intruder_message(all_11_7_39) = all_125_2_303 & intruder_message(b) = all_125_3_304 & ( ~ (all_125_1_302 = 0) |  ~ (all_125_2_303 = 0) |  ~ (all_125_3_304 = 0) | all_125_0_301 = 0)
% 50.62/18.10  |
% 50.62/18.10  | Applying alpha-rule on (343) yields:
% 50.62/18.10  | (344)  ~ (all_125_1_302 = 0) |  ~ (all_125_2_303 = 0) |  ~ (all_125_3_304 = 0) | all_125_0_301 = 0
% 50.62/18.10  | (345) intruder_message(all_11_3_35) = all_125_0_301
% 50.62/18.10  | (346) intruder_message(b) = all_125_3_304
% 50.62/18.10  | (347) intruder_message(all_11_4_36) = all_125_1_302
% 50.62/18.10  | (348) intruder_message(all_11_7_39) = all_125_2_303
% 50.62/18.10  |
% 50.62/18.10  | Instantiating (161) with all_131_0_313, all_131_1_314, all_131_2_315, all_131_3_316, all_131_4_317, all_131_5_318, all_131_6_319, all_131_7_320, all_131_8_321, all_131_9_322 yields:
% 50.62/18.10  | (349) b_holds(all_131_1_314) = all_131_0_313 & generate_b_nonce(all_11_12_44) = all_131_8_321 & b_stored(all_131_3_316) = all_131_2_315 & encrypt(all_131_8_321, all_11_12_44) = all_131_7_320 & encrypt(all_11_5_37, bt) = all_131_9_322 & pair(all_131_9_322, all_131_7_320) = all_131_6_319 & pair(all_11_13_45, all_11_12_44) = all_131_3_316 & sent(all_11_13_45, b, all_131_6_319) = all_131_5_318 & message(all_131_5_318) = all_131_4_317 & key(all_11_12_44, all_11_13_45) = all_131_1_314 & ( ~ (all_131_2_315 = 0) |  ~ (all_131_4_317 = 0) | all_131_0_313 = 0)
% 50.62/18.10  |
% 50.62/18.10  | Applying alpha-rule on (349) yields:
% 50.62/18.10  | (350) sent(all_11_13_45, b, all_131_6_319) = all_131_5_318
% 50.62/18.10  | (351) generate_b_nonce(all_11_12_44) = all_131_8_321
% 50.62/18.10  | (352) key(all_11_12_44, all_11_13_45) = all_131_1_314
% 50.62/18.10  | (353) encrypt(all_11_5_37, bt) = all_131_9_322
% 50.62/18.10  | (354) b_holds(all_131_1_314) = all_131_0_313
% 50.62/18.10  | (355) pair(all_131_9_322, all_131_7_320) = all_131_6_319
% 50.62/18.10  | (356) encrypt(all_131_8_321, all_11_12_44) = all_131_7_320
% 50.62/18.10  | (357)  ~ (all_131_2_315 = 0) |  ~ (all_131_4_317 = 0) | all_131_0_313 = 0
% 50.62/18.10  | (358) pair(all_11_13_45, all_11_12_44) = all_131_3_316
% 50.62/18.10  | (359) message(all_131_5_318) = all_131_4_317
% 50.62/18.10  | (360) b_stored(all_131_3_316) = all_131_2_315
% 50.62/18.10  |
% 50.62/18.10  | Instantiating (160) with all_133_0_323, all_133_1_324, all_133_2_325, all_133_3_326, all_133_4_327, all_133_5_328, all_133_6_329, all_133_7_330, all_133_8_331, all_133_9_332 yields:
% 50.62/18.10  | (361) fresh_to_b(all_11_12_44) = all_133_6_329 & generate_b_nonce(all_11_12_44) = all_133_5_328 & b_stored(all_133_9_332) = all_133_0_323 & triple(b, all_133_5_328, all_133_4_327) = all_133_3_326 & encrypt(all_11_5_37, bt) = all_133_4_327 & pair(all_11_13_45, all_11_12_44) = all_133_9_332 & sent(all_11_13_45, b, all_133_9_332) = all_133_8_331 & sent(b, t, all_133_3_326) = all_133_2_325 & message(all_133_2_325) = all_133_1_324 & message(all_133_8_331) = all_133_7_330 & ( ~ (all_133_6_329 = 0) |  ~ (all_133_7_330 = 0) | (all_133_0_323 = 0 & all_133_1_324 = 0))
% 50.62/18.10  |
% 50.62/18.10  | Applying alpha-rule on (361) yields:
% 50.62/18.10  | (362) message(all_133_8_331) = all_133_7_330
% 50.62/18.10  | (363) b_stored(all_133_9_332) = all_133_0_323
% 50.62/18.10  | (364) sent(all_11_13_45, b, all_133_9_332) = all_133_8_331
% 50.62/18.11  | (365)  ~ (all_133_6_329 = 0) |  ~ (all_133_7_330 = 0) | (all_133_0_323 = 0 & all_133_1_324 = 0)
% 50.62/18.11  | (366) encrypt(all_11_5_37, bt) = all_133_4_327
% 50.62/18.11  | (367) message(all_133_2_325) = all_133_1_324
% 50.62/18.11  | (368) triple(b, all_133_5_328, all_133_4_327) = all_133_3_326
% 50.62/18.11  | (369) sent(b, t, all_133_3_326) = all_133_2_325
% 50.62/18.11  | (370) pair(all_11_13_45, all_11_12_44) = all_133_9_332
% 50.62/18.11  | (371) fresh_to_b(all_11_12_44) = all_133_6_329
% 50.62/18.11  | (372) generate_b_nonce(all_11_12_44) = all_133_5_328
% 50.62/18.11  |
% 50.62/18.11  | Instantiating (173) with all_135_0_333, all_135_1_334, all_135_2_335 yields:
% 50.62/18.11  | (373) intruder_message(all_13_6_52) = all_135_0_333 & intruder_message(all_13_7_53) = all_135_1_334 & intruder_message(all_13_9_55) = all_135_2_335 & ( ~ (all_135_1_334 = 0) |  ~ (all_135_2_335 = 0) | all_135_0_333 = 0)
% 50.62/18.11  |
% 50.62/18.11  | Applying alpha-rule on (373) yields:
% 50.62/18.11  | (374) intruder_message(all_13_6_52) = all_135_0_333
% 50.62/18.11  | (375) intruder_message(all_13_7_53) = all_135_1_334
% 50.62/18.11  | (376) intruder_message(all_13_9_55) = all_135_2_335
% 50.62/18.11  | (377)  ~ (all_135_1_334 = 0) |  ~ (all_135_2_335 = 0) | all_135_0_333 = 0
% 50.62/18.11  |
% 50.62/18.11  | Instantiating (172) with all_137_0_336, all_137_1_337, all_137_2_338, all_137_3_339, all_137_4_340, all_137_5_341, all_137_6_342, all_137_7_343, all_137_8_344, all_137_9_345, all_137_10_346 yields:
% 50.62/18.11  | (378) fresh_to_b(all_13_7_53) = all_137_8_344 & generate_b_nonce(all_13_7_53) = all_137_7_343 & generate_expiration_time(all_13_7_53) = all_137_6_342 & b_stored(all_13_6_52) = all_137_0_336 & triple(all_13_9_55, all_13_7_53, all_137_6_342) = all_137_5_341 & triple(b, all_137_7_343, all_137_4_340) = all_137_3_339 & encrypt(all_137_5_341, bt) = all_137_4_340 & sent(all_13_9_55, b, all_13_6_52) = all_137_10_346 & sent(b, t, all_137_3_339) = all_137_2_338 & message(all_137_2_338) = all_137_1_337 & message(all_137_10_346) = all_137_9_345 & ( ~ (all_137_8_344 = 0) |  ~ (all_137_9_345 = 0) | (all_137_0_336 = 0 & all_137_1_337 = 0))
% 50.62/18.11  |
% 50.62/18.11  | Applying alpha-rule on (378) yields:
% 50.62/18.11  | (379) encrypt(all_137_5_341, bt) = all_137_4_340
% 50.62/18.11  | (380)  ~ (all_137_8_344 = 0) |  ~ (all_137_9_345 = 0) | (all_137_0_336 = 0 & all_137_1_337 = 0)
% 50.62/18.11  | (381) b_stored(all_13_6_52) = all_137_0_336
% 50.62/18.11  | (382) generate_expiration_time(all_13_7_53) = all_137_6_342
% 50.62/18.11  | (383) generate_b_nonce(all_13_7_53) = all_137_7_343
% 50.62/18.11  | (384) fresh_to_b(all_13_7_53) = all_137_8_344
% 50.62/18.11  | (385) triple(all_13_9_55, all_13_7_53, all_137_6_342) = all_137_5_341
% 50.62/18.11  | (386) message(all_137_2_338) = all_137_1_337
% 50.62/18.11  | (387) triple(b, all_137_7_343, all_137_4_340) = all_137_3_339
% 50.62/18.11  | (388) sent(all_13_9_55, b, all_13_6_52) = all_137_10_346
% 50.62/18.11  | (389) message(all_137_10_346) = all_137_9_345
% 50.62/18.11  | (390) sent(b, t, all_137_3_339) = all_137_2_338
% 50.62/18.11  |
% 50.62/18.11  | Instantiating (175) with all_143_0_353, all_143_1_354, all_143_2_355, all_143_3_356, all_143_4_357, all_143_5_358, all_143_6_359, all_143_7_360, all_143_8_361, all_143_9_362, all_143_10_363 yields:
% 50.62/18.11  | (391) fresh_to_b(all_13_12_58) = all_143_8_361 & generate_b_nonce(all_13_12_58) = all_143_7_360 & generate_expiration_time(all_13_12_58) = all_143_6_359 & b_stored(all_13_3_49) = all_143_0_353 & triple(all_13_13_59, all_13_12_58, all_143_6_359) = all_143_5_358 & triple(b, all_143_7_360, all_143_4_357) = all_143_3_356 & encrypt(all_143_5_358, bt) = all_143_4_357 & sent(all_13_13_59, b, all_13_3_49) = all_143_10_363 & sent(b, t, all_143_3_356) = all_143_2_355 & message(all_143_2_355) = all_143_1_354 & message(all_143_10_363) = all_143_9_362 & ( ~ (all_143_8_361 = 0) |  ~ (all_143_9_362 = 0) | (all_143_0_353 = 0 & all_143_1_354 = 0))
% 50.62/18.11  |
% 50.62/18.11  | Applying alpha-rule on (391) yields:
% 50.62/18.11  | (392) b_stored(all_13_3_49) = all_143_0_353
% 50.62/18.11  | (393) encrypt(all_143_5_358, bt) = all_143_4_357
% 50.62/18.11  | (394)  ~ (all_143_8_361 = 0) |  ~ (all_143_9_362 = 0) | (all_143_0_353 = 0 & all_143_1_354 = 0)
% 50.62/18.11  | (395) sent(all_13_13_59, b, all_13_3_49) = all_143_10_363
% 50.62/18.11  | (396) sent(b, t, all_143_3_356) = all_143_2_355
% 50.62/18.11  | (397) fresh_to_b(all_13_12_58) = all_143_8_361
% 50.62/18.11  | (398) generate_expiration_time(all_13_12_58) = all_143_6_359
% 50.62/18.11  | (399) message(all_143_10_363) = all_143_9_362
% 50.62/18.11  | (400) triple(b, all_143_7_360, all_143_4_357) = all_143_3_356
% 50.62/18.11  | (401) generate_b_nonce(all_13_12_58) = all_143_7_360
% 50.62/18.11  | (402) message(all_143_2_355) = all_143_1_354
% 50.62/18.11  | (403) triple(all_13_13_59, all_13_12_58, all_143_6_359) = all_143_5_358
% 50.62/18.11  |
% 50.62/18.11  | Instantiating (171) with all_145_0_364, all_145_1_365, all_145_2_366, all_145_3_367, all_145_4_368, all_145_5_369, all_145_6_370, all_145_7_371, all_145_8_372, all_145_9_373, all_145_10_374 yields:
% 50.62/18.11  | (404) fresh_to_b(all_15_5_66) = all_145_8_372 & generate_b_nonce(all_15_5_66) = all_145_7_371 & generate_expiration_time(all_15_5_66) = all_145_6_370 & b_stored(all_15_4_65) = all_145_0_364 & triple(all_15_15_76, all_15_5_66, all_145_6_370) = all_145_5_369 & triple(b, all_145_7_371, all_145_4_368) = all_145_3_367 & encrypt(all_145_5_369, bt) = all_145_4_368 & sent(all_15_15_76, b, all_15_4_65) = all_145_10_374 & sent(b, t, all_145_3_367) = all_145_2_366 & message(all_145_2_366) = all_145_1_365 & message(all_145_10_374) = all_145_9_373 & ( ~ (all_145_8_372 = 0) |  ~ (all_145_9_373 = 0) | (all_145_0_364 = 0 & all_145_1_365 = 0))
% 50.62/18.11  |
% 50.62/18.11  | Applying alpha-rule on (404) yields:
% 50.62/18.11  | (405) generate_b_nonce(all_15_5_66) = all_145_7_371
% 50.62/18.11  | (406) sent(b, t, all_145_3_367) = all_145_2_366
% 50.62/18.11  | (407) message(all_145_2_366) = all_145_1_365
% 50.62/18.11  | (408) sent(all_15_15_76, b, all_15_4_65) = all_145_10_374
% 50.62/18.11  | (409) triple(b, all_145_7_371, all_145_4_368) = all_145_3_367
% 50.62/18.11  | (410) generate_expiration_time(all_15_5_66) = all_145_6_370
% 50.62/18.11  | (411)  ~ (all_145_8_372 = 0) |  ~ (all_145_9_373 = 0) | (all_145_0_364 = 0 & all_145_1_365 = 0)
% 50.62/18.11  | (412) encrypt(all_145_5_369, bt) = all_145_4_368
% 50.62/18.11  | (413) triple(all_15_15_76, all_15_5_66, all_145_6_370) = all_145_5_369
% 50.62/18.11  | (414) message(all_145_10_374) = all_145_9_373
% 50.62/18.11  | (415) fresh_to_b(all_15_5_66) = all_145_8_372
% 50.62/18.11  | (416) b_stored(all_15_4_65) = all_145_0_364
% 50.62/18.11  |
% 50.62/18.11  | Instantiating (170) with all_149_0_378, all_149_1_379, all_149_2_380, all_149_3_381, all_149_4_382, all_149_5_383, all_149_6_384, all_149_7_385, all_149_8_386, all_149_9_387, all_149_10_388 yields:
% 50.62/18.11  | (417) fresh_to_b(all_15_13_74) = all_149_8_386 & generate_b_nonce(all_15_13_74) = all_149_7_385 & generate_expiration_time(all_15_13_74) = all_149_6_384 & b_stored(all_15_7_68) = all_149_0_378 & triple(all_15_14_75, all_15_13_74, all_149_6_384) = all_149_5_383 & triple(b, all_149_7_385, all_149_4_382) = all_149_3_381 & encrypt(all_149_5_383, bt) = all_149_4_382 & sent(all_15_14_75, b, all_15_7_68) = all_149_10_388 & sent(b, t, all_149_3_381) = all_149_2_380 & message(all_149_2_380) = all_149_1_379 & message(all_149_10_388) = all_149_9_387 & ( ~ (all_149_8_386 = 0) |  ~ (all_149_9_387 = 0) | (all_149_0_378 = 0 & all_149_1_379 = 0))
% 50.62/18.11  |
% 50.62/18.11  | Applying alpha-rule on (417) yields:
% 50.62/18.11  | (418) b_stored(all_15_7_68) = all_149_0_378
% 50.62/18.11  | (419) sent(b, t, all_149_3_381) = all_149_2_380
% 50.62/18.11  | (420)  ~ (all_149_8_386 = 0) |  ~ (all_149_9_387 = 0) | (all_149_0_378 = 0 & all_149_1_379 = 0)
% 50.62/18.11  | (421) encrypt(all_149_5_383, bt) = all_149_4_382
% 50.62/18.11  | (422) generate_b_nonce(all_15_13_74) = all_149_7_385
% 50.62/18.11  | (423) sent(all_15_14_75, b, all_15_7_68) = all_149_10_388
% 50.62/18.11  | (424) generate_expiration_time(all_15_13_74) = all_149_6_384
% 50.62/18.11  | (425) message(all_149_2_380) = all_149_1_379
% 50.62/18.11  | (426) message(all_149_10_388) = all_149_9_387
% 50.62/18.11  | (427) triple(all_15_14_75, all_15_13_74, all_149_6_384) = all_149_5_383
% 50.62/18.11  | (428) triple(b, all_149_7_385, all_149_4_382) = all_149_3_381
% 50.62/18.11  | (429) fresh_to_b(all_15_13_74) = all_149_8_386
% 50.62/18.11  |
% 50.62/18.11  | Instantiating (174) with all_155_0_402, all_155_1_403, all_155_2_404 yields:
% 50.62/18.11  | (430) intruder_message(all_13_6_52) = all_155_2_404 & intruder_message(all_13_7_53) = all_155_0_402 & intruder_message(all_13_9_55) = all_155_1_403 & ( ~ (all_155_2_404 = 0) | (all_155_0_402 = 0 & all_155_1_403 = 0))
% 50.62/18.11  |
% 50.62/18.11  | Applying alpha-rule on (430) yields:
% 50.62/18.11  | (431) intruder_message(all_13_6_52) = all_155_2_404
% 50.62/18.11  | (432) intruder_message(all_13_7_53) = all_155_0_402
% 50.62/18.11  | (433) intruder_message(all_13_9_55) = all_155_1_403
% 50.62/18.11  | (434)  ~ (all_155_2_404 = 0) | (all_155_0_402 = 0 & all_155_1_403 = 0)
% 50.62/18.11  |
% 50.62/18.11  | Instantiating (159) with all_185_0_460, all_185_1_461, all_185_2_462, all_185_3_463, all_185_4_464, all_185_5_465, all_185_6_466, all_185_7_467, all_185_8_468, all_185_9_469 yields:
% 50.62/18.11  | (435) b_holds(all_185_1_461) = all_185_0_460 & generate_b_nonce(all_13_12_58) = all_185_8_468 & b_stored(all_185_3_463) = all_185_2_462 & encrypt(all_185_8_468, all_13_14_60) = all_185_7_467 & encrypt(all_13_10_56, bt) = all_185_9_469 & pair(all_185_9_469, all_185_7_467) = all_185_6_466 & pair(all_13_13_59, all_13_12_58) = all_185_3_463 & sent(all_13_13_59, b, all_185_6_466) = all_185_5_465 & message(all_185_5_465) = all_185_4_464 & key(all_13_14_60, all_13_13_59) = all_185_1_461 & ( ~ (all_185_2_462 = 0) |  ~ (all_185_4_464 = 0) | all_185_0_460 = 0)
% 50.62/18.11  |
% 50.62/18.11  | Applying alpha-rule on (435) yields:
% 50.62/18.11  | (436) encrypt(all_185_8_468, all_13_14_60) = all_185_7_467
% 50.62/18.11  | (437)  ~ (all_185_2_462 = 0) |  ~ (all_185_4_464 = 0) | all_185_0_460 = 0
% 50.62/18.11  | (438) message(all_185_5_465) = all_185_4_464
% 50.62/18.11  | (439) sent(all_13_13_59, b, all_185_6_466) = all_185_5_465
% 50.62/18.12  | (440) encrypt(all_13_10_56, bt) = all_185_9_469
% 50.62/18.12  | (441) pair(all_13_13_59, all_13_12_58) = all_185_3_463
% 50.62/18.12  | (442) b_stored(all_185_3_463) = all_185_2_462
% 50.62/18.12  | (443) key(all_13_14_60, all_13_13_59) = all_185_1_461
% 50.62/18.12  | (444) generate_b_nonce(all_13_12_58) = all_185_8_468
% 50.62/18.12  | (445) pair(all_185_9_469, all_185_7_467) = all_185_6_466
% 50.62/18.12  | (446) b_holds(all_185_1_461) = all_185_0_460
% 50.62/18.12  |
% 50.62/18.12  | Instantiating formula (66) with b, all_89_2_232, all_105_1_263 and discharging atoms party_of_protocol(b) = all_105_1_263, party_of_protocol(b) = all_89_2_232, yields:
% 50.62/18.12  | (447) all_105_1_263 = all_89_2_232
% 50.62/18.12  |
% 50.62/18.12  | Instantiating formula (66) with b, all_85_1_225, 0 and discharging atoms party_of_protocol(b) = all_85_1_225, party_of_protocol(b) = 0, yields:
% 50.62/18.12  | (448) all_85_1_225 = 0
% 50.62/18.12  |
% 50.62/18.12  | Instantiating formula (66) with b, all_85_1_225, all_89_2_232 and discharging atoms party_of_protocol(b) = all_89_2_232, party_of_protocol(b) = all_85_1_225, yields:
% 50.62/18.12  | (449) all_89_2_232 = all_85_1_225
% 50.62/18.12  |
% 50.62/18.12  | Instantiating formula (66) with b, all_71_1_203, all_85_1_225 and discharging atoms party_of_protocol(b) = all_85_1_225, party_of_protocol(b) = all_71_1_203, yields:
% 50.62/18.12  | (450) all_85_1_225 = all_71_1_203
% 50.62/18.12  |
% 50.62/18.12  | Instantiating formula (66) with b, all_47_1_152, all_105_1_263 and discharging atoms party_of_protocol(b) = all_105_1_263, party_of_protocol(b) = all_47_1_152, yields:
% 50.62/18.12  | (451) all_105_1_263 = all_47_1_152
% 50.62/18.12  |
% 50.62/18.12  | Instantiating formula (66) with b, all_37_1_136, all_85_1_225 and discharging atoms party_of_protocol(b) = all_85_1_225, party_of_protocol(b) = all_37_1_136, yields:
% 50.62/18.12  | (452) all_85_1_225 = all_37_1_136
% 50.62/18.12  |
% 50.62/18.12  | Instantiating formula (66) with a, all_85_2_226, all_95_2_242 and discharging atoms party_of_protocol(a) = all_95_2_242, party_of_protocol(a) = all_85_2_226, yields:
% 50.62/18.12  | (453) all_95_2_242 = all_85_2_226
% 50.62/18.12  |
% 50.62/18.12  | Instantiating formula (66) with a, all_51_1_158, 0 and discharging atoms party_of_protocol(a) = all_51_1_158, party_of_protocol(a) = 0, yields:
% 50.62/18.12  | (454) all_51_1_158 = 0
% 50.62/18.12  |
% 50.62/18.12  | Instantiating formula (66) with a, all_33_1_130, all_85_2_226 and discharging atoms party_of_protocol(a) = all_85_2_226, party_of_protocol(a) = all_33_1_130, yields:
% 50.62/18.12  | (455) all_85_2_226 = all_33_1_130
% 50.62/18.12  |
% 50.62/18.12  | Instantiating formula (66) with a, all_33_1_130, all_51_1_158 and discharging atoms party_of_protocol(a) = all_51_1_158, party_of_protocol(a) = all_33_1_130, yields:
% 50.62/18.12  | (456) all_51_1_158 = all_33_1_130
% 50.62/18.12  |
% 50.62/18.12  | Instantiating formula (66) with a, all_31_1_127, all_95_2_242 and discharging atoms party_of_protocol(a) = all_95_2_242, party_of_protocol(a) = all_31_1_127, yields:
% 50.62/18.12  | (457) all_95_2_242 = all_31_1_127
% 50.62/18.12  |
% 50.62/18.12  | Instantiating formula (66) with t, all_111_1_271, 0 and discharging atoms party_of_protocol(t) = all_111_1_271, party_of_protocol(t) = 0, yields:
% 50.62/18.12  | (458) all_111_1_271 = 0
% 50.62/18.12  |
% 50.62/18.12  | Instantiating formula (66) with t, all_89_1_231, all_111_1_271 and discharging atoms party_of_protocol(t) = all_111_1_271, party_of_protocol(t) = all_89_1_231, yields:
% 50.62/18.12  | (459) all_111_1_271 = all_89_1_231
% 50.62/18.12  |
% 50.62/18.12  | Instantiating formula (66) with t, all_75_1_209, all_89_1_231 and discharging atoms party_of_protocol(t) = all_89_1_231, party_of_protocol(t) = all_75_1_209, yields:
% 50.62/18.12  | (460) all_89_1_231 = all_75_1_209
% 50.62/18.12  |
% 50.62/18.12  | Instantiating formula (66) with t, all_51_2_159, all_75_1_209 and discharging atoms party_of_protocol(t) = all_75_1_209, party_of_protocol(t) = all_51_2_159, yields:
% 50.62/18.12  | (461) all_75_1_209 = all_51_2_159
% 50.62/18.12  |
% 50.62/18.12  | Instantiating formula (66) with t, all_51_2_159, all_55_2_165 and discharging atoms party_of_protocol(t) = all_55_2_165, party_of_protocol(t) = all_51_2_159, yields:
% 50.62/18.12  | (462) all_55_2_165 = all_51_2_159
% 50.62/18.12  |
% 50.62/18.12  | Instantiating formula (66) with t, all_29_1_124, all_55_2_165 and discharging atoms party_of_protocol(t) = all_55_2_165, party_of_protocol(t) = all_29_1_124, yields:
% 50.62/18.12  | (463) all_55_2_165 = all_29_1_124
% 50.62/18.12  |
% 50.62/18.12  | Instantiating formula (31) with all_13_7_53, all_135_1_334, all_155_0_402 and discharging atoms intruder_message(all_13_7_53) = all_155_0_402, intruder_message(all_13_7_53) = all_135_1_334, yields:
% 50.62/18.12  | (464) all_155_0_402 = all_135_1_334
% 50.62/18.12  |
% 50.62/18.12  | Instantiating formula (31) with all_0_2_2, all_81_2_220, all_85_3_227 and discharging atoms intruder_message(all_0_2_2) = all_85_3_227, intruder_message(all_0_2_2) = all_81_2_220, yields:
% 50.62/18.12  | (465) all_85_3_227 = all_81_2_220
% 50.62/18.12  |
% 50.62/18.12  | Instantiating formula (31) with all_0_2_2, all_59_0_169, all_81_2_220 and discharging atoms intruder_message(all_0_2_2) = all_81_2_220, intruder_message(all_0_2_2) = all_59_0_169, yields:
% 50.62/18.12  | (466) all_81_2_220 = all_59_0_169
% 50.62/18.12  |
% 50.62/18.12  | Instantiating formula (31) with all_0_2_2, all_57_0_167, all_85_3_227 and discharging atoms intruder_message(all_0_2_2) = all_85_3_227, intruder_message(all_0_2_2) = all_57_0_167, yields:
% 50.62/18.12  | (467) all_85_3_227 = all_57_0_167
% 50.62/18.12  |
% 50.62/18.12  | Instantiating formula (31) with all_0_3_3, all_67_2_199, all_77_0_212 and discharging atoms intruder_message(all_0_3_3) = all_77_0_212, intruder_message(all_0_3_3) = all_67_2_199, yields:
% 50.62/18.12  | (468) all_77_0_212 = all_67_2_199
% 50.62/18.12  |
% 50.62/18.12  | Instantiating formula (31) with an_a_nonce, all_77_1_213, all_81_0_218 and discharging atoms intruder_message(an_a_nonce) = all_81_0_218, intruder_message(an_a_nonce) = all_77_1_213, yields:
% 50.62/18.12  | (469) all_81_0_218 = all_77_1_213
% 50.62/18.12  |
% 50.62/18.12  | Instantiating formula (31) with an_a_nonce, all_67_0_197, all_77_1_213 and discharging atoms intruder_message(an_a_nonce) = all_77_1_213, intruder_message(an_a_nonce) = all_67_0_197, yields:
% 50.62/18.12  | (470) all_77_1_213 = all_67_0_197
% 50.62/18.12  |
% 50.62/18.12  | Instantiating formula (31) with an_a_nonce, all_59_1_170, all_81_0_218 and discharging atoms intruder_message(an_a_nonce) = all_81_0_218, intruder_message(an_a_nonce) = all_59_1_170, yields:
% 50.62/18.12  | (471) all_81_0_218 = all_59_1_170
% 50.62/18.12  |
% 50.62/18.12  | Instantiating formula (31) with b, all_123_2_299, all_125_3_304 and discharging atoms intruder_message(b) = all_125_3_304, intruder_message(b) = all_123_2_299, yields:
% 50.62/18.12  | (472) all_125_3_304 = all_123_2_299
% 50.62/18.12  |
% 50.62/18.12  | Instantiating formula (31) with b, all_77_2_214, all_125_3_304 and discharging atoms intruder_message(b) = all_125_3_304, intruder_message(b) = all_77_2_214, yields:
% 50.62/18.12  | (473) all_125_3_304 = all_77_2_214
% 50.62/18.12  |
% 50.62/18.12  | Instantiating formula (31) with b, all_67_1_198, all_125_3_304 and discharging atoms intruder_message(b) = all_125_3_304, intruder_message(b) = all_67_1_198, yields:
% 50.62/18.12  | (474) all_125_3_304 = all_67_1_198
% 50.62/18.12  |
% 50.62/18.12  | Instantiating formula (31) with a, all_59_2_171, all_81_1_219 and discharging atoms intruder_message(a) = all_81_1_219, intruder_message(a) = all_59_2_171, yields:
% 50.62/18.12  | (475) all_81_1_219 = all_59_2_171
% 50.62/18.12  |
% 50.62/18.12  | Instantiating formula (48) with an_a_nonce, all_63_8_191, 0 and discharging atoms fresh_to_b(an_a_nonce) = all_63_8_191, fresh_to_b(an_a_nonce) = 0, yields:
% 50.62/18.12  | (476) all_63_8_191 = 0
% 50.62/18.12  |
% 50.62/18.12  | Instantiating formula (48) with an_a_nonce, all_61_8_180, all_63_8_191 and discharging atoms fresh_to_b(an_a_nonce) = all_63_8_191, fresh_to_b(an_a_nonce) = all_61_8_180, yields:
% 50.62/18.12  | (477) all_63_8_191 = all_61_8_180
% 50.62/18.12  |
% 50.62/18.12  | Instantiating formula (29) with all_13_12_58, all_185_8_468, all_13_8_54 and discharging atoms generate_b_nonce(all_13_12_58) = all_185_8_468, generate_b_nonce(all_13_12_58) = all_13_8_54, yields:
% 50.62/18.12  | (478) all_185_8_468 = all_13_8_54
% 50.62/18.12  |
% 50.62/18.12  | Instantiating formula (29) with all_13_12_58, all_143_7_360, all_185_8_468 and discharging atoms generate_b_nonce(all_13_12_58) = all_185_8_468, generate_b_nonce(all_13_12_58) = all_143_7_360, yields:
% 50.62/18.12  | (479) all_185_8_468 = all_143_7_360
% 50.62/18.12  |
% 50.62/18.12  | Instantiating formula (29) with an_a_nonce, all_61_7_179, all_63_7_190 and discharging atoms generate_b_nonce(an_a_nonce) = all_63_7_190, generate_b_nonce(an_a_nonce) = all_61_7_179, yields:
% 50.62/18.12  | (480) all_63_7_190 = all_61_7_179
% 50.62/18.12  |
% 50.62/18.12  | Instantiating formula (18) with an_a_nonce, all_61_6_178, all_63_6_189 and discharging atoms generate_expiration_time(an_a_nonce) = all_63_6_189, generate_expiration_time(an_a_nonce) = all_61_6_178, yields:
% 50.62/18.12  | (481) all_63_6_189 = all_61_6_178
% 50.62/18.12  |
% 50.62/18.12  | Instantiating formula (8) with all_11_5_37, bt, all_133_4_327, all_11_4_36 and discharging atoms encrypt(all_11_5_37, bt) = all_133_4_327, encrypt(all_11_5_37, bt) = all_11_4_36, yields:
% 50.62/18.12  | (482) all_133_4_327 = all_11_4_36
% 50.62/18.12  |
% 50.62/18.12  | Instantiating formula (8) with all_11_5_37, bt, all_131_9_322, all_133_4_327 and discharging atoms encrypt(all_11_5_37, bt) = all_133_4_327, encrypt(all_11_5_37, bt) = all_131_9_322, yields:
% 50.62/18.12  | (483) all_133_4_327 = all_131_9_322
% 50.62/18.12  |
% 50.62/18.12  | Instantiating formula (65) with a, b, all_0_2_2, all_61_10_182, all_0_1_1 and discharging atoms sent(a, b, all_0_2_2) = all_61_10_182, sent(a, b, all_0_2_2) = all_0_1_1, yields:
% 50.62/18.12  | (484) all_61_10_182 = all_0_1_1
% 50.62/18.12  |
% 50.62/18.12  | Instantiating formula (15) with all_0_1_1, all_85_0_224, 0 and discharging atoms message(all_0_1_1) = all_85_0_224, message(all_0_1_1) = 0, yields:
% 50.62/18.12  | (485) all_85_0_224 = 0
% 50.62/18.12  |
% 50.62/18.12  | Instantiating formula (15) with all_0_1_1, all_57_1_168, all_85_0_224 and discharging atoms message(all_0_1_1) = all_85_0_224, message(all_0_1_1) = all_57_1_168, yields:
% 50.62/18.12  | (486) all_85_0_224 = all_57_1_168
% 50.62/18.12  |
% 50.62/18.12  | Combining equations (478,479) yields a new equation:
% 50.62/18.12  | (487) all_143_7_360 = all_13_8_54
% 50.62/18.12  |
% 50.62/18.12  | Combining equations (483,482) yields a new equation:
% 50.62/18.12  | (488) all_131_9_322 = all_11_4_36
% 50.62/18.12  |
% 50.62/18.12  | Simplifying 488 yields:
% 50.62/18.12  | (489) all_131_9_322 = all_11_4_36
% 50.62/18.12  |
% 50.62/18.12  | Combining equations (473,472) yields a new equation:
% 50.62/18.12  | (490) all_123_2_299 = all_77_2_214
% 50.62/18.12  |
% 50.62/18.12  | Combining equations (474,472) yields a new equation:
% 50.62/18.12  | (491) all_123_2_299 = all_67_1_198
% 50.62/18.12  |
% 50.62/18.12  | Combining equations (491,490) yields a new equation:
% 50.62/18.12  | (492) all_77_2_214 = all_67_1_198
% 50.62/18.12  |
% 50.62/18.12  | Combining equations (459,458) yields a new equation:
% 50.62/18.12  | (493) all_89_1_231 = 0
% 50.62/18.12  |
% 50.62/18.12  | Simplifying 493 yields:
% 50.62/18.12  | (494) all_89_1_231 = 0
% 50.62/18.12  |
% 50.62/18.12  | Combining equations (447,451) yields a new equation:
% 50.62/18.12  | (495) all_89_2_232 = all_47_1_152
% 50.62/18.12  |
% 50.62/18.12  | Simplifying 495 yields:
% 50.62/18.12  | (496) all_89_2_232 = all_47_1_152
% 50.62/18.12  |
% 50.62/18.12  | Combining equations (453,457) yields a new equation:
% 50.62/18.12  | (497) all_85_2_226 = all_31_1_127
% 50.62/18.12  |
% 50.62/18.13  | Simplifying 497 yields:
% 50.62/18.13  | (498) all_85_2_226 = all_31_1_127
% 50.62/18.13  |
% 50.62/18.13  | Combining equations (460,494) yields a new equation:
% 50.62/18.13  | (499) all_75_1_209 = 0
% 50.62/18.13  |
% 50.62/18.13  | Simplifying 499 yields:
% 50.62/18.13  | (500) all_75_1_209 = 0
% 50.62/18.13  |
% 50.62/18.13  | Combining equations (449,496) yields a new equation:
% 50.62/18.13  | (501) all_85_1_225 = all_47_1_152
% 50.62/18.13  |
% 50.62/18.13  | Simplifying 501 yields:
% 50.62/18.13  | (502) all_85_1_225 = all_47_1_152
% 50.62/18.13  |
% 50.62/18.13  | Combining equations (485,486) yields a new equation:
% 50.62/18.13  | (503) all_57_1_168 = 0
% 50.62/18.13  |
% 50.62/18.13  | Combining equations (502,450) yields a new equation:
% 50.62/18.13  | (504) all_71_1_203 = all_47_1_152
% 50.62/18.13  |
% 50.62/18.13  | Combining equations (452,450) yields a new equation:
% 50.62/18.13  | (505) all_71_1_203 = all_37_1_136
% 50.62/18.13  |
% 50.62/18.13  | Combining equations (448,450) yields a new equation:
% 50.62/18.13  | (506) all_71_1_203 = 0
% 50.62/18.13  |
% 50.62/18.13  | Combining equations (455,498) yields a new equation:
% 50.62/18.13  | (507) all_33_1_130 = all_31_1_127
% 50.62/18.13  |
% 50.62/18.13  | Simplifying 507 yields:
% 50.62/18.13  | (508) all_33_1_130 = all_31_1_127
% 50.62/18.13  |
% 50.62/18.13  | Combining equations (465,467) yields a new equation:
% 50.62/18.13  | (509) all_81_2_220 = all_57_0_167
% 50.62/18.13  |
% 50.62/18.13  | Simplifying 509 yields:
% 50.62/18.13  | (510) all_81_2_220 = all_57_0_167
% 50.62/18.13  |
% 50.62/18.13  | Combining equations (469,471) yields a new equation:
% 50.62/18.13  | (511) all_77_1_213 = all_59_1_170
% 50.62/18.13  |
% 50.62/18.13  | Simplifying 511 yields:
% 50.62/18.13  | (512) all_77_1_213 = all_59_1_170
% 50.62/18.13  |
% 50.62/18.13  | Combining equations (510,466) yields a new equation:
% 50.62/18.13  | (513) all_59_0_169 = all_57_0_167
% 50.62/18.13  |
% 50.62/18.13  | Combining equations (512,470) yields a new equation:
% 50.62/18.13  | (514) all_67_0_197 = all_59_1_170
% 50.62/18.13  |
% 50.62/18.13  | Combining equations (461,500) yields a new equation:
% 50.62/18.13  | (515) all_51_2_159 = 0
% 50.62/18.13  |
% 50.62/18.13  | Simplifying 515 yields:
% 50.62/18.13  | (516) all_51_2_159 = 0
% 50.62/18.13  |
% 50.62/18.13  | Combining equations (506,504) yields a new equation:
% 50.62/18.13  | (517) all_47_1_152 = 0
% 50.62/18.13  |
% 50.62/18.13  | Combining equations (505,504) yields a new equation:
% 50.62/18.13  | (518) all_47_1_152 = all_37_1_136
% 50.62/18.13  |
% 50.62/18.13  | Combining equations (476,477) yields a new equation:
% 50.62/18.13  | (519) all_61_8_180 = 0
% 50.62/18.13  |
% 50.62/18.13  | Combining equations (462,463) yields a new equation:
% 50.62/18.13  | (520) all_51_2_159 = all_29_1_124
% 50.62/18.13  |
% 50.62/18.13  | Simplifying 520 yields:
% 50.62/18.13  | (521) all_51_2_159 = all_29_1_124
% 50.62/18.13  |
% 50.62/18.13  | Combining equations (456,454) yields a new equation:
% 50.62/18.13  | (522) all_33_1_130 = 0
% 50.62/18.13  |
% 50.62/18.13  | Simplifying 522 yields:
% 50.62/18.13  | (523) all_33_1_130 = 0
% 50.62/18.13  |
% 50.62/18.13  | Combining equations (521,516) yields a new equation:
% 50.62/18.13  | (524) all_29_1_124 = 0
% 50.62/18.13  |
% 50.62/18.13  | Simplifying 524 yields:
% 50.62/18.13  | (525) all_29_1_124 = 0
% 50.62/18.13  |
% 50.62/18.13  | Combining equations (517,518) yields a new equation:
% 50.62/18.13  | (526) all_37_1_136 = 0
% 50.62/18.13  |
% 50.62/18.13  | Combining equations (523,508) yields a new equation:
% 50.62/18.13  | (527) all_31_1_127 = 0
% 50.62/18.13  |
% 50.62/18.13  | Combining equations (519,477) yields a new equation:
% 50.62/18.13  | (476) all_63_8_191 = 0
% 50.62/18.13  |
% 50.62/18.13  | Combining equations (514,470) yields a new equation:
% 50.62/18.13  | (512) all_77_1_213 = all_59_1_170
% 50.62/18.13  |
% 50.62/18.13  | Combining equations (513,466) yields a new equation:
% 50.62/18.13  | (510) all_81_2_220 = all_57_0_167
% 50.62/18.13  |
% 50.62/18.13  | Combining equations (487,479) yields a new equation:
% 50.62/18.13  | (478) all_185_8_468 = all_13_8_54
% 50.62/18.13  |
% 50.62/18.13  | From (526) and (216) follows:
% 50.62/18.13  | (10) party_of_protocol(b) = 0
% 50.62/18.13  |
% 50.62/18.13  | From (527) and (206) follows:
% 50.62/18.13  | (43) party_of_protocol(a) = 0
% 50.76/18.13  |
% 50.76/18.13  | From (525) and (201) follows:
% 50.76/18.13  | (34) party_of_protocol(t) = 0
% 50.76/18.13  |
% 50.76/18.13  | From (464) and (432) follows:
% 50.76/18.13  | (375) intruder_message(all_13_7_53) = all_135_1_334
% 50.76/18.13  |
% 50.76/18.13  | From (513) and (242) follows:
% 50.76/18.13  | (238) intruder_message(all_0_2_2) = all_57_0_167
% 50.76/18.13  |
% 50.76/18.13  | From (468) and (290) follows:
% 50.76/18.13  | (273) intruder_message(all_0_3_3) = all_67_2_199
% 50.76/18.13  |
% 50.76/18.13  | From (514) and (274) follows:
% 50.76/18.13  | (243) intruder_message(an_a_nonce) = all_59_1_170
% 50.76/18.13  |
% 50.76/18.13  | From (492) and (292) follows:
% 50.76/18.13  | (275) intruder_message(b) = all_67_1_198
% 50.76/18.13  |
% 50.76/18.13  | From (475) and (297) follows:
% 50.76/18.13  | (244) intruder_message(a) = all_59_2_171
% 50.76/18.13  |
% 50.76/18.13  | From (480) and (263) follows:
% 50.76/18.13  | (258) generate_b_nonce(an_a_nonce) = all_61_7_179
% 50.76/18.13  |
% 50.76/18.13  | From (481) and (262) follows:
% 50.76/18.13  | (253) generate_expiration_time(an_a_nonce) = all_61_6_178
% 50.76/18.13  |
% 50.76/18.13  | From (487) and (400) follows:
% 50.76/18.13  | (543) triple(b, all_13_8_54, all_143_4_357) = all_143_3_356
% 50.76/18.13  |
% 50.76/18.13  | From (480) and (265) follows:
% 50.76/18.13  | (544) triple(b, all_61_7_179, all_63_4_187) = all_63_3_186
% 50.76/18.13  |
% 50.76/18.13  | From (481) and (269) follows:
% 50.76/18.13  | (545) triple(b, an_a_nonce, all_61_6_178) = all_63_5_188
% 50.76/18.13  |
% 50.76/18.13  | From (478) and (436) follows:
% 50.76/18.13  | (546) encrypt(all_13_8_54, all_13_14_60) = all_185_7_467
% 50.76/18.13  |
% 50.76/18.13  | From (489) and (355) follows:
% 50.76/18.13  | (547) pair(all_11_4_36, all_131_7_320) = all_131_6_319
% 50.76/18.13  |
% 50.76/18.13  | From (484) and (252) follows:
% 50.76/18.13  | (548) message(all_0_1_1) = all_61_9_181
% 50.76/18.13  |
% 50.76/18.13  | From (503) and (239) follows:
% 50.76/18.13  | (49) message(all_0_1_1) = 0
% 50.76/18.13  |
% 50.76/18.13  +-Applying beta-rule and splitting (240), into two cases.
% 50.76/18.13  |-Branch one:
% 50.76/18.13  | (550)  ~ (all_57_1_168 = 0)
% 50.76/18.13  |
% 50.76/18.13  	| Equations (503) can reduce 550 to:
% 50.76/18.13  	| (551) $false
% 50.76/18.13  	|
% 50.76/18.13  	|-The branch is then unsatisfiable
% 50.76/18.13  |-Branch two:
% 50.76/18.13  | (503) all_57_1_168 = 0
% 50.76/18.13  | (553) all_57_0_167 = 0
% 50.76/18.13  |
% 50.76/18.13  	| Combining equations (553,510) yields a new equation:
% 50.76/18.13  	| (554) all_81_2_220 = 0
% 50.76/18.13  	|
% 50.76/18.13  	| From (553) and (238) follows:
% 50.76/18.13  	| (555) intruder_message(all_0_2_2) = 0
% 50.76/18.13  	|
% 50.76/18.13  	+-Applying beta-rule and splitting (298), into two cases.
% 50.76/18.13  	|-Branch one:
% 50.76/18.13  	| (556)  ~ (all_81_2_220 = 0)
% 50.76/18.13  	|
% 50.76/18.13  		| Equations (554) can reduce 556 to:
% 50.76/18.13  		| (551) $false
% 50.76/18.13  		|
% 50.76/18.13  		|-The branch is then unsatisfiable
% 50.76/18.13  	|-Branch two:
% 50.76/18.13  	| (554) all_81_2_220 = 0
% 50.76/18.13  	| (559) all_81_0_218 = 0 & all_81_1_219 = 0
% 50.76/18.13  	|
% 50.76/18.13  		| Applying alpha-rule on (559) yields:
% 50.76/18.13  		| (560) all_81_0_218 = 0
% 50.76/18.13  		| (561) all_81_1_219 = 0
% 50.76/18.14  		|
% 50.76/18.14  		| Combining equations (560,471) yields a new equation:
% 50.76/18.14  		| (562) all_59_1_170 = 0
% 50.76/18.14  		|
% 50.76/18.14  		| Combining equations (475,561) yields a new equation:
% 50.76/18.14  		| (563) all_59_2_171 = 0
% 50.76/18.14  		|
% 50.76/18.14  		| Simplifying 563 yields:
% 50.76/18.14  		| (564) all_59_2_171 = 0
% 50.76/18.14  		|
% 50.76/18.14  		| Combining equations (562,512) yields a new equation:
% 50.76/18.14  		| (565) all_77_1_213 = 0
% 50.76/18.14  		|
% 50.76/18.14  		| From (562) and (243) follows:
% 50.76/18.14  		| (566) intruder_message(an_a_nonce) = 0
% 50.76/18.14  		|
% 50.76/18.14  		| From (564) and (244) follows:
% 50.76/18.14  		| (567) intruder_message(a) = 0
% 50.76/18.14  		|
% 50.76/18.14  		| Instantiating formula (8) with all_13_8_54, all_13_14_60, all_185_7_467, all_13_7_53 and discharging atoms encrypt(all_13_8_54, all_13_14_60) = all_185_7_467, encrypt(all_13_8_54, all_13_14_60) = all_13_7_53, yields:
% 50.76/18.14  		| (568) all_185_7_467 = all_13_7_53
% 50.76/18.14  		|
% 50.76/18.14  		| Instantiating formula (15) with all_0_1_1, all_61_9_181, 0 and discharging atoms message(all_0_1_1) = all_61_9_181, message(all_0_1_1) = 0, yields:
% 50.76/18.14  		| (569) all_61_9_181 = 0
% 50.76/18.14  		|
% 50.76/18.14  		| From (568) and (546) follows:
% 50.76/18.14  		| (107) encrypt(all_13_8_54, all_13_14_60) = all_13_7_53
% 50.76/18.14  		|
% 50.76/18.14  		+-Applying beta-rule and splitting (251), into two cases.
% 50.76/18.14  		|-Branch one:
% 50.76/18.14  		| (571)  ~ (all_61_8_180 = 0)
% 50.76/18.14  		|
% 50.76/18.14  			| Equations (519) can reduce 571 to:
% 50.76/18.14  			| (551) $false
% 50.76/18.14  			|
% 50.76/18.14  			|-The branch is then unsatisfiable
% 50.76/18.14  		|-Branch two:
% 50.76/18.14  		| (519) all_61_8_180 = 0
% 50.76/18.14  		| (574)  ~ (all_61_9_181 = 0) | (all_61_0_172 = 0 & all_61_1_173 = 0)
% 50.76/18.14  		|
% 50.76/18.14  			+-Applying beta-rule and splitting (574), into two cases.
% 50.76/18.14  			|-Branch one:
% 50.76/18.14  			| (575)  ~ (all_61_9_181 = 0)
% 50.76/18.14  			|
% 50.76/18.14  				| Equations (569) can reduce 575 to:
% 50.76/18.14  				| (551) $false
% 50.76/18.14  				|
% 50.76/18.14  				|-The branch is then unsatisfiable
% 50.76/18.14  			|-Branch two:
% 50.76/18.14  			| (569) all_61_9_181 = 0
% 50.76/18.14  			| (578) all_61_0_172 = 0 & all_61_1_173 = 0
% 50.76/18.14  			|
% 50.76/18.14  				| Applying alpha-rule on (578) yields:
% 50.76/18.14  				| (579) all_61_0_172 = 0
% 50.76/18.14  				| (580) all_61_1_173 = 0
% 50.76/18.14  				|
% 50.76/18.14  				| From (579) and (250) follows:
% 50.76/18.14  				| (581) b_stored(all_0_2_2) = 0
% 50.76/18.14  				|
% 50.76/18.14  				| From (580) and (254) follows:
% 50.76/18.14  				| (582) message(all_61_2_174) = 0
% 50.76/18.14  				|
% 50.76/18.14  				| Instantiating formula (7) with all_135_1_334, all_13_7_53, a, all_13_14_60, all_13_8_54 and discharging atoms party_of_protocol(a) = 0, intruder_message(all_13_7_53) = all_135_1_334, encrypt(all_13_8_54, all_13_14_60) = all_13_7_53, yields:
% 50.76/18.14  				| (583) all_135_1_334 = 0 |  ? [v0] :  ? [v1] :  ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_13_8_54) = v0 & key(all_13_14_60, a) = v1 & ( ~ (v2 = 0) |  ~ (v0 = 0)))
% 50.76/18.14  				|
% 50.76/18.14  				| Instantiating formula (58) with all_149_5_383, all_149_6_384, all_15_13_74, all_15_14_75 and discharging atoms generate_expiration_time(all_15_13_74) = all_149_6_384, triple(all_15_14_75, all_15_13_74, all_149_6_384) = all_149_5_383, yields:
% 50.76/18.14  				| (584)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] :  ? [v4] :  ? [v5] :  ? [v6] :  ? [v7] :  ? [v8] :  ? [v9] : (fresh_to_b(all_15_13_74) = v3 & generate_b_nonce(all_15_13_74) = v4 & b_stored(v0) = v9 & triple(b, v4, v5) = v6 & encrypt(all_149_5_383, bt) = v5 & pair(all_15_14_75, all_15_13_74) = v0 & sent(all_15_14_75, b, v0) = v1 & sent(b, t, v6) = v7 & message(v7) = v8 & message(v1) = v2 & ( ~ (v3 = 0) |  ~ (v2 = 0) | (v9 = 0 & v8 = 0)))
% 50.76/18.14  				|
% 50.76/18.14  				| Instantiating formula (22) with all_149_5_383, all_149_6_384, all_15_13_74, all_15_14_75, all_15_13_74 and discharging atoms generate_expiration_time(all_15_13_74) = all_149_6_384, triple(all_15_14_75, all_15_13_74, all_149_6_384) = all_149_5_383, yields:
% 50.76/18.14  				| (585)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] :  ? [v4] :  ? [v5] :  ? [v6] :  ? [v7] :  ? [v8] :  ? [v9] : (b_holds(v8) = v9 & generate_b_nonce(all_15_13_74) = v1 & b_stored(v6) = v7 & encrypt(v1, all_15_13_74) = v2 & encrypt(all_149_5_383, bt) = v0 & pair(v0, v2) = v3 & pair(all_15_14_75, all_15_13_74) = v6 & sent(all_15_14_75, b, v3) = v4 & message(v4) = v5 & key(all_15_13_74, all_15_14_75) = v8 & ( ~ (v7 = 0) |  ~ (v5 = 0) | v9 = 0))
% 50.76/18.14  				|
% 50.76/18.14  				| Instantiating formula (22) with all_145_5_369, all_145_6_370, all_15_5_66, all_15_15_76, all_15_5_66 and discharging atoms generate_expiration_time(all_15_5_66) = all_145_6_370, triple(all_15_15_76, all_15_5_66, all_145_6_370) = all_145_5_369, yields:
% 50.76/18.14  				| (586)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] :  ? [v4] :  ? [v5] :  ? [v6] :  ? [v7] :  ? [v8] :  ? [v9] : (b_holds(v8) = v9 & generate_b_nonce(all_15_5_66) = v1 & b_stored(v6) = v7 & encrypt(v1, all_15_5_66) = v2 & encrypt(all_145_5_369, bt) = v0 & pair(v0, v2) = v3 & pair(all_15_15_76, all_15_5_66) = v6 & sent(all_15_15_76, b, v3) = v4 & message(v4) = v5 & key(all_15_5_66, all_15_15_76) = v8 & ( ~ (v7 = 0) |  ~ (v5 = 0) | v9 = 0))
% 50.76/18.14  				|
% 50.76/18.14  				| Instantiating formula (22) with all_137_5_341, all_137_6_342, all_13_7_53, all_13_9_55, all_13_7_53 and discharging atoms generate_expiration_time(all_13_7_53) = all_137_6_342, triple(all_13_9_55, all_13_7_53, all_137_6_342) = all_137_5_341, yields:
% 50.76/18.14  				| (587)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] :  ? [v4] :  ? [v5] :  ? [v6] :  ? [v7] :  ? [v8] :  ? [v9] : (b_holds(v8) = v9 & generate_b_nonce(all_13_7_53) = v1 & b_stored(v6) = v7 & encrypt(v1, all_13_7_53) = v2 & encrypt(all_137_5_341, bt) = v0 & pair(v0, v2) = v3 & pair(all_13_9_55, all_13_7_53) = v6 & sent(all_13_9_55, b, v3) = v4 & message(v4) = v5 & key(all_13_7_53, all_13_9_55) = v8 & ( ~ (v7 = 0) |  ~ (v5 = 0) | v9 = 0))
% 50.76/18.14  				|
% 50.76/18.14  				| Instantiating formula (40) with all_137_5_341, all_137_6_342, all_13_7_53, all_13_9_55 and discharging atoms triple(all_13_9_55, all_13_7_53, all_137_6_342) = all_137_5_341, yields:
% 50.76/18.14  				| (588)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (intruder_message(all_137_5_341) = v3 & intruder_message(all_137_6_342) = v2 & intruder_message(all_13_7_53) = v1 & intruder_message(all_13_9_55) = v0 & ( ~ (v2 = 0) |  ~ (v1 = 0) |  ~ (v0 = 0) | v3 = 0))
% 50.76/18.14  				|
% 50.76/18.14  				| Instantiating formula (68) with all_137_5_341, all_137_6_342, all_13_7_53, all_13_9_55 and discharging atoms triple(all_13_9_55, all_13_7_53, all_137_6_342) = all_137_5_341, yields:
% 50.76/18.14  				| (589)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (intruder_message(all_137_5_341) = v0 & intruder_message(all_137_6_342) = v3 & intruder_message(all_13_7_53) = v2 & intruder_message(all_13_9_55) = v1 & ( ~ (v0 = 0) | (v3 = 0 & v2 = 0 & v1 = 0)))
% 50.76/18.14  				|
% 50.76/18.14  				| Instantiating formula (40) with all_149_3_381, all_149_4_382, all_149_7_385, b and discharging atoms triple(b, all_149_7_385, all_149_4_382) = all_149_3_381, yields:
% 50.76/18.14  				| (590)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (intruder_message(all_149_3_381) = v3 & intruder_message(all_149_4_382) = v2 & intruder_message(all_149_7_385) = v1 & intruder_message(b) = v0 & ( ~ (v2 = 0) |  ~ (v1 = 0) |  ~ (v0 = 0) | v3 = 0))
% 50.76/18.14  				|
% 50.76/18.14  				| Instantiating formula (68) with all_149_3_381, all_149_4_382, all_149_7_385, b and discharging atoms triple(b, all_149_7_385, all_149_4_382) = all_149_3_381, yields:
% 50.76/18.14  				| (591)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (intruder_message(all_149_3_381) = v0 & intruder_message(all_149_4_382) = v3 & intruder_message(all_149_7_385) = v2 & intruder_message(b) = v1 & ( ~ (v0 = 0) | (v3 = 0 & v2 = 0 & v1 = 0)))
% 50.76/18.14  				|
% 50.76/18.14  				| Instantiating formula (40) with all_145_3_367, all_145_4_368, all_145_7_371, b and discharging atoms triple(b, all_145_7_371, all_145_4_368) = all_145_3_367, yields:
% 50.76/18.14  				| (592)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (intruder_message(all_145_3_367) = v3 & intruder_message(all_145_4_368) = v2 & intruder_message(all_145_7_371) = v1 & intruder_message(b) = v0 & ( ~ (v2 = 0) |  ~ (v1 = 0) |  ~ (v0 = 0) | v3 = 0))
% 50.76/18.14  				|
% 50.76/18.14  				| Instantiating formula (68) with all_145_3_367, all_145_4_368, all_145_7_371, b and discharging atoms triple(b, all_145_7_371, all_145_4_368) = all_145_3_367, yields:
% 50.76/18.14  				| (593)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (intruder_message(all_145_3_367) = v0 & intruder_message(all_145_4_368) = v3 & intruder_message(all_145_7_371) = v2 & intruder_message(b) = v1 & ( ~ (v0 = 0) | (v3 = 0 & v2 = 0 & v1 = 0)))
% 50.76/18.14  				|
% 50.76/18.14  				| Instantiating formula (40) with all_137_3_339, all_137_4_340, all_137_7_343, b and discharging atoms triple(b, all_137_7_343, all_137_4_340) = all_137_3_339, yields:
% 50.76/18.14  				| (594)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (intruder_message(all_137_3_339) = v3 & intruder_message(all_137_4_340) = v2 & intruder_message(all_137_7_343) = v1 & intruder_message(b) = v0 & ( ~ (v2 = 0) |  ~ (v1 = 0) |  ~ (v0 = 0) | v3 = 0))
% 50.76/18.14  				|
% 50.76/18.14  				| Instantiating formula (68) with all_137_3_339, all_137_4_340, all_137_7_343, b and discharging atoms triple(b, all_137_7_343, all_137_4_340) = all_137_3_339, yields:
% 50.76/18.14  				| (595)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (intruder_message(all_137_3_339) = v0 & intruder_message(all_137_4_340) = v3 & intruder_message(all_137_7_343) = v2 & intruder_message(b) = v1 & ( ~ (v0 = 0) | (v3 = 0 & v2 = 0 & v1 = 0)))
% 50.76/18.14  				|
% 50.76/18.14  				| Instantiating formula (40) with all_63_3_186, all_63_4_187, all_61_7_179, b and discharging atoms triple(b, all_61_7_179, all_63_4_187) = all_63_3_186, yields:
% 50.76/18.14  				| (596)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (intruder_message(all_63_3_186) = v3 & intruder_message(all_63_4_187) = v2 & intruder_message(all_61_7_179) = v1 & intruder_message(b) = v0 & ( ~ (v2 = 0) |  ~ (v1 = 0) |  ~ (v0 = 0) | v3 = 0))
% 50.76/18.14  				|
% 50.76/18.14  				| Instantiating formula (68) with all_63_3_186, all_63_4_187, all_61_7_179, b and discharging atoms triple(b, all_61_7_179, all_63_4_187) = all_63_3_186, yields:
% 50.76/18.14  				| (597)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (intruder_message(all_63_3_186) = v0 & intruder_message(all_63_4_187) = v3 & intruder_message(all_61_7_179) = v2 & intruder_message(b) = v1 & ( ~ (v0 = 0) | (v3 = 0 & v2 = 0 & v1 = 0)))
% 50.76/18.14  				|
% 50.76/18.14  				| Instantiating formula (40) with all_61_3_175, all_61_4_176, all_61_7_179, b and discharging atoms triple(b, all_61_7_179, all_61_4_176) = all_61_3_175, yields:
% 50.76/18.14  				| (598)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (intruder_message(all_61_3_175) = v3 & intruder_message(all_61_4_176) = v2 & intruder_message(all_61_7_179) = v1 & intruder_message(b) = v0 & ( ~ (v2 = 0) |  ~ (v1 = 0) |  ~ (v0 = 0) | v3 = 0))
% 50.76/18.15  				|
% 50.76/18.15  				| Instantiating formula (68) with all_61_3_175, all_61_4_176, all_61_7_179, b and discharging atoms triple(b, all_61_7_179, all_61_4_176) = all_61_3_175, yields:
% 50.76/18.15  				| (599)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (intruder_message(all_61_3_175) = v0 & intruder_message(all_61_4_176) = v3 & intruder_message(all_61_7_179) = v2 & intruder_message(b) = v1 & ( ~ (v0 = 0) | (v3 = 0 & v2 = 0 & v1 = 0)))
% 50.76/18.15  				|
% 50.76/18.15  				| Instantiating formula (40) with all_143_3_356, all_143_4_357, all_13_8_54, b and discharging atoms triple(b, all_13_8_54, all_143_4_357) = all_143_3_356, yields:
% 50.76/18.15  				| (600)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (intruder_message(all_143_3_356) = v3 & intruder_message(all_143_4_357) = v2 & intruder_message(all_13_8_54) = v1 & intruder_message(b) = v0 & ( ~ (v2 = 0) |  ~ (v1 = 0) |  ~ (v0 = 0) | v3 = 0))
% 50.76/18.15  				|
% 50.76/18.15  				| Instantiating formula (68) with all_143_3_356, all_143_4_357, all_13_8_54, b and discharging atoms triple(b, all_13_8_54, all_143_4_357) = all_143_3_356, yields:
% 50.76/18.15  				| (601)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (intruder_message(all_143_3_356) = v0 & intruder_message(all_143_4_357) = v3 & intruder_message(all_13_8_54) = v2 & intruder_message(b) = v1 & ( ~ (v0 = 0) | (v3 = 0 & v2 = 0 & v1 = 0)))
% 50.76/18.15  				|
% 50.76/18.15  				| Instantiating formula (58) with all_63_5_188, all_61_6_178, an_a_nonce, b and discharging atoms generate_expiration_time(an_a_nonce) = all_61_6_178, triple(b, an_a_nonce, all_61_6_178) = all_63_5_188, yields:
% 50.76/18.15  				| (602)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] :  ? [v4] :  ? [v5] :  ? [v6] :  ? [v7] :  ? [v8] :  ? [v9] : (fresh_to_b(an_a_nonce) = v3 & generate_b_nonce(an_a_nonce) = v4 & b_stored(v0) = v9 & triple(b, v4, v5) = v6 & encrypt(all_63_5_188, bt) = v5 & pair(b, an_a_nonce) = v0 & sent(b, b, v0) = v1 & sent(b, t, v6) = v7 & message(v7) = v8 & message(v1) = v2 & ( ~ (v3 = 0) |  ~ (v2 = 0) | (v9 = 0 & v8 = 0)))
% 50.76/18.15  				|
% 50.76/18.15  				| Instantiating formula (22) with all_63_5_188, all_61_6_178, an_a_nonce, b, an_a_nonce and discharging atoms generate_expiration_time(an_a_nonce) = all_61_6_178, triple(b, an_a_nonce, all_61_6_178) = all_63_5_188, yields:
% 50.76/18.15  				| (603)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] :  ? [v4] :  ? [v5] :  ? [v6] :  ? [v7] :  ? [v8] :  ? [v9] : (b_holds(v8) = v9 & generate_b_nonce(an_a_nonce) = v1 & b_stored(v6) = v7 & encrypt(v1, an_a_nonce) = v2 & encrypt(all_63_5_188, bt) = v0 & pair(v0, v2) = v3 & pair(b, an_a_nonce) = v6 & sent(b, b, v3) = v4 & message(v4) = v5 & key(an_a_nonce, b) = v8 & ( ~ (v7 = 0) |  ~ (v5 = 0) | v9 = 0))
% 50.76/18.15  				|
% 50.76/18.15  				| Instantiating formula (40) with all_63_5_188, all_61_6_178, an_a_nonce, b and discharging atoms triple(b, an_a_nonce, all_61_6_178) = all_63_5_188, yields:
% 50.76/18.15  				| (604)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (intruder_message(all_63_5_188) = v3 & intruder_message(all_61_6_178) = v2 & intruder_message(an_a_nonce) = v1 & intruder_message(b) = v0 & ( ~ (v2 = 0) |  ~ (v1 = 0) |  ~ (v0 = 0) | v3 = 0))
% 50.76/18.15  				|
% 50.76/18.15  				| Instantiating formula (68) with all_63_5_188, all_61_6_178, an_a_nonce, b and discharging atoms triple(b, an_a_nonce, all_61_6_178) = all_63_5_188, yields:
% 50.76/18.15  				| (605)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (intruder_message(all_63_5_188) = v0 & intruder_message(all_61_6_178) = v3 & intruder_message(an_a_nonce) = v2 & intruder_message(b) = v1 & ( ~ (v0 = 0) | (v3 = 0 & v2 = 0 & v1 = 0)))
% 50.76/18.15  				|
% 50.76/18.15  				| Instantiating formula (22) with all_61_5_177, all_61_6_178, an_a_nonce, a, an_a_nonce and discharging atoms generate_expiration_time(an_a_nonce) = all_61_6_178, triple(a, an_a_nonce, all_61_6_178) = all_61_5_177, yields:
% 50.76/18.15  				| (606)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] :  ? [v4] :  ? [v5] :  ? [v6] :  ? [v7] :  ? [v8] :  ? [v9] : (b_holds(v8) = v9 & generate_b_nonce(an_a_nonce) = v1 & b_stored(v6) = v7 & encrypt(v1, an_a_nonce) = v2 & encrypt(all_61_5_177, bt) = v0 & pair(v0, v2) = v3 & pair(a, an_a_nonce) = v6 & sent(a, b, v3) = v4 & message(v4) = v5 & key(an_a_nonce, a) = v8 & ( ~ (v7 = 0) |  ~ (v5 = 0) | v9 = 0))
% 50.76/18.15  				|
% 50.76/18.15  				| Instantiating formula (40) with all_61_5_177, all_61_6_178, an_a_nonce, a and discharging atoms triple(a, an_a_nonce, all_61_6_178) = all_61_5_177, yields:
% 50.76/18.15  				| (607)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (intruder_message(all_61_5_177) = v3 & intruder_message(all_61_6_178) = v2 & intruder_message(an_a_nonce) = v1 & intruder_message(a) = v0 & ( ~ (v2 = 0) |  ~ (v1 = 0) |  ~ (v0 = 0) | v3 = 0))
% 50.76/18.15  				|
% 50.76/18.15  				| Instantiating formula (68) with all_61_5_177, all_61_6_178, an_a_nonce, a and discharging atoms triple(a, an_a_nonce, all_61_6_178) = all_61_5_177, yields:
% 50.76/18.15  				| (608)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (intruder_message(all_61_5_177) = v0 & intruder_message(all_61_6_178) = v3 & intruder_message(an_a_nonce) = v2 & intruder_message(a) = v1 & ( ~ (v0 = 0) | (v3 = 0 & v2 = 0 & v1 = 0)))
% 50.76/18.15  				|
% 50.76/18.15  				| Instantiating formula (70) with all_131_6_319, all_131_7_320, all_11_4_36 and discharging atoms pair(all_11_4_36, all_131_7_320) = all_131_6_319, yields:
% 50.76/18.15  				| (609)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] :  ? [v4] :  ? [v5] :  ? [v6] :  ? [v7] :  ? [v8] :  ? [v9] :  ? [v10] : (fresh_to_b(all_131_7_320) = v2 & generate_b_nonce(all_131_7_320) = v3 & generate_expiration_time(all_131_7_320) = v4 & b_stored(all_131_6_319) = v10 & triple(all_11_4_36, all_131_7_320, v4) = v5 & triple(b, v3, v6) = v7 & encrypt(v5, bt) = v6 & sent(all_11_4_36, b, all_131_6_319) = v0 & sent(b, t, v7) = v8 & message(v8) = v9 & message(v0) = v1 & ( ~ (v2 = 0) |  ~ (v1 = 0) | (v10 = 0 & v9 = 0)))
% 50.76/18.15  				|
% 50.76/18.15  				| Instantiating formula (73) with all_149_10_388, b, all_15_14_75, all_15_7_68 and discharging atoms sent(all_15_14_75, b, all_15_7_68) = all_149_10_388, yields:
% 50.76/18.15  				| (610)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (party_of_protocol(all_15_14_75) = v1 & party_of_protocol(b) = v2 & intruder_message(all_15_7_68) = v0 & message(all_149_10_388) = v3 & ( ~ (v2 = 0) |  ~ (v1 = 0) |  ~ (v0 = 0) | v3 = 0))
% 50.76/18.15  				|
% 50.76/18.15  				| Instantiating formula (73) with all_145_10_374, b, all_15_15_76, all_15_4_65 and discharging atoms sent(all_15_15_76, b, all_15_4_65) = all_145_10_374, yields:
% 50.76/18.15  				| (611)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (party_of_protocol(all_15_15_76) = v1 & party_of_protocol(b) = v2 & intruder_message(all_15_4_65) = v0 & message(all_145_10_374) = v3 & ( ~ (v2 = 0) |  ~ (v1 = 0) |  ~ (v0 = 0) | v3 = 0))
% 50.76/18.15  				|
% 50.76/18.15  				| Instantiating formula (73) with all_137_10_346, b, all_13_9_55, all_13_6_52 and discharging atoms sent(all_13_9_55, b, all_13_6_52) = all_137_10_346, yields:
% 50.76/18.15  				| (612)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (party_of_protocol(all_13_9_55) = v1 & party_of_protocol(b) = v2 & intruder_message(all_13_6_52) = v0 & message(all_137_10_346) = v3 & ( ~ (v2 = 0) |  ~ (v1 = 0) |  ~ (v0 = 0) | v3 = 0))
% 50.76/18.15  				|
% 50.76/18.15  				| Instantiating formula (73) with all_143_10_363, b, all_13_13_59, all_13_3_49 and discharging atoms sent(all_13_13_59, b, all_13_3_49) = all_143_10_363, yields:
% 50.76/18.15  				| (613)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (party_of_protocol(all_13_13_59) = v1 & party_of_protocol(b) = v2 & intruder_message(all_13_3_49) = v0 & message(all_143_10_363) = v3 & ( ~ (v2 = 0) |  ~ (v1 = 0) |  ~ (v0 = 0) | v3 = 0))
% 50.76/18.15  				|
% 50.76/18.15  				| Instantiating formula (73) with all_131_5_318, b, all_11_13_45, all_131_6_319 and discharging atoms sent(all_11_13_45, b, all_131_6_319) = all_131_5_318, yields:
% 50.76/18.15  				| (614)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (party_of_protocol(all_11_13_45) = v1 & party_of_protocol(b) = v2 & intruder_message(all_131_6_319) = v0 & message(all_131_5_318) = v3 & ( ~ (v2 = 0) |  ~ (v1 = 0) |  ~ (v0 = 0) | v3 = 0))
% 50.76/18.15  				|
% 50.76/18.15  				| Instantiating formula (73) with all_63_10_193, b, b, all_0_3_3 and discharging atoms sent(b, b, all_0_3_3) = all_63_10_193, yields:
% 50.76/18.15  				| (615)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (party_of_protocol(b) = v2 & party_of_protocol(b) = v1 & intruder_message(all_0_3_3) = v0 & message(all_63_10_193) = v3 & ( ~ (v2 = 0) |  ~ (v1 = 0) |  ~ (v0 = 0) | v3 = 0))
% 50.76/18.15  				|
% 50.76/18.15  				| Instantiating formula (4) with all_63_10_193, all_0_3_3, b, b and discharging atoms sent(b, b, all_0_3_3) = all_63_10_193, yields:
% 50.76/18.15  				| (616)  ? [v0] :  ? [v1] : (intruder_message(all_0_3_3) = v1 & message(all_63_10_193) = v0 & ( ~ (v0 = 0) | v1 = 0))
% 50.76/18.15  				|
% 50.76/18.15  				| Instantiating formula (73) with all_149_2_380, t, b, all_149_3_381 and discharging atoms sent(b, t, all_149_3_381) = all_149_2_380, yields:
% 50.76/18.15  				| (617)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (party_of_protocol(b) = v1 & party_of_protocol(t) = v2 & intruder_message(all_149_3_381) = v0 & message(all_149_2_380) = v3 & ( ~ (v2 = 0) |  ~ (v1 = 0) |  ~ (v0 = 0) | v3 = 0))
% 50.76/18.15  				|
% 50.76/18.15  				| Instantiating formula (73) with all_145_2_366, t, b, all_145_3_367 and discharging atoms sent(b, t, all_145_3_367) = all_145_2_366, yields:
% 50.76/18.15  				| (618)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (party_of_protocol(b) = v1 & party_of_protocol(t) = v2 & intruder_message(all_145_3_367) = v0 & message(all_145_2_366) = v3 & ( ~ (v2 = 0) |  ~ (v1 = 0) |  ~ (v0 = 0) | v3 = 0))
% 50.76/18.15  				|
% 50.76/18.15  				| Instantiating formula (73) with all_143_2_355, t, b, all_143_3_356 and discharging atoms sent(b, t, all_143_3_356) = all_143_2_355, yields:
% 50.76/18.15  				| (619)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (party_of_protocol(b) = v1 & party_of_protocol(t) = v2 & intruder_message(all_143_3_356) = v0 & message(all_143_2_355) = v3 & ( ~ (v2 = 0) |  ~ (v1 = 0) |  ~ (v0 = 0) | v3 = 0))
% 50.76/18.15  				|
% 50.76/18.15  				| Instantiating formula (73) with all_137_2_338, t, b, all_137_3_339 and discharging atoms sent(b, t, all_137_3_339) = all_137_2_338, yields:
% 50.76/18.15  				| (620)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (party_of_protocol(b) = v1 & party_of_protocol(t) = v2 & intruder_message(all_137_3_339) = v0 & message(all_137_2_338) = v3 & ( ~ (v2 = 0) |  ~ (v1 = 0) |  ~ (v0 = 0) | v3 = 0))
% 50.76/18.15  				|
% 50.76/18.15  				| Instantiating formula (73) with all_63_2_185, t, b, all_63_3_186 and discharging atoms sent(b, t, all_63_3_186) = all_63_2_185, yields:
% 50.76/18.15  				| (621)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (party_of_protocol(b) = v1 & party_of_protocol(t) = v2 & intruder_message(all_63_3_186) = v0 & message(all_63_2_185) = v3 & ( ~ (v2 = 0) |  ~ (v1 = 0) |  ~ (v0 = 0) | v3 = 0))
% 50.76/18.15  				|
% 50.76/18.15  				| Instantiating formula (4) with all_63_2_185, all_63_3_186, t, b and discharging atoms sent(b, t, all_63_3_186) = all_63_2_185, yields:
% 50.76/18.15  				| (622)  ? [v0] :  ? [v1] : (intruder_message(all_63_3_186) = v1 & message(all_63_2_185) = v0 & ( ~ (v0 = 0) | v1 = 0))
% 50.76/18.15  				|
% 50.76/18.15  				| Instantiating formula (73) with all_61_2_174, t, b, all_61_3_175 and discharging atoms sent(b, t, all_61_3_175) = all_61_2_174, yields:
% 50.76/18.15  				| (623)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (party_of_protocol(b) = v1 & party_of_protocol(t) = v2 & intruder_message(all_61_3_175) = v0 & message(all_61_2_174) = v3 & ( ~ (v2 = 0) |  ~ (v1 = 0) |  ~ (v0 = 0) | v3 = 0))
% 50.76/18.15  				|
% 50.76/18.15  				| Instantiating formula (4) with all_61_2_174, all_61_3_175, t, b and discharging atoms sent(b, t, all_61_3_175) = all_61_2_174, yields:
% 50.76/18.16  				| (624)  ? [v0] :  ? [v1] : (intruder_message(all_61_3_175) = v1 & message(all_61_2_174) = v0 & ( ~ (v0 = 0) | v1 = 0))
% 50.76/18.16  				|
% 50.76/18.16  				| Instantiating formula (57) with all_109_1_268, a, bt and discharging atoms key(bt, a) = all_109_1_268, yields:
% 50.76/18.16  				| (625)  ? [v0] :  ? [v1] :  ? [v2] : (intruder_holds(all_109_1_268) = v2 & party_of_protocol(a) = v1 & intruder_message(bt) = v0 & ( ~ (v1 = 0) |  ~ (v0 = 0) | v2 = 0))
% 50.76/18.16  				|
% 50.76/18.16  				| Instantiating formula (57) with all_103_2_261, b, at and discharging atoms key(at, b) = all_103_2_261, yields:
% 50.76/18.16  				| (626)  ? [v0] :  ? [v1] :  ? [v2] : (intruder_holds(all_103_2_261) = v2 & party_of_protocol(b) = v1 & intruder_message(at) = v0 & ( ~ (v1 = 0) |  ~ (v0 = 0) | v2 = 0))
% 50.76/18.16  				|
% 50.76/18.16  				| Instantiating (605) with all_243_0_490, all_243_1_491, all_243_2_492, all_243_3_493 yields:
% 50.76/18.16  				| (627) intruder_message(all_63_5_188) = all_243_3_493 & intruder_message(all_61_6_178) = all_243_0_490 & intruder_message(an_a_nonce) = all_243_1_491 & intruder_message(b) = all_243_2_492 & ( ~ (all_243_3_493 = 0) | (all_243_0_490 = 0 & all_243_1_491 = 0 & all_243_2_492 = 0))
% 50.76/18.16  				|
% 50.76/18.16  				| Applying alpha-rule on (627) yields:
% 50.76/18.16  				| (628) intruder_message(b) = all_243_2_492
% 50.76/18.16  				| (629) intruder_message(an_a_nonce) = all_243_1_491
% 50.76/18.16  				| (630) intruder_message(all_63_5_188) = all_243_3_493
% 50.76/18.16  				| (631)  ~ (all_243_3_493 = 0) | (all_243_0_490 = 0 & all_243_1_491 = 0 & all_243_2_492 = 0)
% 50.76/18.16  				| (632) intruder_message(all_61_6_178) = all_243_0_490
% 50.76/18.16  				|
% 50.76/18.16  				| Instantiating (604) with all_245_0_494, all_245_1_495, all_245_2_496, all_245_3_497 yields:
% 50.76/18.16  				| (633) intruder_message(all_63_5_188) = all_245_0_494 & intruder_message(all_61_6_178) = all_245_1_495 & intruder_message(an_a_nonce) = all_245_2_496 & intruder_message(b) = all_245_3_497 & ( ~ (all_245_1_495 = 0) |  ~ (all_245_2_496 = 0) |  ~ (all_245_3_497 = 0) | all_245_0_494 = 0)
% 50.76/18.16  				|
% 50.76/18.16  				| Applying alpha-rule on (633) yields:
% 50.76/18.16  				| (634) intruder_message(all_61_6_178) = all_245_1_495
% 50.76/18.16  				| (635) intruder_message(an_a_nonce) = all_245_2_496
% 50.76/18.16  				| (636) intruder_message(all_63_5_188) = all_245_0_494
% 50.76/18.16  				| (637) intruder_message(b) = all_245_3_497
% 50.76/18.16  				| (638)  ~ (all_245_1_495 = 0) |  ~ (all_245_2_496 = 0) |  ~ (all_245_3_497 = 0) | all_245_0_494 = 0
% 50.76/18.16  				|
% 50.76/18.16  				| Instantiating (601) with all_253_0_522, all_253_1_523, all_253_2_524, all_253_3_525 yields:
% 50.76/18.16  				| (639) intruder_message(all_143_3_356) = all_253_3_525 & intruder_message(all_143_4_357) = all_253_0_522 & intruder_message(all_13_8_54) = all_253_1_523 & intruder_message(b) = all_253_2_524 & ( ~ (all_253_3_525 = 0) | (all_253_0_522 = 0 & all_253_1_523 = 0 & all_253_2_524 = 0))
% 50.76/18.16  				|
% 50.76/18.16  				| Applying alpha-rule on (639) yields:
% 50.76/18.16  				| (640) intruder_message(all_143_3_356) = all_253_3_525
% 50.76/18.16  				| (641) intruder_message(b) = all_253_2_524
% 50.76/18.16  				| (642) intruder_message(all_13_8_54) = all_253_1_523
% 50.76/18.16  				| (643) intruder_message(all_143_4_357) = all_253_0_522
% 50.76/18.16  				| (644)  ~ (all_253_3_525 = 0) | (all_253_0_522 = 0 & all_253_1_523 = 0 & all_253_2_524 = 0)
% 50.76/18.16  				|
% 50.76/18.16  				| Instantiating (600) with all_255_0_526, all_255_1_527, all_255_2_528, all_255_3_529 yields:
% 50.76/18.16  				| (645) intruder_message(all_143_3_356) = all_255_0_526 & intruder_message(all_143_4_357) = all_255_1_527 & intruder_message(all_13_8_54) = all_255_2_528 & intruder_message(b) = all_255_3_529 & ( ~ (all_255_1_527 = 0) |  ~ (all_255_2_528 = 0) |  ~ (all_255_3_529 = 0) | all_255_0_526 = 0)
% 50.76/18.16  				|
% 50.76/18.16  				| Applying alpha-rule on (645) yields:
% 50.76/18.16  				| (646) intruder_message(b) = all_255_3_529
% 50.76/18.16  				| (647) intruder_message(all_143_4_357) = all_255_1_527
% 50.76/18.16  				| (648) intruder_message(all_143_3_356) = all_255_0_526
% 50.76/18.16  				| (649)  ~ (all_255_1_527 = 0) |  ~ (all_255_2_528 = 0) |  ~ (all_255_3_529 = 0) | all_255_0_526 = 0
% 50.76/18.16  				| (650) intruder_message(all_13_8_54) = all_255_2_528
% 50.76/18.16  				|
% 50.76/18.16  				| Instantiating (599) with all_257_0_530, all_257_1_531, all_257_2_532, all_257_3_533 yields:
% 50.76/18.16  				| (651) intruder_message(all_61_3_175) = all_257_3_533 & intruder_message(all_61_4_176) = all_257_0_530 & intruder_message(all_61_7_179) = all_257_1_531 & intruder_message(b) = all_257_2_532 & ( ~ (all_257_3_533 = 0) | (all_257_0_530 = 0 & all_257_1_531 = 0 & all_257_2_532 = 0))
% 50.76/18.16  				|
% 50.76/18.16  				| Applying alpha-rule on (651) yields:
% 50.76/18.16  				| (652) intruder_message(all_61_4_176) = all_257_0_530
% 50.76/18.16  				| (653) intruder_message(all_61_3_175) = all_257_3_533
% 50.76/18.16  				| (654) intruder_message(b) = all_257_2_532
% 50.76/18.16  				| (655)  ~ (all_257_3_533 = 0) | (all_257_0_530 = 0 & all_257_1_531 = 0 & all_257_2_532 = 0)
% 50.76/18.16  				| (656) intruder_message(all_61_7_179) = all_257_1_531
% 50.76/18.16  				|
% 50.76/18.16  				| Instantiating (598) with all_259_0_534, all_259_1_535, all_259_2_536, all_259_3_537 yields:
% 50.76/18.16  				| (657) intruder_message(all_61_3_175) = all_259_0_534 & intruder_message(all_61_4_176) = all_259_1_535 & intruder_message(all_61_7_179) = all_259_2_536 & intruder_message(b) = all_259_3_537 & ( ~ (all_259_1_535 = 0) |  ~ (all_259_2_536 = 0) |  ~ (all_259_3_537 = 0) | all_259_0_534 = 0)
% 50.76/18.16  				|
% 50.76/18.16  				| Applying alpha-rule on (657) yields:
% 50.76/18.16  				| (658)  ~ (all_259_1_535 = 0) |  ~ (all_259_2_536 = 0) |  ~ (all_259_3_537 = 0) | all_259_0_534 = 0
% 50.76/18.16  				| (659) intruder_message(all_61_7_179) = all_259_2_536
% 50.76/18.16  				| (660) intruder_message(all_61_4_176) = all_259_1_535
% 50.76/18.16  				| (661) intruder_message(b) = all_259_3_537
% 50.76/18.16  				| (662) intruder_message(all_61_3_175) = all_259_0_534
% 50.76/18.16  				|
% 50.76/18.16  				| Instantiating (586) with all_269_0_554, all_269_1_555, all_269_2_556, all_269_3_557, all_269_4_558, all_269_5_559, all_269_6_560, all_269_7_561, all_269_8_562, all_269_9_563 yields:
% 50.76/18.16  				| (663) b_holds(all_269_1_555) = all_269_0_554 & generate_b_nonce(all_15_5_66) = all_269_8_562 & b_stored(all_269_3_557) = all_269_2_556 & encrypt(all_269_8_562, all_15_5_66) = all_269_7_561 & encrypt(all_145_5_369, bt) = all_269_9_563 & pair(all_269_9_563, all_269_7_561) = all_269_6_560 & pair(all_15_15_76, all_15_5_66) = all_269_3_557 & sent(all_15_15_76, b, all_269_6_560) = all_269_5_559 & message(all_269_5_559) = all_269_4_558 & key(all_15_5_66, all_15_15_76) = all_269_1_555 & ( ~ (all_269_2_556 = 0) |  ~ (all_269_4_558 = 0) | all_269_0_554 = 0)
% 50.76/18.16  				|
% 50.76/18.16  				| Applying alpha-rule on (663) yields:
% 50.76/18.16  				| (664) encrypt(all_269_8_562, all_15_5_66) = all_269_7_561
% 50.76/18.16  				| (665) message(all_269_5_559) = all_269_4_558
% 50.76/18.16  				| (666) pair(all_15_15_76, all_15_5_66) = all_269_3_557
% 50.76/18.16  				| (667) key(all_15_5_66, all_15_15_76) = all_269_1_555
% 50.76/18.16  				| (668) b_holds(all_269_1_555) = all_269_0_554
% 50.76/18.16  				| (669) encrypt(all_145_5_369, bt) = all_269_9_563
% 50.76/18.16  				| (670) generate_b_nonce(all_15_5_66) = all_269_8_562
% 50.76/18.16  				| (671) sent(all_15_15_76, b, all_269_6_560) = all_269_5_559
% 50.76/18.16  				| (672) pair(all_269_9_563, all_269_7_561) = all_269_6_560
% 50.76/18.16  				| (673)  ~ (all_269_2_556 = 0) |  ~ (all_269_4_558 = 0) | all_269_0_554 = 0
% 50.76/18.16  				| (674) b_stored(all_269_3_557) = all_269_2_556
% 50.76/18.16  				|
% 50.76/18.16  				| Instantiating (589) with all_273_0_568, all_273_1_569, all_273_2_570, all_273_3_571 yields:
% 50.76/18.16  				| (675) intruder_message(all_137_5_341) = all_273_3_571 & intruder_message(all_137_6_342) = all_273_0_568 & intruder_message(all_13_7_53) = all_273_1_569 & intruder_message(all_13_9_55) = all_273_2_570 & ( ~ (all_273_3_571 = 0) | (all_273_0_568 = 0 & all_273_1_569 = 0 & all_273_2_570 = 0))
% 50.76/18.16  				|
% 50.76/18.16  				| Applying alpha-rule on (675) yields:
% 50.76/18.16  				| (676) intruder_message(all_13_7_53) = all_273_1_569
% 50.76/18.16  				| (677) intruder_message(all_137_5_341) = all_273_3_571
% 50.76/18.16  				| (678)  ~ (all_273_3_571 = 0) | (all_273_0_568 = 0 & all_273_1_569 = 0 & all_273_2_570 = 0)
% 50.76/18.16  				| (679) intruder_message(all_137_6_342) = all_273_0_568
% 50.76/18.16  				| (680) intruder_message(all_13_9_55) = all_273_2_570
% 50.76/18.16  				|
% 50.76/18.16  				| Instantiating (588) with all_275_0_572, all_275_1_573, all_275_2_574, all_275_3_575 yields:
% 50.76/18.16  				| (681) intruder_message(all_137_5_341) = all_275_0_572 & intruder_message(all_137_6_342) = all_275_1_573 & intruder_message(all_13_7_53) = all_275_2_574 & intruder_message(all_13_9_55) = all_275_3_575 & ( ~ (all_275_1_573 = 0) |  ~ (all_275_2_574 = 0) |  ~ (all_275_3_575 = 0) | all_275_0_572 = 0)
% 50.76/18.16  				|
% 50.76/18.16  				| Applying alpha-rule on (681) yields:
% 50.76/18.16  				| (682) intruder_message(all_137_5_341) = all_275_0_572
% 50.76/18.16  				| (683) intruder_message(all_137_6_342) = all_275_1_573
% 50.76/18.16  				| (684) intruder_message(all_13_7_53) = all_275_2_574
% 50.76/18.16  				| (685)  ~ (all_275_1_573 = 0) |  ~ (all_275_2_574 = 0) |  ~ (all_275_3_575 = 0) | all_275_0_572 = 0
% 50.76/18.16  				| (686) intruder_message(all_13_9_55) = all_275_3_575
% 50.76/18.16  				|
% 50.76/18.16  				| Instantiating (587) with all_277_0_576, all_277_1_577, all_277_2_578, all_277_3_579, all_277_4_580, all_277_5_581, all_277_6_582, all_277_7_583, all_277_8_584, all_277_9_585 yields:
% 50.76/18.16  				| (687) b_holds(all_277_1_577) = all_277_0_576 & generate_b_nonce(all_13_7_53) = all_277_8_584 & b_stored(all_277_3_579) = all_277_2_578 & encrypt(all_277_8_584, all_13_7_53) = all_277_7_583 & encrypt(all_137_5_341, bt) = all_277_9_585 & pair(all_277_9_585, all_277_7_583) = all_277_6_582 & pair(all_13_9_55, all_13_7_53) = all_277_3_579 & sent(all_13_9_55, b, all_277_6_582) = all_277_5_581 & message(all_277_5_581) = all_277_4_580 & key(all_13_7_53, all_13_9_55) = all_277_1_577 & ( ~ (all_277_2_578 = 0) |  ~ (all_277_4_580 = 0) | all_277_0_576 = 0)
% 50.76/18.16  				|
% 50.76/18.16  				| Applying alpha-rule on (687) yields:
% 50.76/18.16  				| (688) encrypt(all_277_8_584, all_13_7_53) = all_277_7_583
% 50.76/18.16  				| (689) pair(all_13_9_55, all_13_7_53) = all_277_3_579
% 50.76/18.16  				| (690) key(all_13_7_53, all_13_9_55) = all_277_1_577
% 50.76/18.16  				| (691)  ~ (all_277_2_578 = 0) |  ~ (all_277_4_580 = 0) | all_277_0_576 = 0
% 50.76/18.16  				| (692) generate_b_nonce(all_13_7_53) = all_277_8_584
% 50.76/18.16  				| (693) sent(all_13_9_55, b, all_277_6_582) = all_277_5_581
% 50.76/18.16  				| (694) b_stored(all_277_3_579) = all_277_2_578
% 50.76/18.16  				| (695) pair(all_277_9_585, all_277_7_583) = all_277_6_582
% 50.76/18.16  				| (696) message(all_277_5_581) = all_277_4_580
% 50.76/18.16  				| (697) encrypt(all_137_5_341, bt) = all_277_9_585
% 50.76/18.16  				| (698) b_holds(all_277_1_577) = all_277_0_576
% 50.76/18.16  				|
% 50.76/18.16  				| Instantiating (585) with all_281_0_596, all_281_1_597, all_281_2_598, all_281_3_599, all_281_4_600, all_281_5_601, all_281_6_602, all_281_7_603, all_281_8_604, all_281_9_605 yields:
% 50.76/18.16  				| (699) b_holds(all_281_1_597) = all_281_0_596 & generate_b_nonce(all_15_13_74) = all_281_8_604 & b_stored(all_281_3_599) = all_281_2_598 & encrypt(all_281_8_604, all_15_13_74) = all_281_7_603 & encrypt(all_149_5_383, bt) = all_281_9_605 & pair(all_281_9_605, all_281_7_603) = all_281_6_602 & pair(all_15_14_75, all_15_13_74) = all_281_3_599 & sent(all_15_14_75, b, all_281_6_602) = all_281_5_601 & message(all_281_5_601) = all_281_4_600 & key(all_15_13_74, all_15_14_75) = all_281_1_597 & ( ~ (all_281_2_598 = 0) |  ~ (all_281_4_600 = 0) | all_281_0_596 = 0)
% 50.76/18.17  				|
% 50.76/18.17  				| Applying alpha-rule on (699) yields:
% 50.76/18.17  				| (700) b_stored(all_281_3_599) = all_281_2_598
% 50.76/18.17  				| (701) sent(all_15_14_75, b, all_281_6_602) = all_281_5_601
% 50.76/18.17  				| (702) pair(all_281_9_605, all_281_7_603) = all_281_6_602
% 50.76/18.17  				| (703) generate_b_nonce(all_15_13_74) = all_281_8_604
% 50.76/18.17  				| (704) pair(all_15_14_75, all_15_13_74) = all_281_3_599
% 50.76/18.17  				| (705) message(all_281_5_601) = all_281_4_600
% 50.76/18.17  				| (706)  ~ (all_281_2_598 = 0) |  ~ (all_281_4_600 = 0) | all_281_0_596 = 0
% 50.76/18.17  				| (707) key(all_15_13_74, all_15_14_75) = all_281_1_597
% 50.76/18.17  				| (708) encrypt(all_149_5_383, bt) = all_281_9_605
% 50.76/18.17  				| (709) encrypt(all_281_8_604, all_15_13_74) = all_281_7_603
% 50.76/18.17  				| (710) b_holds(all_281_1_597) = all_281_0_596
% 50.76/18.17  				|
% 50.76/18.17  				| Instantiating (603) with all_285_0_616, all_285_1_617, all_285_2_618, all_285_3_619, all_285_4_620, all_285_5_621, all_285_6_622, all_285_7_623, all_285_8_624, all_285_9_625 yields:
% 50.76/18.17  				| (711) b_holds(all_285_1_617) = all_285_0_616 & generate_b_nonce(an_a_nonce) = all_285_8_624 & b_stored(all_285_3_619) = all_285_2_618 & encrypt(all_285_8_624, an_a_nonce) = all_285_7_623 & encrypt(all_63_5_188, bt) = all_285_9_625 & pair(all_285_9_625, all_285_7_623) = all_285_6_622 & pair(b, an_a_nonce) = all_285_3_619 & sent(b, b, all_285_6_622) = all_285_5_621 & message(all_285_5_621) = all_285_4_620 & key(an_a_nonce, b) = all_285_1_617 & ( ~ (all_285_2_618 = 0) |  ~ (all_285_4_620 = 0) | all_285_0_616 = 0)
% 50.76/18.17  				|
% 50.76/18.17  				| Applying alpha-rule on (711) yields:
% 50.76/18.17  				| (712) encrypt(all_285_8_624, an_a_nonce) = all_285_7_623
% 50.76/18.17  				| (713) b_holds(all_285_1_617) = all_285_0_616
% 50.76/18.17  				| (714) b_stored(all_285_3_619) = all_285_2_618
% 50.76/18.17  				| (715) encrypt(all_63_5_188, bt) = all_285_9_625
% 50.76/18.17  				| (716) key(an_a_nonce, b) = all_285_1_617
% 50.76/18.17  				| (717) pair(all_285_9_625, all_285_7_623) = all_285_6_622
% 50.76/18.17  				| (718) sent(b, b, all_285_6_622) = all_285_5_621
% 50.76/18.17  				| (719) pair(b, an_a_nonce) = all_285_3_619
% 50.76/18.17  				| (720) message(all_285_5_621) = all_285_4_620
% 50.76/18.17  				| (721)  ~ (all_285_2_618 = 0) |  ~ (all_285_4_620 = 0) | all_285_0_616 = 0
% 50.76/18.17  				| (722) generate_b_nonce(an_a_nonce) = all_285_8_624
% 50.76/18.17  				|
% 50.76/18.17  				| Instantiating (602) with all_287_0_626, all_287_1_627, all_287_2_628, all_287_3_629, all_287_4_630, all_287_5_631, all_287_6_632, all_287_7_633, all_287_8_634, all_287_9_635 yields:
% 50.76/18.17  				| (723) fresh_to_b(an_a_nonce) = all_287_6_632 & generate_b_nonce(an_a_nonce) = all_287_5_631 & b_stored(all_287_9_635) = all_287_0_626 & triple(b, all_287_5_631, all_287_4_630) = all_287_3_629 & encrypt(all_63_5_188, bt) = all_287_4_630 & pair(b, an_a_nonce) = all_287_9_635 & sent(b, b, all_287_9_635) = all_287_8_634 & sent(b, t, all_287_3_629) = all_287_2_628 & message(all_287_2_628) = all_287_1_627 & message(all_287_8_634) = all_287_7_633 & ( ~ (all_287_6_632 = 0) |  ~ (all_287_7_633 = 0) | (all_287_0_626 = 0 & all_287_1_627 = 0))
% 50.76/18.17  				|
% 50.76/18.17  				| Applying alpha-rule on (723) yields:
% 50.76/18.17  				| (724) triple(b, all_287_5_631, all_287_4_630) = all_287_3_629
% 50.76/18.17  				| (725) pair(b, an_a_nonce) = all_287_9_635
% 50.76/18.17  				| (726) encrypt(all_63_5_188, bt) = all_287_4_630
% 50.76/18.17  				| (727)  ~ (all_287_6_632 = 0) |  ~ (all_287_7_633 = 0) | (all_287_0_626 = 0 & all_287_1_627 = 0)
% 50.76/18.17  				| (728) message(all_287_8_634) = all_287_7_633
% 50.76/18.17  				| (729) sent(b, t, all_287_3_629) = all_287_2_628
% 50.76/18.17  				| (730) sent(b, b, all_287_9_635) = all_287_8_634
% 50.76/18.17  				| (731) fresh_to_b(an_a_nonce) = all_287_6_632
% 50.76/18.17  				| (732) message(all_287_2_628) = all_287_1_627
% 50.76/18.17  				| (733) b_stored(all_287_9_635) = all_287_0_626
% 50.76/18.17  				| (734) generate_b_nonce(an_a_nonce) = all_287_5_631
% 50.76/18.17  				|
% 50.76/18.17  				| Instantiating (626) with all_289_0_636, all_289_1_637, all_289_2_638 yields:
% 50.76/18.17  				| (735) intruder_holds(all_103_2_261) = all_289_0_636 & party_of_protocol(b) = all_289_1_637 & intruder_message(at) = all_289_2_638 & ( ~ (all_289_1_637 = 0) |  ~ (all_289_2_638 = 0) | all_289_0_636 = 0)
% 50.76/18.17  				|
% 50.76/18.17  				| Applying alpha-rule on (735) yields:
% 50.76/18.17  				| (736) intruder_holds(all_103_2_261) = all_289_0_636
% 50.76/18.17  				| (737) party_of_protocol(b) = all_289_1_637
% 50.76/18.17  				| (738) intruder_message(at) = all_289_2_638
% 50.76/18.17  				| (739)  ~ (all_289_1_637 = 0) |  ~ (all_289_2_638 = 0) | all_289_0_636 = 0
% 50.76/18.17  				|
% 50.76/18.17  				| Instantiating (625) with all_293_0_642, all_293_1_643, all_293_2_644 yields:
% 50.76/18.17  				| (740) intruder_holds(all_109_1_268) = all_293_0_642 & party_of_protocol(a) = all_293_1_643 & intruder_message(bt) = all_293_2_644 & ( ~ (all_293_1_643 = 0) |  ~ (all_293_2_644 = 0) | all_293_0_642 = 0)
% 50.76/18.17  				|
% 50.76/18.17  				| Applying alpha-rule on (740) yields:
% 50.76/18.17  				| (741) intruder_holds(all_109_1_268) = all_293_0_642
% 50.76/18.17  				| (742) party_of_protocol(a) = all_293_1_643
% 50.76/18.17  				| (743) intruder_message(bt) = all_293_2_644
% 50.76/18.17  				| (744)  ~ (all_293_1_643 = 0) |  ~ (all_293_2_644 = 0) | all_293_0_642 = 0
% 50.76/18.17  				|
% 50.76/18.17  				| Instantiating (597) with all_295_0_645, all_295_1_646, all_295_2_647, all_295_3_648 yields:
% 50.76/18.17  				| (745) intruder_message(all_63_3_186) = all_295_3_648 & intruder_message(all_63_4_187) = all_295_0_645 & intruder_message(all_61_7_179) = all_295_1_646 & intruder_message(b) = all_295_2_647 & ( ~ (all_295_3_648 = 0) | (all_295_0_645 = 0 & all_295_1_646 = 0 & all_295_2_647 = 0))
% 50.76/18.17  				|
% 50.76/18.17  				| Applying alpha-rule on (745) yields:
% 50.76/18.17  				| (746) intruder_message(all_61_7_179) = all_295_1_646
% 50.76/18.17  				| (747) intruder_message(b) = all_295_2_647
% 50.76/18.17  				| (748)  ~ (all_295_3_648 = 0) | (all_295_0_645 = 0 & all_295_1_646 = 0 & all_295_2_647 = 0)
% 50.76/18.17  				| (749) intruder_message(all_63_3_186) = all_295_3_648
% 50.76/18.17  				| (750) intruder_message(all_63_4_187) = all_295_0_645
% 50.76/18.17  				|
% 50.76/18.17  				| Instantiating (595) with all_297_0_649, all_297_1_650, all_297_2_651, all_297_3_652 yields:
% 50.76/18.17  				| (751) intruder_message(all_137_3_339) = all_297_3_652 & intruder_message(all_137_4_340) = all_297_0_649 & intruder_message(all_137_7_343) = all_297_1_650 & intruder_message(b) = all_297_2_651 & ( ~ (all_297_3_652 = 0) | (all_297_0_649 = 0 & all_297_1_650 = 0 & all_297_2_651 = 0))
% 50.76/18.17  				|
% 50.76/18.17  				| Applying alpha-rule on (751) yields:
% 50.76/18.17  				| (752) intruder_message(all_137_7_343) = all_297_1_650
% 50.76/18.17  				| (753) intruder_message(all_137_4_340) = all_297_0_649
% 50.76/18.17  				| (754) intruder_message(all_137_3_339) = all_297_3_652
% 50.76/18.17  				| (755)  ~ (all_297_3_652 = 0) | (all_297_0_649 = 0 & all_297_1_650 = 0 & all_297_2_651 = 0)
% 50.76/18.17  				| (756) intruder_message(b) = all_297_2_651
% 50.76/18.17  				|
% 50.76/18.17  				| Instantiating (622) with all_303_0_659, all_303_1_660 yields:
% 50.76/18.17  				| (757) intruder_message(all_63_3_186) = all_303_0_659 & message(all_63_2_185) = all_303_1_660 & ( ~ (all_303_1_660 = 0) | all_303_0_659 = 0)
% 50.76/18.17  				|
% 50.76/18.17  				| Applying alpha-rule on (757) yields:
% 50.76/18.17  				| (758) intruder_message(all_63_3_186) = all_303_0_659
% 50.76/18.17  				| (759) message(all_63_2_185) = all_303_1_660
% 50.76/18.17  				| (760)  ~ (all_303_1_660 = 0) | all_303_0_659 = 0
% 50.76/18.17  				|
% 50.76/18.17  				| Instantiating (621) with all_305_0_661, all_305_1_662, all_305_2_663, all_305_3_664 yields:
% 50.76/18.17  				| (761) party_of_protocol(b) = all_305_2_663 & party_of_protocol(t) = all_305_1_662 & intruder_message(all_63_3_186) = all_305_3_664 & message(all_63_2_185) = all_305_0_661 & ( ~ (all_305_1_662 = 0) |  ~ (all_305_2_663 = 0) |  ~ (all_305_3_664 = 0) | all_305_0_661 = 0)
% 50.76/18.17  				|
% 50.76/18.17  				| Applying alpha-rule on (761) yields:
% 50.76/18.17  				| (762) message(all_63_2_185) = all_305_0_661
% 50.76/18.17  				| (763) party_of_protocol(t) = all_305_1_662
% 50.76/18.17  				| (764)  ~ (all_305_1_662 = 0) |  ~ (all_305_2_663 = 0) |  ~ (all_305_3_664 = 0) | all_305_0_661 = 0
% 50.76/18.17  				| (765) intruder_message(all_63_3_186) = all_305_3_664
% 50.76/18.17  				| (766) party_of_protocol(b) = all_305_2_663
% 50.76/18.17  				|
% 50.76/18.17  				| Instantiating (624) with all_309_0_667, all_309_1_668 yields:
% 50.76/18.17  				| (767) intruder_message(all_61_3_175) = all_309_0_667 & message(all_61_2_174) = all_309_1_668 & ( ~ (all_309_1_668 = 0) | all_309_0_667 = 0)
% 50.76/18.17  				|
% 50.76/18.17  				| Applying alpha-rule on (767) yields:
% 50.76/18.17  				| (768) intruder_message(all_61_3_175) = all_309_0_667
% 50.76/18.17  				| (769) message(all_61_2_174) = all_309_1_668
% 50.76/18.17  				| (770)  ~ (all_309_1_668 = 0) | all_309_0_667 = 0
% 50.76/18.17  				|
% 50.76/18.17  				| Instantiating (594) with all_315_0_673, all_315_1_674, all_315_2_675, all_315_3_676 yields:
% 50.76/18.17  				| (771) intruder_message(all_137_3_339) = all_315_0_673 & intruder_message(all_137_4_340) = all_315_1_674 & intruder_message(all_137_7_343) = all_315_2_675 & intruder_message(b) = all_315_3_676 & ( ~ (all_315_1_674 = 0) |  ~ (all_315_2_675 = 0) |  ~ (all_315_3_676 = 0) | all_315_0_673 = 0)
% 50.76/18.17  				|
% 50.76/18.17  				| Applying alpha-rule on (771) yields:
% 50.76/18.17  				| (772)  ~ (all_315_1_674 = 0) |  ~ (all_315_2_675 = 0) |  ~ (all_315_3_676 = 0) | all_315_0_673 = 0
% 50.76/18.17  				| (773) intruder_message(all_137_4_340) = all_315_1_674
% 50.76/18.17  				| (774) intruder_message(all_137_3_339) = all_315_0_673
% 50.76/18.17  				| (775) intruder_message(b) = all_315_3_676
% 50.76/18.17  				| (776) intruder_message(all_137_7_343) = all_315_2_675
% 50.76/18.17  				|
% 50.76/18.17  				| Instantiating (596) with all_317_0_677, all_317_1_678, all_317_2_679, all_317_3_680 yields:
% 50.76/18.17  				| (777) intruder_message(all_63_3_186) = all_317_0_677 & intruder_message(all_63_4_187) = all_317_1_678 & intruder_message(all_61_7_179) = all_317_2_679 & intruder_message(b) = all_317_3_680 & ( ~ (all_317_1_678 = 0) |  ~ (all_317_2_679 = 0) |  ~ (all_317_3_680 = 0) | all_317_0_677 = 0)
% 50.76/18.17  				|
% 50.76/18.17  				| Applying alpha-rule on (777) yields:
% 50.76/18.17  				| (778)  ~ (all_317_1_678 = 0) |  ~ (all_317_2_679 = 0) |  ~ (all_317_3_680 = 0) | all_317_0_677 = 0
% 50.76/18.17  				| (779) intruder_message(all_61_7_179) = all_317_2_679
% 50.76/18.17  				| (780) intruder_message(all_63_3_186) = all_317_0_677
% 50.76/18.17  				| (781) intruder_message(all_63_4_187) = all_317_1_678
% 50.76/18.17  				| (782) intruder_message(b) = all_317_3_680
% 50.76/18.17  				|
% 50.76/18.17  				| Instantiating (584) with all_319_0_681, all_319_1_682, all_319_2_683, all_319_3_684, all_319_4_685, all_319_5_686, all_319_6_687, all_319_7_688, all_319_8_689, all_319_9_690 yields:
% 50.76/18.17  				| (783) fresh_to_b(all_15_13_74) = all_319_6_687 & generate_b_nonce(all_15_13_74) = all_319_5_686 & b_stored(all_319_9_690) = all_319_0_681 & triple(b, all_319_5_686, all_319_4_685) = all_319_3_684 & encrypt(all_149_5_383, bt) = all_319_4_685 & pair(all_15_14_75, all_15_13_74) = all_319_9_690 & sent(all_15_14_75, b, all_319_9_690) = all_319_8_689 & sent(b, t, all_319_3_684) = all_319_2_683 & message(all_319_2_683) = all_319_1_682 & message(all_319_8_689) = all_319_7_688 & ( ~ (all_319_6_687 = 0) |  ~ (all_319_7_688 = 0) | (all_319_0_681 = 0 & all_319_1_682 = 0))
% 50.76/18.17  				|
% 50.76/18.17  				| Applying alpha-rule on (783) yields:
% 50.76/18.17  				| (784) message(all_319_8_689) = all_319_7_688
% 50.76/18.17  				| (785) sent(all_15_14_75, b, all_319_9_690) = all_319_8_689
% 50.76/18.18  				| (786) pair(all_15_14_75, all_15_13_74) = all_319_9_690
% 50.76/18.18  				| (787) sent(b, t, all_319_3_684) = all_319_2_683
% 50.76/18.18  				| (788) fresh_to_b(all_15_13_74) = all_319_6_687
% 50.76/18.18  				| (789) generate_b_nonce(all_15_13_74) = all_319_5_686
% 50.76/18.18  				| (790) b_stored(all_319_9_690) = all_319_0_681
% 50.76/18.18  				| (791) encrypt(all_149_5_383, bt) = all_319_4_685
% 50.76/18.18  				| (792) triple(b, all_319_5_686, all_319_4_685) = all_319_3_684
% 50.76/18.18  				| (793)  ~ (all_319_6_687 = 0) |  ~ (all_319_7_688 = 0) | (all_319_0_681 = 0 & all_319_1_682 = 0)
% 50.76/18.18  				| (794) message(all_319_2_683) = all_319_1_682
% 50.76/18.18  				|
% 50.76/18.18  				| Instantiating (593) with all_321_0_691, all_321_1_692, all_321_2_693, all_321_3_694 yields:
% 50.76/18.18  				| (795) intruder_message(all_145_3_367) = all_321_3_694 & intruder_message(all_145_4_368) = all_321_0_691 & intruder_message(all_145_7_371) = all_321_1_692 & intruder_message(b) = all_321_2_693 & ( ~ (all_321_3_694 = 0) | (all_321_0_691 = 0 & all_321_1_692 = 0 & all_321_2_693 = 0))
% 50.76/18.18  				|
% 50.76/18.18  				| Applying alpha-rule on (795) yields:
% 50.76/18.18  				| (796) intruder_message(all_145_4_368) = all_321_0_691
% 50.76/18.18  				| (797) intruder_message(b) = all_321_2_693
% 50.76/18.18  				| (798) intruder_message(all_145_3_367) = all_321_3_694
% 50.76/18.18  				| (799) intruder_message(all_145_7_371) = all_321_1_692
% 50.76/18.18  				| (800)  ~ (all_321_3_694 = 0) | (all_321_0_691 = 0 & all_321_1_692 = 0 & all_321_2_693 = 0)
% 50.76/18.18  				|
% 50.76/18.18  				| Instantiating (592) with all_323_0_695, all_323_1_696, all_323_2_697, all_323_3_698 yields:
% 50.76/18.18  				| (801) intruder_message(all_145_3_367) = all_323_0_695 & intruder_message(all_145_4_368) = all_323_1_696 & intruder_message(all_145_7_371) = all_323_2_697 & intruder_message(b) = all_323_3_698 & ( ~ (all_323_1_696 = 0) |  ~ (all_323_2_697 = 0) |  ~ (all_323_3_698 = 0) | all_323_0_695 = 0)
% 50.76/18.18  				|
% 50.76/18.18  				| Applying alpha-rule on (801) yields:
% 50.76/18.18  				| (802) intruder_message(all_145_3_367) = all_323_0_695
% 50.76/18.18  				| (803) intruder_message(all_145_7_371) = all_323_2_697
% 50.76/18.18  				| (804)  ~ (all_323_1_696 = 0) |  ~ (all_323_2_697 = 0) |  ~ (all_323_3_698 = 0) | all_323_0_695 = 0
% 50.76/18.18  				| (805) intruder_message(b) = all_323_3_698
% 50.76/18.18  				| (806) intruder_message(all_145_4_368) = all_323_1_696
% 50.76/18.18  				|
% 50.76/18.18  				| Instantiating (591) with all_325_0_699, all_325_1_700, all_325_2_701, all_325_3_702 yields:
% 50.76/18.18  				| (807) intruder_message(all_149_3_381) = all_325_3_702 & intruder_message(all_149_4_382) = all_325_0_699 & intruder_message(all_149_7_385) = all_325_1_700 & intruder_message(b) = all_325_2_701 & ( ~ (all_325_3_702 = 0) | (all_325_0_699 = 0 & all_325_1_700 = 0 & all_325_2_701 = 0))
% 50.76/18.18  				|
% 50.76/18.18  				| Applying alpha-rule on (807) yields:
% 50.76/18.18  				| (808)  ~ (all_325_3_702 = 0) | (all_325_0_699 = 0 & all_325_1_700 = 0 & all_325_2_701 = 0)
% 50.76/18.18  				| (809) intruder_message(all_149_3_381) = all_325_3_702
% 50.76/18.18  				| (810) intruder_message(b) = all_325_2_701
% 50.76/18.18  				| (811) intruder_message(all_149_7_385) = all_325_1_700
% 50.76/18.18  				| (812) intruder_message(all_149_4_382) = all_325_0_699
% 50.76/18.18  				|
% 50.76/18.18  				| Instantiating (590) with all_327_0_703, all_327_1_704, all_327_2_705, all_327_3_706 yields:
% 50.76/18.18  				| (813) intruder_message(all_149_3_381) = all_327_0_703 & intruder_message(all_149_4_382) = all_327_1_704 & intruder_message(all_149_7_385) = all_327_2_705 & intruder_message(b) = all_327_3_706 & ( ~ (all_327_1_704 = 0) |  ~ (all_327_2_705 = 0) |  ~ (all_327_3_706 = 0) | all_327_0_703 = 0)
% 50.76/18.18  				|
% 50.76/18.18  				| Applying alpha-rule on (813) yields:
% 50.76/18.18  				| (814) intruder_message(all_149_3_381) = all_327_0_703
% 50.76/18.18  				| (815) intruder_message(all_149_7_385) = all_327_2_705
% 50.76/18.18  				| (816)  ~ (all_327_1_704 = 0) |  ~ (all_327_2_705 = 0) |  ~ (all_327_3_706 = 0) | all_327_0_703 = 0
% 50.76/18.18  				| (817) intruder_message(b) = all_327_3_706
% 50.76/18.18  				| (818) intruder_message(all_149_4_382) = all_327_1_704
% 50.76/18.18  				|
% 50.76/18.18  				| Instantiating (618) with all_329_0_707, all_329_1_708, all_329_2_709, all_329_3_710 yields:
% 50.76/18.18  				| (819) party_of_protocol(b) = all_329_2_709 & party_of_protocol(t) = all_329_1_708 & intruder_message(all_145_3_367) = all_329_3_710 & message(all_145_2_366) = all_329_0_707 & ( ~ (all_329_1_708 = 0) |  ~ (all_329_2_709 = 0) |  ~ (all_329_3_710 = 0) | all_329_0_707 = 0)
% 50.76/18.18  				|
% 50.76/18.18  				| Applying alpha-rule on (819) yields:
% 50.76/18.18  				| (820) party_of_protocol(t) = all_329_1_708
% 50.76/18.18  				| (821) party_of_protocol(b) = all_329_2_709
% 50.76/18.18  				| (822) message(all_145_2_366) = all_329_0_707
% 50.76/18.18  				| (823) intruder_message(all_145_3_367) = all_329_3_710
% 50.76/18.18  				| (824)  ~ (all_329_1_708 = 0) |  ~ (all_329_2_709 = 0) |  ~ (all_329_3_710 = 0) | all_329_0_707 = 0
% 50.76/18.18  				|
% 50.76/18.18  				| Instantiating (619) with all_331_0_711, all_331_1_712, all_331_2_713, all_331_3_714 yields:
% 50.76/18.18  				| (825) party_of_protocol(b) = all_331_2_713 & party_of_protocol(t) = all_331_1_712 & intruder_message(all_143_3_356) = all_331_3_714 & message(all_143_2_355) = all_331_0_711 & ( ~ (all_331_1_712 = 0) |  ~ (all_331_2_713 = 0) |  ~ (all_331_3_714 = 0) | all_331_0_711 = 0)
% 50.76/18.18  				|
% 50.76/18.18  				| Applying alpha-rule on (825) yields:
% 50.76/18.18  				| (826) party_of_protocol(b) = all_331_2_713
% 50.76/18.18  				| (827) message(all_143_2_355) = all_331_0_711
% 50.76/18.18  				| (828)  ~ (all_331_1_712 = 0) |  ~ (all_331_2_713 = 0) |  ~ (all_331_3_714 = 0) | all_331_0_711 = 0
% 50.76/18.18  				| (829) intruder_message(all_143_3_356) = all_331_3_714
% 50.76/18.18  				| (830) party_of_protocol(t) = all_331_1_712
% 50.76/18.18  				|
% 50.76/18.18  				| Instantiating (620) with all_333_0_715, all_333_1_716, all_333_2_717, all_333_3_718 yields:
% 50.76/18.18  				| (831) party_of_protocol(b) = all_333_2_717 & party_of_protocol(t) = all_333_1_716 & intruder_message(all_137_3_339) = all_333_3_718 & message(all_137_2_338) = all_333_0_715 & ( ~ (all_333_1_716 = 0) |  ~ (all_333_2_717 = 0) |  ~ (all_333_3_718 = 0) | all_333_0_715 = 0)
% 50.76/18.18  				|
% 50.76/18.18  				| Applying alpha-rule on (831) yields:
% 50.76/18.18  				| (832)  ~ (all_333_1_716 = 0) |  ~ (all_333_2_717 = 0) |  ~ (all_333_3_718 = 0) | all_333_0_715 = 0
% 50.76/18.18  				| (833) intruder_message(all_137_3_339) = all_333_3_718
% 50.76/18.18  				| (834) party_of_protocol(b) = all_333_2_717
% 50.76/18.18  				| (835) party_of_protocol(t) = all_333_1_716
% 50.76/18.18  				| (836) message(all_137_2_338) = all_333_0_715
% 50.76/18.18  				|
% 50.76/18.18  				| Instantiating (613) with all_339_0_723, all_339_1_724, all_339_2_725, all_339_3_726 yields:
% 50.76/18.18  				| (837) party_of_protocol(all_13_13_59) = all_339_2_725 & party_of_protocol(b) = all_339_1_724 & intruder_message(all_13_3_49) = all_339_3_726 & message(all_143_10_363) = all_339_0_723 & ( ~ (all_339_1_724 = 0) |  ~ (all_339_2_725 = 0) |  ~ (all_339_3_726 = 0) | all_339_0_723 = 0)
% 50.76/18.18  				|
% 50.76/18.18  				| Applying alpha-rule on (837) yields:
% 50.76/18.18  				| (838)  ~ (all_339_1_724 = 0) |  ~ (all_339_2_725 = 0) |  ~ (all_339_3_726 = 0) | all_339_0_723 = 0
% 50.76/18.18  				| (839) message(all_143_10_363) = all_339_0_723
% 50.76/18.18  				| (840) intruder_message(all_13_3_49) = all_339_3_726
% 50.76/18.18  				| (841) party_of_protocol(b) = all_339_1_724
% 50.76/18.18  				| (842) party_of_protocol(all_13_13_59) = all_339_2_725
% 50.76/18.18  				|
% 50.76/18.18  				| Instantiating (610) with all_343_0_729, all_343_1_730, all_343_2_731, all_343_3_732 yields:
% 50.76/18.18  				| (843) party_of_protocol(all_15_14_75) = all_343_2_731 & party_of_protocol(b) = all_343_1_730 & intruder_message(all_15_7_68) = all_343_3_732 & message(all_149_10_388) = all_343_0_729 & ( ~ (all_343_1_730 = 0) |  ~ (all_343_2_731 = 0) |  ~ (all_343_3_732 = 0) | all_343_0_729 = 0)
% 50.76/18.18  				|
% 50.76/18.18  				| Applying alpha-rule on (843) yields:
% 50.76/18.18  				| (844) intruder_message(all_15_7_68) = all_343_3_732
% 50.76/18.18  				| (845) party_of_protocol(b) = all_343_1_730
% 50.76/18.18  				| (846)  ~ (all_343_1_730 = 0) |  ~ (all_343_2_731 = 0) |  ~ (all_343_3_732 = 0) | all_343_0_729 = 0
% 50.76/18.18  				| (847) party_of_protocol(all_15_14_75) = all_343_2_731
% 50.76/18.18  				| (848) message(all_149_10_388) = all_343_0_729
% 50.76/18.18  				|
% 50.76/18.18  				| Instantiating (614) with all_347_0_736, all_347_1_737, all_347_2_738, all_347_3_739 yields:
% 50.76/18.18  				| (849) party_of_protocol(all_11_13_45) = all_347_2_738 & party_of_protocol(b) = all_347_1_737 & intruder_message(all_131_6_319) = all_347_3_739 & message(all_131_5_318) = all_347_0_736 & ( ~ (all_347_1_737 = 0) |  ~ (all_347_2_738 = 0) |  ~ (all_347_3_739 = 0) | all_347_0_736 = 0)
% 50.76/18.18  				|
% 50.76/18.18  				| Applying alpha-rule on (849) yields:
% 50.76/18.18  				| (850) party_of_protocol(b) = all_347_1_737
% 50.76/18.18  				| (851) party_of_protocol(all_11_13_45) = all_347_2_738
% 50.76/18.18  				| (852) intruder_message(all_131_6_319) = all_347_3_739
% 50.76/18.18  				| (853) message(all_131_5_318) = all_347_0_736
% 50.76/18.18  				| (854)  ~ (all_347_1_737 = 0) |  ~ (all_347_2_738 = 0) |  ~ (all_347_3_739 = 0) | all_347_0_736 = 0
% 50.76/18.18  				|
% 50.76/18.18  				| Instantiating (612) with all_351_0_742, all_351_1_743, all_351_2_744, all_351_3_745 yields:
% 50.76/18.18  				| (855) party_of_protocol(all_13_9_55) = all_351_2_744 & party_of_protocol(b) = all_351_1_743 & intruder_message(all_13_6_52) = all_351_3_745 & message(all_137_10_346) = all_351_0_742 & ( ~ (all_351_1_743 = 0) |  ~ (all_351_2_744 = 0) |  ~ (all_351_3_745 = 0) | all_351_0_742 = 0)
% 50.76/18.18  				|
% 50.76/18.18  				| Applying alpha-rule on (855) yields:
% 50.76/18.18  				| (856)  ~ (all_351_1_743 = 0) |  ~ (all_351_2_744 = 0) |  ~ (all_351_3_745 = 0) | all_351_0_742 = 0
% 50.76/18.18  				| (857) intruder_message(all_13_6_52) = all_351_3_745
% 50.76/18.18  				| (858) message(all_137_10_346) = all_351_0_742
% 50.76/18.18  				| (859) party_of_protocol(b) = all_351_1_743
% 50.76/18.18  				| (860) party_of_protocol(all_13_9_55) = all_351_2_744
% 50.76/18.18  				|
% 50.76/18.18  				| Instantiating (611) with all_355_0_748, all_355_1_749, all_355_2_750, all_355_3_751 yields:
% 50.76/18.18  				| (861) party_of_protocol(all_15_15_76) = all_355_2_750 & party_of_protocol(b) = all_355_1_749 & intruder_message(all_15_4_65) = all_355_3_751 & message(all_145_10_374) = all_355_0_748 & ( ~ (all_355_1_749 = 0) |  ~ (all_355_2_750 = 0) |  ~ (all_355_3_751 = 0) | all_355_0_748 = 0)
% 50.76/18.18  				|
% 50.76/18.18  				| Applying alpha-rule on (861) yields:
% 50.76/18.18  				| (862) party_of_protocol(all_15_15_76) = all_355_2_750
% 50.76/18.18  				| (863) party_of_protocol(b) = all_355_1_749
% 50.76/18.18  				| (864) message(all_145_10_374) = all_355_0_748
% 50.76/18.18  				| (865)  ~ (all_355_1_749 = 0) |  ~ (all_355_2_750 = 0) |  ~ (all_355_3_751 = 0) | all_355_0_748 = 0
% 50.76/18.18  				| (866) intruder_message(all_15_4_65) = all_355_3_751
% 50.76/18.18  				|
% 50.76/18.18  				| Instantiating (617) with all_359_0_754, all_359_1_755, all_359_2_756, all_359_3_757 yields:
% 50.76/18.18  				| (867) party_of_protocol(b) = all_359_2_756 & party_of_protocol(t) = all_359_1_755 & intruder_message(all_149_3_381) = all_359_3_757 & message(all_149_2_380) = all_359_0_754 & ( ~ (all_359_1_755 = 0) |  ~ (all_359_2_756 = 0) |  ~ (all_359_3_757 = 0) | all_359_0_754 = 0)
% 50.76/18.18  				|
% 50.76/18.18  				| Applying alpha-rule on (867) yields:
% 50.76/18.18  				| (868) message(all_149_2_380) = all_359_0_754
% 50.76/18.18  				| (869)  ~ (all_359_1_755 = 0) |  ~ (all_359_2_756 = 0) |  ~ (all_359_3_757 = 0) | all_359_0_754 = 0
% 50.76/18.18  				| (870) party_of_protocol(t) = all_359_1_755
% 50.76/18.18  				| (871) intruder_message(all_149_3_381) = all_359_3_757
% 50.76/18.18  				| (872) party_of_protocol(b) = all_359_2_756
% 50.76/18.18  				|
% 50.76/18.18  				| Instantiating (616) with all_361_0_758, all_361_1_759 yields:
% 50.76/18.18  				| (873) intruder_message(all_0_3_3) = all_361_0_758 & message(all_63_10_193) = all_361_1_759 & ( ~ (all_361_1_759 = 0) | all_361_0_758 = 0)
% 50.76/18.19  				|
% 50.76/18.19  				| Applying alpha-rule on (873) yields:
% 50.76/18.19  				| (874) intruder_message(all_0_3_3) = all_361_0_758
% 50.76/18.19  				| (875) message(all_63_10_193) = all_361_1_759
% 50.76/18.19  				| (876)  ~ (all_361_1_759 = 0) | all_361_0_758 = 0
% 50.76/18.19  				|
% 50.76/18.19  				| Instantiating (615) with all_363_0_760, all_363_1_761, all_363_2_762, all_363_3_763 yields:
% 50.76/18.19  				| (877) party_of_protocol(b) = all_363_1_761 & party_of_protocol(b) = all_363_2_762 & intruder_message(all_0_3_3) = all_363_3_763 & message(all_63_10_193) = all_363_0_760 & ( ~ (all_363_1_761 = 0) |  ~ (all_363_2_762 = 0) |  ~ (all_363_3_763 = 0) | all_363_0_760 = 0)
% 50.76/18.19  				|
% 50.76/18.19  				| Applying alpha-rule on (877) yields:
% 50.76/18.19  				| (878) party_of_protocol(b) = all_363_2_762
% 50.76/18.19  				| (879) intruder_message(all_0_3_3) = all_363_3_763
% 50.76/18.19  				| (880) party_of_protocol(b) = all_363_1_761
% 50.76/18.19  				| (881) message(all_63_10_193) = all_363_0_760
% 50.76/18.19  				| (882)  ~ (all_363_1_761 = 0) |  ~ (all_363_2_762 = 0) |  ~ (all_363_3_763 = 0) | all_363_0_760 = 0
% 50.76/18.19  				|
% 50.76/18.19  				| Instantiating (623) with all_365_0_764, all_365_1_765, all_365_2_766, all_365_3_767 yields:
% 50.76/18.19  				| (883) party_of_protocol(b) = all_365_2_766 & party_of_protocol(t) = all_365_1_765 & intruder_message(all_61_3_175) = all_365_3_767 & message(all_61_2_174) = all_365_0_764 & ( ~ (all_365_1_765 = 0) |  ~ (all_365_2_766 = 0) |  ~ (all_365_3_767 = 0) | all_365_0_764 = 0)
% 50.76/18.19  				|
% 50.76/18.19  				| Applying alpha-rule on (883) yields:
% 50.76/18.19  				| (884) party_of_protocol(t) = all_365_1_765
% 50.76/18.19  				| (885) intruder_message(all_61_3_175) = all_365_3_767
% 50.76/18.19  				| (886) party_of_protocol(b) = all_365_2_766
% 50.76/18.19  				| (887) message(all_61_2_174) = all_365_0_764
% 50.76/18.19  				| (888)  ~ (all_365_1_765 = 0) |  ~ (all_365_2_766 = 0) |  ~ (all_365_3_767 = 0) | all_365_0_764 = 0
% 50.76/18.19  				|
% 50.76/18.19  				| Instantiating (609) with all_369_0_771, all_369_1_772, all_369_2_773, all_369_3_774, all_369_4_775, all_369_5_776, all_369_6_777, all_369_7_778, all_369_8_779, all_369_9_780, all_369_10_781 yields:
% 50.76/18.19  				| (889) fresh_to_b(all_131_7_320) = all_369_8_779 & generate_b_nonce(all_131_7_320) = all_369_7_778 & generate_expiration_time(all_131_7_320) = all_369_6_777 & b_stored(all_131_6_319) = all_369_0_771 & triple(all_11_4_36, all_131_7_320, all_369_6_777) = all_369_5_776 & triple(b, all_369_7_778, all_369_4_775) = all_369_3_774 & encrypt(all_369_5_776, bt) = all_369_4_775 & sent(all_11_4_36, b, all_131_6_319) = all_369_10_781 & sent(b, t, all_369_3_774) = all_369_2_773 & message(all_369_2_773) = all_369_1_772 & message(all_369_10_781) = all_369_9_780 & ( ~ (all_369_8_779 = 0) |  ~ (all_369_9_780 = 0) | (all_369_0_771 = 0 & all_369_1_772 = 0))
% 50.76/18.19  				|
% 50.76/18.19  				| Applying alpha-rule on (889) yields:
% 50.76/18.19  				| (890) b_stored(all_131_6_319) = all_369_0_771
% 50.76/18.19  				| (891) encrypt(all_369_5_776, bt) = all_369_4_775
% 50.76/18.19  				| (892) sent(b, t, all_369_3_774) = all_369_2_773
% 50.76/18.19  				| (893) message(all_369_10_781) = all_369_9_780
% 50.76/18.19  				| (894) message(all_369_2_773) = all_369_1_772
% 50.76/18.19  				| (895) fresh_to_b(all_131_7_320) = all_369_8_779
% 50.76/18.19  				| (896) triple(b, all_369_7_778, all_369_4_775) = all_369_3_774
% 50.76/18.19  				| (897) generate_expiration_time(all_131_7_320) = all_369_6_777
% 50.76/18.19  				| (898)  ~ (all_369_8_779 = 0) |  ~ (all_369_9_780 = 0) | (all_369_0_771 = 0 & all_369_1_772 = 0)
% 50.76/18.19  				| (899) sent(all_11_4_36, b, all_131_6_319) = all_369_10_781
% 50.76/18.19  				| (900) triple(all_11_4_36, all_131_7_320, all_369_6_777) = all_369_5_776
% 50.76/18.19  				| (901) generate_b_nonce(all_131_7_320) = all_369_7_778
% 50.76/18.19  				|
% 50.76/18.19  				| Instantiating (608) with all_371_0_782, all_371_1_783, all_371_2_784, all_371_3_785 yields:
% 50.76/18.19  				| (902) intruder_message(all_61_5_177) = all_371_3_785 & intruder_message(all_61_6_178) = all_371_0_782 & intruder_message(an_a_nonce) = all_371_1_783 & intruder_message(a) = all_371_2_784 & ( ~ (all_371_3_785 = 0) | (all_371_0_782 = 0 & all_371_1_783 = 0 & all_371_2_784 = 0))
% 50.76/18.19  				|
% 50.76/18.19  				| Applying alpha-rule on (902) yields:
% 50.76/18.19  				| (903) intruder_message(an_a_nonce) = all_371_1_783
% 50.76/18.19  				| (904) intruder_message(all_61_5_177) = all_371_3_785
% 50.76/18.19  				| (905)  ~ (all_371_3_785 = 0) | (all_371_0_782 = 0 & all_371_1_783 = 0 & all_371_2_784 = 0)
% 50.76/18.19  				| (906) intruder_message(all_61_6_178) = all_371_0_782
% 50.76/18.19  				| (907) intruder_message(a) = all_371_2_784
% 50.76/18.19  				|
% 50.76/18.19  				| Instantiating (607) with all_373_0_786, all_373_1_787, all_373_2_788, all_373_3_789 yields:
% 50.76/18.19  				| (908) intruder_message(all_61_5_177) = all_373_0_786 & intruder_message(all_61_6_178) = all_373_1_787 & intruder_message(an_a_nonce) = all_373_2_788 & intruder_message(a) = all_373_3_789 & ( ~ (all_373_1_787 = 0) |  ~ (all_373_2_788 = 0) |  ~ (all_373_3_789 = 0) | all_373_0_786 = 0)
% 50.76/18.19  				|
% 50.76/18.19  				| Applying alpha-rule on (908) yields:
% 50.76/18.19  				| (909) intruder_message(a) = all_373_3_789
% 50.76/18.19  				| (910) intruder_message(an_a_nonce) = all_373_2_788
% 50.76/18.19  				| (911)  ~ (all_373_1_787 = 0) |  ~ (all_373_2_788 = 0) |  ~ (all_373_3_789 = 0) | all_373_0_786 = 0
% 50.76/18.19  				| (912) intruder_message(all_61_6_178) = all_373_1_787
% 50.76/18.19  				| (913) intruder_message(all_61_5_177) = all_373_0_786
% 50.76/18.19  				|
% 50.76/18.19  				| Instantiating (606) with all_375_0_790, all_375_1_791, all_375_2_792, all_375_3_793, all_375_4_794, all_375_5_795, all_375_6_796, all_375_7_797, all_375_8_798, all_375_9_799 yields:
% 50.76/18.19  				| (914) b_holds(all_375_1_791) = all_375_0_790 & generate_b_nonce(an_a_nonce) = all_375_8_798 & b_stored(all_375_3_793) = all_375_2_792 & encrypt(all_375_8_798, an_a_nonce) = all_375_7_797 & encrypt(all_61_5_177, bt) = all_375_9_799 & pair(all_375_9_799, all_375_7_797) = all_375_6_796 & pair(a, an_a_nonce) = all_375_3_793 & sent(a, b, all_375_6_796) = all_375_5_795 & message(all_375_5_795) = all_375_4_794 & key(an_a_nonce, a) = all_375_1_791 & ( ~ (all_375_2_792 = 0) |  ~ (all_375_4_794 = 0) | all_375_0_790 = 0)
% 50.76/18.19  				|
% 50.76/18.19  				| Applying alpha-rule on (914) yields:
% 50.76/18.19  				| (915) pair(all_375_9_799, all_375_7_797) = all_375_6_796
% 50.76/18.19  				| (916)  ~ (all_375_2_792 = 0) |  ~ (all_375_4_794 = 0) | all_375_0_790 = 0
% 50.76/18.19  				| (917) key(an_a_nonce, a) = all_375_1_791
% 50.76/18.19  				| (918) b_holds(all_375_1_791) = all_375_0_790
% 50.76/18.19  				| (919) message(all_375_5_795) = all_375_4_794
% 50.76/18.19  				| (920) pair(a, an_a_nonce) = all_375_3_793
% 50.76/18.19  				| (921) encrypt(all_375_8_798, an_a_nonce) = all_375_7_797
% 50.76/18.19  				| (922) b_stored(all_375_3_793) = all_375_2_792
% 50.76/18.19  				| (923) sent(a, b, all_375_6_796) = all_375_5_795
% 50.76/18.19  				| (924) generate_b_nonce(an_a_nonce) = all_375_8_798
% 50.76/18.19  				| (925) encrypt(all_61_5_177, bt) = all_375_9_799
% 50.76/18.19  				|
% 50.76/18.19  				| Instantiating formula (66) with b, all_363_2_762, all_363_1_761 and discharging atoms party_of_protocol(b) = all_363_1_761, party_of_protocol(b) = all_363_2_762, yields:
% 50.76/18.19  				| (926) all_363_1_761 = all_363_2_762
% 50.76/18.19  				|
% 50.76/18.19  				| Instantiating formula (66) with b, all_359_2_756, all_363_2_762 and discharging atoms party_of_protocol(b) = all_363_2_762, party_of_protocol(b) = all_359_2_756, yields:
% 50.76/18.19  				| (927) all_363_2_762 = all_359_2_756
% 50.76/18.19  				|
% 50.76/18.19  				| Instantiating formula (66) with b, all_355_1_749, all_365_2_766 and discharging atoms party_of_protocol(b) = all_365_2_766, party_of_protocol(b) = all_355_1_749, yields:
% 50.76/18.19  				| (928) all_365_2_766 = all_355_1_749
% 50.76/18.19  				|
% 50.76/18.19  				| Instantiating formula (66) with b, all_355_1_749, all_359_2_756 and discharging atoms party_of_protocol(b) = all_359_2_756, party_of_protocol(b) = all_355_1_749, yields:
% 50.76/18.19  				| (929) all_359_2_756 = all_355_1_749
% 50.76/18.19  				|
% 50.76/18.19  				| Instantiating formula (66) with b, all_347_1_737, all_365_2_766 and discharging atoms party_of_protocol(b) = all_365_2_766, party_of_protocol(b) = all_347_1_737, yields:
% 50.76/18.19  				| (930) all_365_2_766 = all_347_1_737
% 50.76/18.19  				|
% 50.76/18.19  				| Instantiating formula (66) with b, all_343_1_730, all_351_1_743 and discharging atoms party_of_protocol(b) = all_351_1_743, party_of_protocol(b) = all_343_1_730, yields:
% 50.76/18.19  				| (931) all_351_1_743 = all_343_1_730
% 50.76/18.19  				|
% 50.76/18.19  				| Instantiating formula (66) with b, all_339_1_724, all_365_2_766 and discharging atoms party_of_protocol(b) = all_365_2_766, party_of_protocol(b) = all_339_1_724, yields:
% 50.76/18.19  				| (932) all_365_2_766 = all_339_1_724
% 50.76/18.19  				|
% 50.76/18.19  				| Instantiating formula (66) with b, all_333_2_717, all_365_2_766 and discharging atoms party_of_protocol(b) = all_365_2_766, party_of_protocol(b) = all_333_2_717, yields:
% 50.76/18.19  				| (933) all_365_2_766 = all_333_2_717
% 50.76/18.19  				|
% 50.76/18.19  				| Instantiating formula (66) with b, all_333_2_717, all_343_1_730 and discharging atoms party_of_protocol(b) = all_343_1_730, party_of_protocol(b) = all_333_2_717, yields:
% 50.76/18.19  				| (934) all_343_1_730 = all_333_2_717
% 50.76/18.19  				|
% 50.76/18.19  				| Instantiating formula (66) with b, all_331_2_713, all_351_1_743 and discharging atoms party_of_protocol(b) = all_351_1_743, party_of_protocol(b) = all_331_2_713, yields:
% 50.76/18.19  				| (935) all_351_1_743 = all_331_2_713
% 50.76/18.19  				|
% 50.76/18.19  				| Instantiating formula (66) with b, all_329_2_709, 0 and discharging atoms party_of_protocol(b) = all_329_2_709, party_of_protocol(b) = 0, yields:
% 50.76/18.19  				| (936) all_329_2_709 = 0
% 50.76/18.19  				|
% 50.76/18.19  				| Instantiating formula (66) with b, all_329_2_709, all_343_1_730 and discharging atoms party_of_protocol(b) = all_343_1_730, party_of_protocol(b) = all_329_2_709, yields:
% 50.76/18.19  				| (937) all_343_1_730 = all_329_2_709
% 50.76/18.19  				|
% 50.76/18.19  				| Instantiating formula (66) with b, all_305_2_663, all_363_1_761 and discharging atoms party_of_protocol(b) = all_363_1_761, party_of_protocol(b) = all_305_2_663, yields:
% 50.76/18.19  				| (938) all_363_1_761 = all_305_2_663
% 50.76/18.19  				|
% 50.76/18.19  				| Instantiating formula (66) with b, all_289_1_637, all_329_2_709 and discharging atoms party_of_protocol(b) = all_329_2_709, party_of_protocol(b) = all_289_1_637, yields:
% 50.76/18.19  				| (939) all_329_2_709 = all_289_1_637
% 50.76/18.19  				|
% 50.76/18.19  				| Instantiating formula (66) with a, all_293_1_643, 0 and discharging atoms party_of_protocol(a) = all_293_1_643, party_of_protocol(a) = 0, yields:
% 50.76/18.19  				| (940) all_293_1_643 = 0
% 50.76/18.19  				|
% 50.76/18.19  				| Instantiating formula (66) with t, all_365_1_765, 0 and discharging atoms party_of_protocol(t) = all_365_1_765, party_of_protocol(t) = 0, yields:
% 50.76/18.19  				| (941) all_365_1_765 = 0
% 50.76/18.19  				|
% 50.76/18.19  				| Instantiating formula (66) with t, all_333_1_716, all_359_1_755 and discharging atoms party_of_protocol(t) = all_359_1_755, party_of_protocol(t) = all_333_1_716, yields:
% 50.76/18.19  				| (942) all_359_1_755 = all_333_1_716
% 50.76/18.19  				|
% 50.76/18.19  				| Instantiating formula (66) with t, all_331_1_712, all_365_1_765 and discharging atoms party_of_protocol(t) = all_365_1_765, party_of_protocol(t) = all_331_1_712, yields:
% 50.76/18.19  				| (943) all_365_1_765 = all_331_1_712
% 50.76/18.19  				|
% 50.76/18.19  				| Instantiating formula (66) with t, all_331_1_712, all_333_1_716 and discharging atoms party_of_protocol(t) = all_333_1_716, party_of_protocol(t) = all_331_1_712, yields:
% 50.76/18.19  				| (944) all_333_1_716 = all_331_1_712
% 50.76/18.19  				|
% 50.76/18.19  				| Instantiating formula (66) with t, all_329_1_708, all_365_1_765 and discharging atoms party_of_protocol(t) = all_365_1_765, party_of_protocol(t) = all_329_1_708, yields:
% 50.76/18.19  				| (945) all_365_1_765 = all_329_1_708
% 50.76/18.19  				|
% 50.76/18.19  				| Instantiating formula (66) with t, all_305_1_662, all_359_1_755 and discharging atoms party_of_protocol(t) = all_359_1_755, party_of_protocol(t) = all_305_1_662, yields:
% 50.76/18.19  				| (946) all_359_1_755 = all_305_1_662
% 50.76/18.19  				|
% 50.76/18.19  				| Instantiating formula (31) with all_63_3_186, all_305_3_664, all_317_0_677 and discharging atoms intruder_message(all_63_3_186) = all_317_0_677, intruder_message(all_63_3_186) = all_305_3_664, yields:
% 50.76/18.19  				| (947) all_317_0_677 = all_305_3_664
% 50.76/18.19  				|
% 50.76/18.19  				| Instantiating formula (31) with all_63_3_186, all_303_0_659, all_305_3_664 and discharging atoms intruder_message(all_63_3_186) = all_305_3_664, intruder_message(all_63_3_186) = all_303_0_659, yields:
% 50.76/18.19  				| (948) all_305_3_664 = all_303_0_659
% 50.76/18.19  				|
% 50.76/18.19  				| Instantiating formula (31) with all_63_3_186, all_295_3_648, all_317_0_677 and discharging atoms intruder_message(all_63_3_186) = all_317_0_677, intruder_message(all_63_3_186) = all_295_3_648, yields:
% 50.76/18.19  				| (949) all_317_0_677 = all_295_3_648
% 50.76/18.19  				|
% 50.76/18.19  				| Instantiating formula (31) with all_63_4_187, all_295_0_645, all_317_1_678 and discharging atoms intruder_message(all_63_4_187) = all_317_1_678, intruder_message(all_63_4_187) = all_295_0_645, yields:
% 50.76/18.19  				| (950) all_317_1_678 = all_295_0_645
% 50.76/18.20  				|
% 50.76/18.20  				| Instantiating formula (31) with all_61_3_175, all_309_0_667, all_365_3_767 and discharging atoms intruder_message(all_61_3_175) = all_365_3_767, intruder_message(all_61_3_175) = all_309_0_667, yields:
% 50.76/18.20  				| (951) all_365_3_767 = all_309_0_667
% 50.76/18.20  				|
% 50.76/18.20  				| Instantiating formula (31) with all_61_3_175, all_259_0_534, all_309_0_667 and discharging atoms intruder_message(all_61_3_175) = all_309_0_667, intruder_message(all_61_3_175) = all_259_0_534, yields:
% 50.76/18.20  				| (952) all_309_0_667 = all_259_0_534
% 50.76/18.20  				|
% 50.76/18.20  				| Instantiating formula (31) with all_61_3_175, all_257_3_533, all_365_3_767 and discharging atoms intruder_message(all_61_3_175) = all_365_3_767, intruder_message(all_61_3_175) = all_257_3_533, yields:
% 50.76/18.20  				| (953) all_365_3_767 = all_257_3_533
% 50.76/18.20  				|
% 50.76/18.20  				| Instantiating formula (31) with all_61_4_176, all_257_0_530, all_259_1_535 and discharging atoms intruder_message(all_61_4_176) = all_259_1_535, intruder_message(all_61_4_176) = all_257_0_530, yields:
% 50.76/18.20  				| (954) all_259_1_535 = all_257_0_530
% 50.76/18.20  				|
% 50.76/18.20  				| Instantiating formula (31) with all_61_7_179, all_295_1_646, all_317_2_679 and discharging atoms intruder_message(all_61_7_179) = all_317_2_679, intruder_message(all_61_7_179) = all_295_1_646, yields:
% 50.76/18.20  				| (955) all_317_2_679 = all_295_1_646
% 50.76/18.20  				|
% 50.76/18.20  				| Instantiating formula (31) with all_61_7_179, all_259_2_536, all_317_2_679 and discharging atoms intruder_message(all_61_7_179) = all_317_2_679, intruder_message(all_61_7_179) = all_259_2_536, yields:
% 50.76/18.20  				| (956) all_317_2_679 = all_259_2_536
% 50.76/18.20  				|
% 50.76/18.20  				| Instantiating formula (31) with all_61_7_179, all_257_1_531, all_295_1_646 and discharging atoms intruder_message(all_61_7_179) = all_295_1_646, intruder_message(all_61_7_179) = all_257_1_531, yields:
% 50.76/18.20  				| (957) all_295_1_646 = all_257_1_531
% 50.76/18.20  				|
% 50.76/18.20  				| Instantiating formula (31) with all_13_7_53, all_275_2_574, all_135_1_334 and discharging atoms intruder_message(all_13_7_53) = all_275_2_574, intruder_message(all_13_7_53) = all_135_1_334, yields:
% 50.76/18.20  				| (958) all_275_2_574 = all_135_1_334
% 50.76/18.20  				|
% 50.76/18.20  				| Instantiating formula (31) with all_13_7_53, all_273_1_569, all_275_2_574 and discharging atoms intruder_message(all_13_7_53) = all_275_2_574, intruder_message(all_13_7_53) = all_273_1_569, yields:
% 50.76/18.20  				| (959) all_275_2_574 = all_273_1_569
% 50.76/18.20  				|
% 50.76/18.20  				| Instantiating formula (31) with all_0_3_3, all_363_3_763, all_67_2_199 and discharging atoms intruder_message(all_0_3_3) = all_363_3_763, intruder_message(all_0_3_3) = all_67_2_199, yields:
% 50.76/18.20  				| (960) all_363_3_763 = all_67_2_199
% 50.76/18.20  				|
% 50.76/18.20  				| Instantiating formula (31) with all_0_3_3, all_361_0_758, all_363_3_763 and discharging atoms intruder_message(all_0_3_3) = all_363_3_763, intruder_message(all_0_3_3) = all_361_0_758, yields:
% 50.76/18.20  				| (961) all_363_3_763 = all_361_0_758
% 50.76/18.20  				|
% 50.76/18.20  				| Instantiating formula (31) with an_a_nonce, all_371_1_783, all_373_2_788 and discharging atoms intruder_message(an_a_nonce) = all_373_2_788, intruder_message(an_a_nonce) = all_371_1_783, yields:
% 50.76/18.20  				| (962) all_373_2_788 = all_371_1_783
% 50.76/18.20  				|
% 50.76/18.20  				| Instantiating formula (31) with an_a_nonce, all_245_2_496, 0 and discharging atoms intruder_message(an_a_nonce) = all_245_2_496, intruder_message(an_a_nonce) = 0, yields:
% 50.76/18.20  				| (963) all_245_2_496 = 0
% 50.76/18.20  				|
% 50.76/18.20  				| Instantiating formula (31) with an_a_nonce, all_245_2_496, all_371_1_783 and discharging atoms intruder_message(an_a_nonce) = all_371_1_783, intruder_message(an_a_nonce) = all_245_2_496, yields:
% 50.76/18.20  				| (964) all_371_1_783 = all_245_2_496
% 50.76/18.20  				|
% 50.76/18.20  				| Instantiating formula (31) with an_a_nonce, all_243_1_491, all_373_2_788 and discharging atoms intruder_message(an_a_nonce) = all_373_2_788, intruder_message(an_a_nonce) = all_243_1_491, yields:
% 50.76/18.20  				| (965) all_373_2_788 = all_243_1_491
% 50.76/18.20  				|
% 50.76/18.20  				| Instantiating formula (31) with b, all_321_2_693, all_325_2_701 and discharging atoms intruder_message(b) = all_325_2_701, intruder_message(b) = all_321_2_693, yields:
% 50.76/18.20  				| (966) all_325_2_701 = all_321_2_693
% 50.76/18.20  				|
% 50.76/18.20  				| Instantiating formula (31) with b, all_321_2_693, all_323_3_698 and discharging atoms intruder_message(b) = all_323_3_698, intruder_message(b) = all_321_2_693, yields:
% 50.76/18.20  				| (967) all_323_3_698 = all_321_2_693
% 50.76/18.20  				|
% 50.76/18.20  				| Instantiating formula (31) with b, all_317_3_680, all_327_3_706 and discharging atoms intruder_message(b) = all_327_3_706, intruder_message(b) = all_317_3_680, yields:
% 50.76/18.20  				| (968) all_327_3_706 = all_317_3_680
% 50.76/18.20  				|
% 50.76/18.20  				| Instantiating formula (31) with b, all_317_3_680, all_325_2_701 and discharging atoms intruder_message(b) = all_325_2_701, intruder_message(b) = all_317_3_680, yields:
% 50.76/18.20  				| (969) all_325_2_701 = all_317_3_680
% 50.76/18.20  				|
% 50.76/18.20  				| Instantiating formula (31) with b, all_315_3_676, all_325_2_701 and discharging atoms intruder_message(b) = all_325_2_701, intruder_message(b) = all_315_3_676, yields:
% 50.76/18.20  				| (970) all_325_2_701 = all_315_3_676
% 50.76/18.20  				|
% 50.76/18.20  				| Instantiating formula (31) with b, all_297_2_651, all_315_3_676 and discharging atoms intruder_message(b) = all_315_3_676, intruder_message(b) = all_297_2_651, yields:
% 50.76/18.20  				| (971) all_315_3_676 = all_297_2_651
% 50.76/18.20  				|
% 50.76/18.20  				| Instantiating formula (31) with b, all_295_2_647, all_325_2_701 and discharging atoms intruder_message(b) = all_325_2_701, intruder_message(b) = all_295_2_647, yields:
% 50.76/18.20  				| (972) all_325_2_701 = all_295_2_647
% 50.76/18.20  				|
% 50.76/18.20  				| Instantiating formula (31) with b, all_259_3_537, all_67_1_198 and discharging atoms intruder_message(b) = all_259_3_537, intruder_message(b) = all_67_1_198, yields:
% 50.76/18.20  				| (973) all_259_3_537 = all_67_1_198
% 50.76/18.20  				|
% 50.76/18.20  				| Instantiating formula (31) with b, all_259_3_537, all_317_3_680 and discharging atoms intruder_message(b) = all_317_3_680, intruder_message(b) = all_259_3_537, yields:
% 50.76/18.20  				| (974) all_317_3_680 = all_259_3_537
% 50.76/18.20  				|
% 50.76/18.20  				| Instantiating formula (31) with b, all_257_2_532, all_323_3_698 and discharging atoms intruder_message(b) = all_323_3_698, intruder_message(b) = all_257_2_532, yields:
% 50.76/18.20  				| (975) all_323_3_698 = all_257_2_532
% 50.76/18.20  				|
% 50.76/18.20  				| Instantiating formula (31) with b, all_255_3_529, all_317_3_680 and discharging atoms intruder_message(b) = all_317_3_680, intruder_message(b) = all_255_3_529, yields:
% 50.76/18.20  				| (976) all_317_3_680 = all_255_3_529
% 50.76/18.20  				|
% 50.76/18.20  				| Instantiating formula (31) with b, all_253_2_524, all_325_2_701 and discharging atoms intruder_message(b) = all_325_2_701, intruder_message(b) = all_253_2_524, yields:
% 50.76/18.20  				| (977) all_325_2_701 = all_253_2_524
% 50.76/18.20  				|
% 50.76/18.20  				| Instantiating formula (31) with b, all_245_3_497, all_327_3_706 and discharging atoms intruder_message(b) = all_327_3_706, intruder_message(b) = all_245_3_497, yields:
% 50.76/18.20  				| (978) all_327_3_706 = all_245_3_497
% 50.76/18.20  				|
% 50.76/18.20  				| Instantiating formula (31) with b, all_243_2_492, all_315_3_676 and discharging atoms intruder_message(b) = all_315_3_676, intruder_message(b) = all_243_2_492, yields:
% 50.76/18.20  				| (979) all_315_3_676 = all_243_2_492
% 50.76/18.20  				|
% 50.76/18.20  				| Instantiating formula (31) with a, all_373_3_789, 0 and discharging atoms intruder_message(a) = all_373_3_789, intruder_message(a) = 0, yields:
% 50.76/18.20  				| (980) all_373_3_789 = 0
% 50.76/18.20  				|
% 50.76/18.20  				| Instantiating formula (31) with a, all_371_2_784, all_373_3_789 and discharging atoms intruder_message(a) = all_373_3_789, intruder_message(a) = all_371_2_784, yields:
% 50.76/18.20  				| (981) all_373_3_789 = all_371_2_784
% 50.76/18.20  				|
% 50.76/18.20  				| Instantiating formula (29) with an_a_nonce, all_375_8_798, all_61_7_179 and discharging atoms generate_b_nonce(an_a_nonce) = all_375_8_798, generate_b_nonce(an_a_nonce) = all_61_7_179, yields:
% 50.76/18.20  				| (982) all_375_8_798 = all_61_7_179
% 50.76/18.20  				|
% 50.76/18.20  				| Instantiating formula (29) with an_a_nonce, all_287_5_631, all_375_8_798 and discharging atoms generate_b_nonce(an_a_nonce) = all_375_8_798, generate_b_nonce(an_a_nonce) = all_287_5_631, yields:
% 50.76/18.20  				| (983) all_375_8_798 = all_287_5_631
% 50.76/18.20  				|
% 50.76/18.20  				| Instantiating formula (29) with an_a_nonce, all_285_8_624, all_375_8_798 and discharging atoms generate_b_nonce(an_a_nonce) = all_375_8_798, generate_b_nonce(an_a_nonce) = all_285_8_624, yields:
% 50.76/18.20  				| (984) all_375_8_798 = all_285_8_624
% 50.76/18.20  				|
% 50.76/18.20  				| Instantiating formula (8) with all_149_5_383, bt, all_319_4_685, all_149_4_382 and discharging atoms encrypt(all_149_5_383, bt) = all_319_4_685, encrypt(all_149_5_383, bt) = all_149_4_382, yields:
% 50.76/18.20  				| (985) all_319_4_685 = all_149_4_382
% 50.76/18.20  				|
% 50.76/18.20  				| Instantiating formula (8) with all_149_5_383, bt, all_281_9_605, all_319_4_685 and discharging atoms encrypt(all_149_5_383, bt) = all_319_4_685, encrypt(all_149_5_383, bt) = all_281_9_605, yields:
% 50.76/18.20  				| (986) all_319_4_685 = all_281_9_605
% 50.76/18.20  				|
% 50.76/18.20  				| Instantiating formula (8) with all_63_5_188, bt, all_287_4_630, all_63_4_187 and discharging atoms encrypt(all_63_5_188, bt) = all_287_4_630, encrypt(all_63_5_188, bt) = all_63_4_187, yields:
% 50.76/18.20  				| (987) all_287_4_630 = all_63_4_187
% 50.76/18.20  				|
% 50.76/18.20  				| Instantiating formula (8) with all_63_5_188, bt, all_285_9_625, all_287_4_630 and discharging atoms encrypt(all_63_5_188, bt) = all_287_4_630, encrypt(all_63_5_188, bt) = all_285_9_625, yields:
% 50.76/18.20  				| (988) all_287_4_630 = all_285_9_625
% 50.76/18.20  				|
% 50.76/18.20  				| Instantiating formula (8) with all_61_5_177, bt, all_375_9_799, all_61_4_176 and discharging atoms encrypt(all_61_5_177, bt) = all_375_9_799, encrypt(all_61_5_177, bt) = all_61_4_176, yields:
% 50.76/18.20  				| (989) all_375_9_799 = all_61_4_176
% 50.76/18.20  				|
% 50.76/18.20  				| Instantiating formula (72) with a, an_a_nonce, all_375_3_793, all_0_2_2 and discharging atoms pair(a, an_a_nonce) = all_375_3_793, pair(a, an_a_nonce) = all_0_2_2, yields:
% 50.76/18.20  				| (990) all_375_3_793 = all_0_2_2
% 50.76/18.20  				|
% 50.76/18.20  				| Instantiating formula (15) with all_63_2_185, all_305_0_661, all_63_1_184 and discharging atoms message(all_63_2_185) = all_305_0_661, message(all_63_2_185) = all_63_1_184, yields:
% 50.76/18.20  				| (991) all_305_0_661 = all_63_1_184
% 50.76/18.20  				|
% 50.76/18.20  				| Instantiating formula (15) with all_63_2_185, all_303_1_660, all_305_0_661 and discharging atoms message(all_63_2_185) = all_305_0_661, message(all_63_2_185) = all_303_1_660, yields:
% 50.76/18.20  				| (992) all_305_0_661 = all_303_1_660
% 50.76/18.20  				|
% 50.76/18.20  				| Instantiating formula (15) with all_63_10_193, all_363_0_760, all_63_9_192 and discharging atoms message(all_63_10_193) = all_363_0_760, message(all_63_10_193) = all_63_9_192, yields:
% 50.76/18.20  				| (993) all_363_0_760 = all_63_9_192
% 50.76/18.20  				|
% 50.76/18.20  				| Instantiating formula (15) with all_63_10_193, all_361_1_759, all_363_0_760 and discharging atoms message(all_63_10_193) = all_363_0_760, message(all_63_10_193) = all_361_1_759, yields:
% 50.76/18.20  				| (994) all_363_0_760 = all_361_1_759
% 50.76/18.20  				|
% 50.76/18.20  				| Instantiating formula (15) with all_61_2_174, all_365_0_764, 0 and discharging atoms message(all_61_2_174) = all_365_0_764, message(all_61_2_174) = 0, yields:
% 50.76/18.20  				| (995) all_365_0_764 = 0
% 50.76/18.20  				|
% 50.76/18.20  				| Instantiating formula (15) with all_61_2_174, all_309_1_668, all_365_0_764 and discharging atoms message(all_61_2_174) = all_365_0_764, message(all_61_2_174) = all_309_1_668, yields:
% 50.76/18.20  				| (996) all_365_0_764 = all_309_1_668
% 50.76/18.20  				|
% 50.76/18.20  				| Combining equations (982,983) yields a new equation:
% 50.76/18.20  				| (997) all_287_5_631 = all_61_7_179
% 50.76/18.20  				|
% 50.76/18.20  				| Combining equations (984,983) yields a new equation:
% 50.76/18.20  				| (998) all_287_5_631 = all_285_8_624
% 50.76/18.20  				|
% 50.76/18.20  				| Combining equations (962,965) yields a new equation:
% 50.76/18.20  				| (999) all_371_1_783 = all_243_1_491
% 50.76/18.20  				|
% 50.76/18.20  				| Simplifying 999 yields:
% 50.76/18.20  				| (1000) all_371_1_783 = all_243_1_491
% 50.76/18.20  				|
% 50.76/18.20  				| Combining equations (981,980) yields a new equation:
% 50.76/18.20  				| (1001) all_371_2_784 = 0
% 50.76/18.20  				|
% 50.76/18.20  				| Simplifying 1001 yields:
% 50.76/18.20  				| (1002) all_371_2_784 = 0
% 50.76/18.20  				|
% 50.76/18.20  				| Combining equations (964,1000) yields a new equation:
% 50.76/18.20  				| (1003) all_245_2_496 = all_243_1_491
% 50.76/18.20  				|
% 50.76/18.20  				| Simplifying 1003 yields:
% 50.76/18.20  				| (1004) all_245_2_496 = all_243_1_491
% 50.76/18.20  				|
% 50.76/18.20  				| Combining equations (995,996) yields a new equation:
% 50.76/18.20  				| (1005) all_309_1_668 = 0
% 50.76/18.20  				|
% 50.76/18.20  				| Combining equations (941,945) yields a new equation:
% 50.76/18.20  				| (1006) all_329_1_708 = 0
% 50.76/18.20  				|
% 50.76/18.20  				| Combining equations (943,945) yields a new equation:
% 50.76/18.20  				| (1007) all_331_1_712 = all_329_1_708
% 50.76/18.20  				|
% 50.76/18.20  				| Simplifying 1007 yields:
% 50.76/18.20  				| (1008) all_331_1_712 = all_329_1_708
% 50.76/18.20  				|
% 50.76/18.20  				| Combining equations (928,930) yields a new equation:
% 50.76/18.20  				| (1009) all_355_1_749 = all_347_1_737
% 50.76/18.20  				|
% 50.76/18.20  				| Simplifying 1009 yields:
% 50.76/18.20  				| (1010) all_355_1_749 = all_347_1_737
% 50.76/18.20  				|
% 50.76/18.20  				| Combining equations (933,930) yields a new equation:
% 50.76/18.20  				| (1011) all_347_1_737 = all_333_2_717
% 50.76/18.20  				|
% 50.76/18.20  				| Combining equations (932,930) yields a new equation:
% 50.76/18.20  				| (1012) all_347_1_737 = all_339_1_724
% 50.76/18.20  				|
% 50.76/18.20  				| Combining equations (951,953) yields a new equation:
% 50.76/18.20  				| (1013) all_309_0_667 = all_257_3_533
% 50.76/18.20  				|
% 50.76/18.20  				| Simplifying 1013 yields:
% 50.76/18.20  				| (1014) all_309_0_667 = all_257_3_533
% 50.76/18.20  				|
% 50.76/18.20  				| Combining equations (993,994) yields a new equation:
% 50.76/18.20  				| (1015) all_361_1_759 = all_63_9_192
% 50.76/18.20  				|
% 50.76/18.20  				| Combining equations (926,938) yields a new equation:
% 50.76/18.20  				| (1016) all_363_2_762 = all_305_2_663
% 50.76/18.20  				|
% 50.76/18.20  				| Simplifying 1016 yields:
% 50.76/18.20  				| (1017) all_363_2_762 = all_305_2_663
% 50.76/18.20  				|
% 50.76/18.20  				| Combining equations (927,1017) yields a new equation:
% 50.76/18.20  				| (1018) all_359_2_756 = all_305_2_663
% 50.76/18.20  				|
% 50.76/18.20  				| Simplifying 1018 yields:
% 50.76/18.20  				| (1019) all_359_2_756 = all_305_2_663
% 50.76/18.20  				|
% 50.76/18.20  				| Combining equations (961,960) yields a new equation:
% 50.76/18.20  				| (1020) all_361_0_758 = all_67_2_199
% 50.76/18.20  				|
% 50.76/18.20  				| Simplifying 1020 yields:
% 50.76/18.20  				| (1021) all_361_0_758 = all_67_2_199
% 50.76/18.20  				|
% 50.76/18.20  				| Combining equations (942,946) yields a new equation:
% 50.76/18.20  				| (1022) all_333_1_716 = all_305_1_662
% 50.76/18.20  				|
% 50.76/18.20  				| Simplifying 1022 yields:
% 50.76/18.20  				| (1023) all_333_1_716 = all_305_1_662
% 50.76/18.20  				|
% 50.76/18.20  				| Combining equations (929,1019) yields a new equation:
% 50.76/18.20  				| (1024) all_355_1_749 = all_305_2_663
% 50.76/18.20  				|
% 50.76/18.20  				| Simplifying 1024 yields:
% 50.76/18.20  				| (1025) all_355_1_749 = all_305_2_663
% 50.76/18.20  				|
% 50.76/18.20  				| Combining equations (1010,1025) yields a new equation:
% 50.76/18.20  				| (1026) all_347_1_737 = all_305_2_663
% 50.76/18.20  				|
% 50.76/18.20  				| Simplifying 1026 yields:
% 50.76/18.20  				| (1027) all_347_1_737 = all_305_2_663
% 50.76/18.20  				|
% 50.76/18.20  				| Combining equations (931,935) yields a new equation:
% 50.76/18.20  				| (1028) all_343_1_730 = all_331_2_713
% 50.76/18.20  				|
% 50.76/18.20  				| Simplifying 1028 yields:
% 50.76/18.20  				| (1029) all_343_1_730 = all_331_2_713
% 50.76/18.20  				|
% 50.76/18.20  				| Combining equations (1011,1012) yields a new equation:
% 50.76/18.20  				| (1030) all_339_1_724 = all_333_2_717
% 50.76/18.20  				|
% 50.76/18.20  				| Combining equations (1027,1012) yields a new equation:
% 50.76/18.20  				| (1031) all_339_1_724 = all_305_2_663
% 50.76/18.21  				|
% 50.76/18.21  				| Combining equations (934,1029) yields a new equation:
% 50.76/18.21  				| (1032) all_333_2_717 = all_331_2_713
% 50.76/18.21  				|
% 50.76/18.21  				| Simplifying 1032 yields:
% 50.76/18.21  				| (1033) all_333_2_717 = all_331_2_713
% 50.76/18.21  				|
% 50.76/18.21  				| Combining equations (937,1029) yields a new equation:
% 50.76/18.21  				| (1034) all_331_2_713 = all_329_2_709
% 50.76/18.21  				|
% 50.76/18.21  				| Combining equations (1030,1031) yields a new equation:
% 50.76/18.21  				| (1035) all_333_2_717 = all_305_2_663
% 50.76/18.21  				|
% 50.76/18.21  				| Simplifying 1035 yields:
% 50.76/18.21  				| (1036) all_333_2_717 = all_305_2_663
% 50.76/18.21  				|
% 50.76/18.21  				| Combining equations (944,1023) yields a new equation:
% 50.76/18.21  				| (1037) all_331_1_712 = all_305_1_662
% 50.76/18.21  				|
% 50.76/18.21  				| Simplifying 1037 yields:
% 50.76/18.21  				| (1038) all_331_1_712 = all_305_1_662
% 50.76/18.21  				|
% 50.76/18.21  				| Combining equations (1033,1036) yields a new equation:
% 50.76/18.21  				| (1039) all_331_2_713 = all_305_2_663
% 50.76/18.21  				|
% 50.76/18.21  				| Simplifying 1039 yields:
% 50.76/18.21  				| (1040) all_331_2_713 = all_305_2_663
% 50.76/18.21  				|
% 50.76/18.21  				| Combining equations (1008,1038) yields a new equation:
% 50.76/18.21  				| (1041) all_329_1_708 = all_305_1_662
% 50.76/18.21  				|
% 50.76/18.21  				| Simplifying 1041 yields:
% 50.76/18.21  				| (1042) all_329_1_708 = all_305_1_662
% 50.76/18.21  				|
% 50.76/18.21  				| Combining equations (1034,1040) yields a new equation:
% 50.76/18.21  				| (1043) all_329_2_709 = all_305_2_663
% 50.76/18.21  				|
% 50.76/18.21  				| Simplifying 1043 yields:
% 50.76/18.21  				| (1044) all_329_2_709 = all_305_2_663
% 50.76/18.21  				|
% 50.76/18.21  				| Combining equations (1006,1042) yields a new equation:
% 50.76/18.21  				| (1045) all_305_1_662 = 0
% 50.76/18.21  				|
% 50.76/18.21  				| Combining equations (939,1044) yields a new equation:
% 50.76/18.21  				| (1046) all_305_2_663 = all_289_1_637
% 50.76/18.21  				|
% 50.76/18.21  				| Combining equations (936,1044) yields a new equation:
% 50.76/18.21  				| (1047) all_305_2_663 = 0
% 50.76/18.21  				|
% 50.76/18.21  				| Combining equations (968,978) yields a new equation:
% 50.76/18.21  				| (1048) all_317_3_680 = all_245_3_497
% 50.76/18.21  				|
% 50.76/18.21  				| Simplifying 1048 yields:
% 50.76/18.21  				| (1049) all_317_3_680 = all_245_3_497
% 50.76/18.21  				|
% 50.76/18.21  				| Combining equations (969,972) yields a new equation:
% 50.76/18.21  				| (1050) all_317_3_680 = all_295_2_647
% 50.76/18.21  				|
% 50.76/18.21  				| Simplifying 1050 yields:
% 50.76/18.21  				| (1051) all_317_3_680 = all_295_2_647
% 50.76/18.21  				|
% 50.76/18.21  				| Combining equations (970,972) yields a new equation:
% 50.76/18.21  				| (1052) all_315_3_676 = all_295_2_647
% 50.76/18.21  				|
% 50.76/18.21  				| Simplifying 1052 yields:
% 50.76/18.21  				| (1053) all_315_3_676 = all_295_2_647
% 50.76/18.21  				|
% 50.76/18.21  				| Combining equations (977,972) yields a new equation:
% 50.76/18.21  				| (1054) all_295_2_647 = all_253_2_524
% 50.76/18.21  				|
% 50.76/18.21  				| Combining equations (966,972) yields a new equation:
% 50.76/18.21  				| (1055) all_321_2_693 = all_295_2_647
% 50.76/18.21  				|
% 50.76/18.21  				| Simplifying 1055 yields:
% 50.76/18.21  				| (1056) all_321_2_693 = all_295_2_647
% 50.76/18.21  				|
% 50.76/18.21  				| Combining equations (967,975) yields a new equation:
% 50.76/18.21  				| (1057) all_321_2_693 = all_257_2_532
% 50.76/18.21  				|
% 50.76/18.21  				| Simplifying 1057 yields:
% 50.76/18.21  				| (1058) all_321_2_693 = all_257_2_532
% 50.76/18.21  				|
% 50.76/18.21  				| Combining equations (1056,1058) yields a new equation:
% 50.76/18.21  				| (1059) all_295_2_647 = all_257_2_532
% 50.76/18.21  				|
% 50.76/18.21  				| Simplifying 1059 yields:
% 50.76/18.21  				| (1060) all_295_2_647 = all_257_2_532
% 50.76/18.21  				|
% 50.76/18.21  				| Combining equations (985,986) yields a new equation:
% 50.76/18.21  				| (1061) all_281_9_605 = all_149_4_382
% 50.76/18.21  				|
% 50.76/18.21  				| Combining equations (947,949) yields a new equation:
% 50.76/18.21  				| (1062) all_305_3_664 = all_295_3_648
% 50.76/18.21  				|
% 50.76/18.21  				| Simplifying 1062 yields:
% 50.76/18.21  				| (1063) all_305_3_664 = all_295_3_648
% 50.76/18.21  				|
% 50.76/18.21  				| Combining equations (955,956) yields a new equation:
% 50.76/18.21  				| (1064) all_295_1_646 = all_259_2_536
% 50.76/18.21  				|
% 50.76/18.21  				| Simplifying 1064 yields:
% 50.76/18.21  				| (1065) all_295_1_646 = all_259_2_536
% 50.76/18.21  				|
% 50.76/18.21  				| Combining equations (1049,976) yields a new equation:
% 50.76/18.21  				| (1066) all_255_3_529 = all_245_3_497
% 50.76/18.21  				|
% 50.76/18.21  				| Combining equations (1051,976) yields a new equation:
% 50.76/18.21  				| (1067) all_295_2_647 = all_255_3_529
% 50.76/18.21  				|
% 50.76/18.21  				| Simplifying 1067 yields:
% 50.76/18.21  				| (1068) all_295_2_647 = all_255_3_529
% 50.76/18.21  				|
% 50.76/18.21  				| Combining equations (974,976) yields a new equation:
% 50.76/18.21  				| (1069) all_259_3_537 = all_255_3_529
% 50.76/18.21  				|
% 50.76/18.21  				| Simplifying 1069 yields:
% 50.76/18.21  				| (1070) all_259_3_537 = all_255_3_529
% 50.76/18.21  				|
% 50.76/18.21  				| Combining equations (979,971) yields a new equation:
% 50.76/18.21  				| (1071) all_297_2_651 = all_243_2_492
% 50.76/18.21  				|
% 50.76/18.21  				| Combining equations (1053,971) yields a new equation:
% 50.76/18.21  				| (1072) all_297_2_651 = all_295_2_647
% 50.76/18.21  				|
% 50.76/18.21  				| Combining equations (952,1014) yields a new equation:
% 50.76/18.21  				| (1073) all_259_0_534 = all_257_3_533
% 50.76/18.21  				|
% 50.76/18.21  				| Simplifying 1073 yields:
% 50.76/18.21  				| (1074) all_259_0_534 = all_257_3_533
% 50.76/18.21  				|
% 50.76/18.21  				| Combining equations (992,991) yields a new equation:
% 50.76/18.21  				| (1075) all_303_1_660 = all_63_1_184
% 50.76/18.21  				|
% 50.76/18.21  				| Simplifying 1075 yields:
% 50.76/18.21  				| (1076) all_303_1_660 = all_63_1_184
% 50.76/18.21  				|
% 50.76/18.21  				| Combining equations (1047,1046) yields a new equation:
% 50.76/18.21  				| (1077) all_289_1_637 = 0
% 50.76/18.21  				|
% 50.76/18.21  				| Combining equations (1063,948) yields a new equation:
% 50.76/18.21  				| (1078) all_303_0_659 = all_295_3_648
% 50.76/18.21  				|
% 50.76/18.21  				| Combining equations (1072,1071) yields a new equation:
% 50.76/18.21  				| (1079) all_295_2_647 = all_243_2_492
% 50.76/18.21  				|
% 50.76/18.21  				| Simplifying 1079 yields:
% 50.76/18.21  				| (1080) all_295_2_647 = all_243_2_492
% 50.76/18.21  				|
% 50.76/18.21  				| Combining equations (957,1065) yields a new equation:
% 50.76/18.21  				| (1081) all_259_2_536 = all_257_1_531
% 50.76/18.21  				|
% 50.76/18.21  				| Combining equations (1054,1060) yields a new equation:
% 50.76/18.21  				| (1082) all_257_2_532 = all_253_2_524
% 50.76/18.21  				|
% 50.76/18.21  				| Combining equations (1080,1060) yields a new equation:
% 50.76/18.21  				| (1083) all_257_2_532 = all_243_2_492
% 50.76/18.21  				|
% 50.76/18.21  				| Combining equations (1068,1060) yields a new equation:
% 50.76/18.21  				| (1084) all_257_2_532 = all_255_3_529
% 50.76/18.21  				|
% 50.76/18.21  				| Combining equations (988,987) yields a new equation:
% 50.76/18.21  				| (1085) all_285_9_625 = all_63_4_187
% 50.76/18.21  				|
% 50.76/18.21  				| Simplifying 1085 yields:
% 50.76/18.21  				| (1086) all_285_9_625 = all_63_4_187
% 50.76/18.21  				|
% 50.76/18.21  				| Combining equations (997,998) yields a new equation:
% 50.76/18.21  				| (1087) all_285_8_624 = all_61_7_179
% 50.76/18.21  				|
% 50.76/18.21  				| Combining equations (958,959) yields a new equation:
% 50.76/18.21  				| (1088) all_273_1_569 = all_135_1_334
% 50.76/18.21  				|
% 50.76/18.21  				| Combining equations (1070,973) yields a new equation:
% 50.76/18.21  				| (1089) all_255_3_529 = all_67_1_198
% 50.76/18.21  				|
% 50.76/18.21  				| Simplifying 1089 yields:
% 50.76/18.21  				| (1090) all_255_3_529 = all_67_1_198
% 50.76/18.21  				|
% 50.76/18.21  				| Combining equations (1084,1082) yields a new equation:
% 50.76/18.21  				| (1091) all_255_3_529 = all_253_2_524
% 50.76/18.21  				|
% 50.76/18.21  				| Simplifying 1091 yields:
% 50.76/18.21  				| (1092) all_255_3_529 = all_253_2_524
% 50.76/18.21  				|
% 50.76/18.21  				| Combining equations (1083,1082) yields a new equation:
% 50.76/18.21  				| (1093) all_253_2_524 = all_243_2_492
% 50.76/18.21  				|
% 50.76/18.21  				| Combining equations (1092,1066) yields a new equation:
% 50.76/18.21  				| (1094) all_253_2_524 = all_245_3_497
% 50.76/18.21  				|
% 50.76/18.21  				| Simplifying 1094 yields:
% 50.76/18.21  				| (1095) all_253_2_524 = all_245_3_497
% 50.76/18.21  				|
% 50.76/18.21  				| Combining equations (1090,1066) yields a new equation:
% 50.76/18.21  				| (1096) all_245_3_497 = all_67_1_198
% 50.76/18.21  				|
% 50.76/18.21  				| Combining equations (1095,1093) yields a new equation:
% 50.76/18.21  				| (1097) all_245_3_497 = all_243_2_492
% 50.76/18.21  				|
% 50.76/18.21  				| Simplifying 1097 yields:
% 50.76/18.21  				| (1098) all_245_3_497 = all_243_2_492
% 50.76/18.21  				|
% 50.76/18.21  				| Combining equations (963,1004) yields a new equation:
% 50.76/18.21  				| (1099) all_243_1_491 = 0
% 50.76/18.21  				|
% 50.76/18.21  				| Combining equations (1096,1098) yields a new equation:
% 50.76/18.21  				| (1100) all_243_2_492 = all_67_1_198
% 50.76/18.21  				|
% 50.76/18.21  				| Combining equations (1100,1093) yields a new equation:
% 50.76/18.21  				| (1101) all_253_2_524 = all_67_1_198
% 50.76/18.21  				|
% 50.76/18.21  				| Combining equations (1101,1082) yields a new equation:
% 50.76/18.21  				| (1102) all_257_2_532 = all_67_1_198
% 50.76/18.21  				|
% 50.76/18.21  				| Combining equations (1087,998) yields a new equation:
% 50.76/18.21  				| (997) all_287_5_631 = all_61_7_179
% 50.76/18.21  				|
% 50.76/18.21  				| Combining equations (1077,1046) yields a new equation:
% 50.76/18.21  				| (1047) all_305_2_663 = 0
% 50.76/18.21  				|
% 50.76/18.21  				| Combining equations (1047,1017) yields a new equation:
% 50.76/18.21  				| (1105) all_363_2_762 = 0
% 50.76/18.21  				|
% 50.76/18.21  				| Combining equations (1047,938) yields a new equation:
% 50.76/18.21  				| (1106) all_363_1_761 = 0
% 50.76/18.21  				|
% 50.76/18.21  				| Combining equations (1015,994) yields a new equation:
% 50.76/18.21  				| (993) all_363_0_760 = all_63_9_192
% 50.76/18.21  				|
% 50.76/18.21  				| Combining equations (997,983) yields a new equation:
% 50.76/18.21  				| (982) all_375_8_798 = all_61_7_179
% 50.76/18.21  				|
% 50.76/18.21  				| From (1077) and (737) follows:
% 50.76/18.21  				| (10) party_of_protocol(b) = 0
% 50.76/18.21  				|
% 50.76/18.21  				| From (940) and (742) follows:
% 50.76/18.21  				| (43) party_of_protocol(a) = 0
% 50.76/18.21  				|
% 50.76/18.21  				| From (1045) and (763) follows:
% 50.76/18.21  				| (34) party_of_protocol(t) = 0
% 50.76/18.21  				|
% 50.76/18.21  				| From (1078) and (758) follows:
% 50.76/18.21  				| (749) intruder_message(all_63_3_186) = all_295_3_648
% 50.76/18.21  				|
% 50.76/18.21  				| From (950) and (781) follows:
% 50.76/18.21  				| (750) intruder_message(all_63_4_187) = all_295_0_645
% 50.76/18.21  				|
% 50.76/18.21  				| From (1074) and (662) follows:
% 50.76/18.21  				| (653) intruder_message(all_61_3_175) = all_257_3_533
% 50.76/18.21  				|
% 50.76/18.21  				| From (954) and (660) follows:
% 50.76/18.21  				| (652) intruder_message(all_61_4_176) = all_257_0_530
% 50.76/18.21  				|
% 50.76/18.21  				| From (1081) and (659) follows:
% 50.76/18.21  				| (656) intruder_message(all_61_7_179) = all_257_1_531
% 50.76/18.22  				|
% 50.76/18.22  				| From (1088) and (676) follows:
% 50.76/18.22  				| (375) intruder_message(all_13_7_53) = all_135_1_334
% 50.76/18.22  				|
% 50.76/18.22  				| From (1021) and (874) follows:
% 50.76/18.22  				| (273) intruder_message(all_0_3_3) = all_67_2_199
% 50.76/18.22  				|
% 50.76/18.22  				| From (1099) and (629) follows:
% 50.76/18.22  				| (566) intruder_message(an_a_nonce) = 0
% 50.76/18.22  				|
% 50.76/18.22  				| From (1100) and (628) follows:
% 50.76/18.22  				| (275) intruder_message(b) = all_67_1_198
% 50.76/18.22  				|
% 50.76/18.22  				| From (1002) and (907) follows:
% 50.76/18.22  				| (567) intruder_message(a) = 0
% 50.76/18.22  				|
% 50.76/18.22  				| From (990) and (922) follows:
% 50.76/18.22  				| (1122) b_stored(all_0_2_2) = all_375_2_792
% 50.76/18.22  				|
% 50.76/18.22  				| From (982) and (921) follows:
% 50.76/18.22  				| (1123) encrypt(all_61_7_179, an_a_nonce) = all_375_7_797
% 50.76/18.22  				|
% 50.76/18.22  				| From (1087) and (712) follows:
% 50.76/18.22  				| (1124) encrypt(all_61_7_179, an_a_nonce) = all_285_7_623
% 50.76/18.22  				|
% 50.76/18.22  				| From (989) and (915) follows:
% 50.76/18.22  				| (1125) pair(all_61_4_176, all_375_7_797) = all_375_6_796
% 50.76/18.22  				|
% 50.76/18.22  				| From (1086) and (717) follows:
% 50.76/18.22  				| (1126) pair(all_63_4_187, all_285_7_623) = all_285_6_622
% 50.76/18.22  				|
% 50.76/18.22  				| From (1061) and (702) follows:
% 50.76/18.22  				| (1127) pair(all_149_4_382, all_281_7_603) = all_281_6_602
% 50.76/18.22  				|
% 50.76/18.22  				+-Applying beta-rule and splitting (770), into two cases.
% 50.76/18.22  				|-Branch one:
% 50.76/18.22  				| (1128)  ~ (all_309_1_668 = 0)
% 50.76/18.22  				|
% 50.76/18.22  					| Equations (1005) can reduce 1128 to:
% 50.76/18.22  					| (551) $false
% 50.76/18.22  					|
% 50.76/18.22  					|-The branch is then unsatisfiable
% 50.76/18.22  				|-Branch two:
% 50.76/18.22  				| (1005) all_309_1_668 = 0
% 50.76/18.22  				| (1131) all_309_0_667 = 0
% 50.76/18.22  				|
% 50.76/18.22  					| Combining equations (1014,1131) yields a new equation:
% 50.76/18.22  					| (1132) all_257_3_533 = 0
% 50.76/18.22  					|
% 50.76/18.22  					| Simplifying 1132 yields:
% 50.76/18.22  					| (1133) all_257_3_533 = 0
% 50.76/18.22  					|
% 50.76/18.22  					| From (1133) and (653) follows:
% 50.76/18.22  					| (1134) intruder_message(all_61_3_175) = 0
% 50.76/18.22  					|
% 50.76/18.22  					+-Applying beta-rule and splitting (655), into two cases.
% 50.76/18.22  					|-Branch one:
% 50.76/18.22  					| (1135)  ~ (all_257_3_533 = 0)
% 50.76/18.22  					|
% 50.76/18.22  						| Equations (1133) can reduce 1135 to:
% 50.76/18.22  						| (551) $false
% 50.76/18.22  						|
% 50.76/18.22  						|-The branch is then unsatisfiable
% 50.76/18.22  					|-Branch two:
% 50.76/18.22  					| (1133) all_257_3_533 = 0
% 50.76/18.22  					| (1138) all_257_0_530 = 0 & all_257_1_531 = 0 & all_257_2_532 = 0
% 50.76/18.22  					|
% 50.76/18.22  						| Applying alpha-rule on (1138) yields:
% 50.76/18.22  						| (1139) all_257_0_530 = 0
% 50.76/18.22  						| (1140) all_257_1_531 = 0
% 50.76/18.22  						| (1141) all_257_2_532 = 0
% 50.76/18.22  						|
% 50.76/18.22  						| Combining equations (1102,1141) yields a new equation:
% 50.76/18.22  						| (1142) all_67_1_198 = 0
% 50.76/18.22  						|
% 50.76/18.22  						| Simplifying 1142 yields:
% 50.76/18.22  						| (1143) all_67_1_198 = 0
% 50.76/18.22  						|
% 50.76/18.22  						| Combining equations (1143,492) yields a new equation:
% 50.76/18.22  						| (1144) all_77_2_214 = 0
% 50.76/18.22  						|
% 50.76/18.22  						| From (1139) and (652) follows:
% 50.76/18.22  						| (1145) intruder_message(all_61_4_176) = 0
% 50.76/18.22  						|
% 50.76/18.22  						| From (1140) and (656) follows:
% 50.76/18.22  						| (1146) intruder_message(all_61_7_179) = 0
% 50.76/18.22  						|
% 50.76/18.22  						| From (1143) and (275) follows:
% 50.76/18.22  						| (1147) intruder_message(b) = 0
% 50.76/18.22  						|
% 50.76/18.22  						+-Applying beta-rule and splitting (293), into two cases.
% 50.76/18.22  						|-Branch one:
% 50.76/18.22  						| (1148)  ~ (all_77_1_213 = 0)
% 50.76/18.22  						|
% 50.76/18.22  							| Equations (565) can reduce 1148 to:
% 50.76/18.22  							| (551) $false
% 50.76/18.22  							|
% 50.76/18.22  							|-The branch is then unsatisfiable
% 50.76/18.22  						|-Branch two:
% 50.76/18.22  						| (565) all_77_1_213 = 0
% 50.76/18.22  						| (1151)  ~ (all_77_2_214 = 0) | all_77_0_212 = 0
% 50.76/18.22  						|
% 50.76/18.22  							+-Applying beta-rule and splitting (1151), into two cases.
% 50.76/18.22  							|-Branch one:
% 50.76/18.22  							| (1152)  ~ (all_77_2_214 = 0)
% 50.76/18.22  							|
% 50.76/18.22  								| Equations (1144) can reduce 1152 to:
% 50.76/18.22  								| (551) $false
% 50.76/18.22  								|
% 50.76/18.22  								|-The branch is then unsatisfiable
% 50.76/18.22  							|-Branch two:
% 50.76/18.22  							| (1144) all_77_2_214 = 0
% 50.76/18.22  							| (1155) all_77_0_212 = 0
% 50.76/18.22  							|
% 50.76/18.22  								| Combining equations (1155,468) yields a new equation:
% 50.76/18.22  								| (1156) all_67_2_199 = 0
% 50.76/18.22  								|
% 50.76/18.22  								| Combining equations (1156,960) yields a new equation:
% 50.76/18.22  								| (1157) all_363_3_763 = 0
% 50.76/18.22  								|
% 50.76/18.22  								| From (1156) and (273) follows:
% 50.76/18.22  								| (1158) intruder_message(all_0_3_3) = 0
% 50.76/18.22  								|
% 50.76/18.22  								+-Applying beta-rule and splitting (882), into two cases.
% 50.76/18.22  								|-Branch one:
% 50.76/18.22  								| (1159)  ~ (all_363_1_761 = 0)
% 50.76/18.22  								|
% 50.76/18.22  									| Equations (1106) can reduce 1159 to:
% 50.76/18.22  									| (551) $false
% 50.76/18.22  									|
% 50.76/18.22  									|-The branch is then unsatisfiable
% 50.76/18.22  								|-Branch two:
% 50.76/18.22  								| (1106) all_363_1_761 = 0
% 50.76/18.22  								| (1162)  ~ (all_363_2_762 = 0) |  ~ (all_363_3_763 = 0) | all_363_0_760 = 0
% 50.76/18.22  								|
% 50.76/18.22  									+-Applying beta-rule and splitting (1162), into two cases.
% 50.76/18.22  									|-Branch one:
% 50.76/18.22  									| (1163)  ~ (all_363_2_762 = 0)
% 50.76/18.22  									|
% 50.76/18.22  										| Equations (1105) can reduce 1163 to:
% 50.76/18.22  										| (551) $false
% 50.76/18.22  										|
% 50.76/18.22  										|-The branch is then unsatisfiable
% 50.76/18.22  									|-Branch two:
% 50.76/18.22  									| (1105) all_363_2_762 = 0
% 50.76/18.22  									| (1166)  ~ (all_363_3_763 = 0) | all_363_0_760 = 0
% 50.76/18.22  									|
% 50.76/18.22  										+-Applying beta-rule and splitting (1166), into two cases.
% 50.76/18.22  										|-Branch one:
% 50.76/18.23  										| (1167)  ~ (all_363_3_763 = 0)
% 50.76/18.23  										|
% 50.76/18.23  											| Equations (1157) can reduce 1167 to:
% 50.76/18.23  											| (551) $false
% 50.76/18.23  											|
% 50.76/18.23  											|-The branch is then unsatisfiable
% 50.76/18.23  										|-Branch two:
% 50.76/18.23  										| (1157) all_363_3_763 = 0
% 50.76/18.23  										| (1170) all_363_0_760 = 0
% 50.76/18.23  										|
% 50.76/18.23  											| Combining equations (1170,993) yields a new equation:
% 50.76/18.23  											| (1171) all_63_9_192 = 0
% 50.76/18.23  											|
% 50.76/18.23  											+-Applying beta-rule and splitting (266), into two cases.
% 50.76/18.23  											|-Branch one:
% 50.76/18.23  											| (1172)  ~ (all_63_8_191 = 0)
% 50.76/18.23  											|
% 50.76/18.23  												| Equations (476) can reduce 1172 to:
% 50.76/18.23  												| (551) $false
% 50.76/18.23  												|
% 50.76/18.23  												|-The branch is then unsatisfiable
% 50.76/18.23  											|-Branch two:
% 50.76/18.23  											| (476) all_63_8_191 = 0
% 50.76/18.23  											| (1175)  ~ (all_63_9_192 = 0) | (all_63_0_183 = 0 & all_63_1_184 = 0)
% 50.76/18.23  											|
% 50.76/18.23  												+-Applying beta-rule and splitting (1175), into two cases.
% 50.76/18.23  												|-Branch one:
% 50.76/18.23  												| (1176)  ~ (all_63_9_192 = 0)
% 50.76/18.23  												|
% 50.76/18.23  													| Equations (1171) can reduce 1176 to:
% 50.76/18.23  													| (551) $false
% 50.76/18.23  													|
% 50.76/18.23  													|-The branch is then unsatisfiable
% 50.76/18.23  												|-Branch two:
% 50.76/18.23  												| (1171) all_63_9_192 = 0
% 50.76/18.23  												| (1179) all_63_0_183 = 0 & all_63_1_184 = 0
% 50.76/18.23  												|
% 50.76/18.23  													| Applying alpha-rule on (1179) yields:
% 50.76/18.23  													| (1180) all_63_0_183 = 0
% 50.76/18.23  													| (1181) all_63_1_184 = 0
% 50.76/18.23  													|
% 50.76/18.23  													| Combining equations (1181,1076) yields a new equation:
% 50.76/18.23  													| (1182) all_303_1_660 = 0
% 50.76/18.23  													|
% 50.76/18.23  													+-Applying beta-rule and splitting (760), into two cases.
% 50.76/18.23  													|-Branch one:
% 50.76/18.23  													| (1183)  ~ (all_303_1_660 = 0)
% 50.76/18.23  													|
% 50.76/18.23  														| Equations (1182) can reduce 1183 to:
% 50.76/18.23  														| (551) $false
% 50.76/18.23  														|
% 50.76/18.23  														|-The branch is then unsatisfiable
% 50.76/18.23  													|-Branch two:
% 50.76/18.23  													| (1182) all_303_1_660 = 0
% 51.17/18.23  													| (1186) all_303_0_659 = 0
% 51.17/18.23  													|
% 51.17/18.23  														| Combining equations (1078,1186) yields a new equation:
% 51.17/18.23  														| (1187) all_295_3_648 = 0
% 51.17/18.23  														|
% 51.17/18.23  														| Simplifying 1187 yields:
% 51.17/18.23  														| (1188) all_295_3_648 = 0
% 51.17/18.23  														|
% 51.17/18.23  														| From (1188) and (749) follows:
% 51.17/18.23  														| (1189) intruder_message(all_63_3_186) = 0
% 51.17/18.23  														|
% 51.17/18.23  														+-Applying beta-rule and splitting (748), into two cases.
% 51.17/18.23  														|-Branch one:
% 51.17/18.23  														| (1190)  ~ (all_295_3_648 = 0)
% 51.17/18.23  														|
% 51.17/18.23  															| Equations (1188) can reduce 1190 to:
% 51.17/18.23  															| (551) $false
% 51.17/18.23  															|
% 51.17/18.23  															|-The branch is then unsatisfiable
% 51.17/18.23  														|-Branch two:
% 51.17/18.23  														| (1188) all_295_3_648 = 0
% 51.17/18.23  														| (1193) all_295_0_645 = 0 & all_295_1_646 = 0 & all_295_2_647 = 0
% 51.17/18.23  														|
% 51.17/18.23  															| Applying alpha-rule on (1193) yields:
% 51.17/18.23  															| (1194) all_295_0_645 = 0
% 51.17/18.23  															| (1195) all_295_1_646 = 0
% 51.17/18.23  															| (1196) all_295_2_647 = 0
% 51.17/18.23  															|
% 51.17/18.23  															| From (1194) and (750) follows:
% 51.17/18.23  															| (1197) intruder_message(all_63_4_187) = 0
% 51.17/18.23  															|
% 51.17/18.23  															| Instantiating formula (64) with all_0_2_2, all_375_2_792, 0 and discharging atoms b_stored(all_0_2_2) = all_375_2_792, b_stored(all_0_2_2) = 0, yields:
% 51.17/18.23  															| (1198) all_375_2_792 = 0
% 51.17/18.23  															|
% 51.17/18.23  															| Instantiating formula (8) with all_61_7_179, an_a_nonce, all_285_7_623, all_375_7_797 and discharging atoms encrypt(all_61_7_179, an_a_nonce) = all_375_7_797, encrypt(all_61_7_179, an_a_nonce) = all_285_7_623, yields:
% 51.17/18.23  															| (1199) all_375_7_797 = all_285_7_623
% 51.17/18.23  															|
% 51.17/18.23  															| From (1199) and (1123) follows:
% 51.17/18.23  															| (1124) encrypt(all_61_7_179, an_a_nonce) = all_285_7_623
% 51.17/18.23  															|
% 51.17/18.23  															| From (1199) and (1125) follows:
% 51.17/18.23  															| (1201) pair(all_61_4_176, all_285_7_623) = all_375_6_796
% 51.17/18.23  															|
% 51.17/18.23  															+-Applying beta-rule and splitting (165), into two cases.
% 51.17/18.23  															|-Branch one:
% 51.17/18.23  															| (1202) all_19_4_93 = 0
% 51.17/18.23  															|
% 51.17/18.23  																| From (1202) and (134) follows:
% 51.17/18.23  																| (1203) intruder_message(all_19_5_94) = 0
% 51.17/18.23  																|
% 51.17/18.23  																+-Applying beta-rule and splitting (167), into two cases.
% 51.17/18.23  																|-Branch one:
% 51.17/18.23  																| (1204) all_17_0_80 = 0
% 51.17/18.23  																|
% 51.17/18.23  																	| From (1204) and (128) follows:
% 51.17/18.23  																	| (1205) intruder_message(all_17_1_81) = 0
% 51.17/18.23  																	|
% 51.17/18.23  																	| Instantiating formula (19) with all_19_5_94, a, all_19_7_96, all_19_8_97 and discharging atoms party_of_protocol(a) = 0, intruder_message(all_19_5_94) = 0, encrypt(all_19_8_97, all_19_7_96) = all_19_5_94, yields:
% 51.17/18.23  																	| (1206)  ? [v0] :  ? [v1] :  ? [v2] : (intruder_holds(v0) = v1 & intruder_message(all_19_7_96) = v2 & key(all_19_7_96, a) = v0 & ( ~ (v1 = 0) | v2 = 0))
% 51.17/18.23  																	|
% 51.17/18.23  																	| Instantiating formula (19) with all_17_1_81, a, all_17_7_87, all_17_8_88 and discharging atoms party_of_protocol(a) = 0, intruder_message(all_17_1_81) = 0, encrypt(all_17_8_88, all_17_7_87) = all_17_1_81, yields:
% 51.17/18.23  																	| (1207)  ? [v0] :  ? [v1] :  ? [v2] : (intruder_holds(v0) = v1 & intruder_message(all_17_7_87) = v2 & key(all_17_7_87, a) = v0 & ( ~ (v1 = 0) | v2 = 0))
% 51.17/18.23  																	|
% 51.17/18.23  																	| Instantiating formula (40) with all_369_3_774, all_369_4_775, all_369_7_778, b and discharging atoms triple(b, all_369_7_778, all_369_4_775) = all_369_3_774, yields:
% 51.17/18.23  																	| (1208)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (intruder_message(all_369_3_774) = v3 & intruder_message(all_369_4_775) = v2 & intruder_message(all_369_7_778) = v1 & intruder_message(b) = v0 & ( ~ (v2 = 0) |  ~ (v1 = 0) |  ~ (v0 = 0) | v3 = 0))
% 51.17/18.23  																	|
% 51.17/18.23  																	| Instantiating formula (68) with all_369_3_774, all_369_4_775, all_369_7_778, b and discharging atoms triple(b, all_369_7_778, all_369_4_775) = all_369_3_774, yields:
% 51.17/18.23  																	| (1209)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (intruder_message(all_369_3_774) = v0 & intruder_message(all_369_4_775) = v3 & intruder_message(all_369_7_778) = v2 & intruder_message(b) = v1 & ( ~ (v0 = 0) | (v3 = 0 & v2 = 0 & v1 = 0)))
% 51.17/18.23  																	|
% 51.17/18.23  																	| Instantiating formula (70) with all_285_6_622, all_285_7_623, all_63_4_187 and discharging atoms pair(all_63_4_187, all_285_7_623) = all_285_6_622, yields:
% 51.17/18.23  																	| (1210)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] :  ? [v4] :  ? [v5] :  ? [v6] :  ? [v7] :  ? [v8] :  ? [v9] :  ? [v10] : (fresh_to_b(all_285_7_623) = v2 & generate_b_nonce(all_285_7_623) = v3 & generate_expiration_time(all_285_7_623) = v4 & b_stored(all_285_6_622) = v10 & triple(all_63_4_187, all_285_7_623, v4) = v5 & triple(b, v3, v6) = v7 & encrypt(v5, bt) = v6 & sent(all_63_4_187, b, all_285_6_622) = v0 & sent(b, t, v7) = v8 & message(v8) = v9 & message(v0) = v1 & ( ~ (v2 = 0) |  ~ (v1 = 0) | (v10 = 0 & v9 = 0)))
% 51.17/18.23  																	|
% 51.17/18.23  																	| Instantiating formula (12) with all_285_6_622, all_285_7_623, all_63_4_187 and discharging atoms pair(all_63_4_187, all_285_7_623) = all_285_6_622, yields:
% 51.17/18.23  																	| (1211)  ? [v0] :  ? [v1] :  ? [v2] : (intruder_message(all_285_6_622) = v2 & intruder_message(all_285_7_623) = v1 & intruder_message(all_63_4_187) = v0 & ( ~ (v1 = 0) |  ~ (v0 = 0) | v2 = 0))
% 51.17/18.23  																	|
% 51.17/18.23  																	| Instantiating formula (56) with all_285_6_622, all_285_7_623, all_63_4_187 and discharging atoms pair(all_63_4_187, all_285_7_623) = all_285_6_622, yields:
% 51.17/18.23  																	| (1212)  ? [v0] :  ? [v1] :  ? [v2] : (intruder_message(all_285_6_622) = v0 & intruder_message(all_285_7_623) = v2 & intruder_message(all_63_4_187) = v1 & ( ~ (v0 = 0) | (v2 = 0 & v1 = 0)))
% 51.17/18.23  																	|
% 51.17/18.23  																	| Instantiating formula (70) with all_375_6_796, all_285_7_623, all_61_4_176 and discharging atoms pair(all_61_4_176, all_285_7_623) = all_375_6_796, yields:
% 51.17/18.23  																	| (1213)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] :  ? [v4] :  ? [v5] :  ? [v6] :  ? [v7] :  ? [v8] :  ? [v9] :  ? [v10] : (fresh_to_b(all_285_7_623) = v2 & generate_b_nonce(all_285_7_623) = v3 & generate_expiration_time(all_285_7_623) = v4 & b_stored(all_375_6_796) = v10 & triple(all_61_4_176, all_285_7_623, v4) = v5 & triple(b, v3, v6) = v7 & encrypt(v5, bt) = v6 & sent(all_61_4_176, b, all_375_6_796) = v0 & sent(b, t, v7) = v8 & message(v8) = v9 & message(v0) = v1 & ( ~ (v2 = 0) |  ~ (v1 = 0) | (v10 = 0 & v9 = 0)))
% 51.17/18.23  																	|
% 51.17/18.23  																	| Instantiating formula (12) with all_375_6_796, all_285_7_623, all_61_4_176 and discharging atoms pair(all_61_4_176, all_285_7_623) = all_375_6_796, yields:
% 51.17/18.23  																	| (1214)  ? [v0] :  ? [v1] :  ? [v2] : (intruder_message(all_375_6_796) = v2 & intruder_message(all_285_7_623) = v1 & intruder_message(all_61_4_176) = v0 & ( ~ (v1 = 0) |  ~ (v0 = 0) | v2 = 0))
% 51.17/18.23  																	|
% 51.17/18.23  																	| Instantiating formula (56) with all_375_6_796, all_285_7_623, all_61_4_176 and discharging atoms pair(all_61_4_176, all_285_7_623) = all_375_6_796, yields:
% 51.17/18.23  																	| (1215)  ? [v0] :  ? [v1] :  ? [v2] : (intruder_message(all_375_6_796) = v0 & intruder_message(all_285_7_623) = v2 & intruder_message(all_61_4_176) = v1 & ( ~ (v0 = 0) | (v2 = 0 & v1 = 0)))
% 51.17/18.23  																	|
% 51.17/18.23  																	| Instantiating formula (73) with all_281_5_601, b, all_15_14_75, all_281_6_602 and discharging atoms sent(all_15_14_75, b, all_281_6_602) = all_281_5_601, yields:
% 51.17/18.23  																	| (1216)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (party_of_protocol(all_15_14_75) = v1 & party_of_protocol(b) = v2 & intruder_message(all_281_6_602) = v0 & message(all_281_5_601) = v3 & ( ~ (v2 = 0) |  ~ (v1 = 0) |  ~ (v0 = 0) | v3 = 0))
% 51.17/18.23  																	|
% 51.17/18.23  																	| Instantiating formula (73) with all_269_5_559, b, all_15_15_76, all_269_6_560 and discharging atoms sent(all_15_15_76, b, all_269_6_560) = all_269_5_559, yields:
% 51.17/18.23  																	| (1217)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (party_of_protocol(all_15_15_76) = v1 & party_of_protocol(b) = v2 & intruder_message(all_269_6_560) = v0 & message(all_269_5_559) = v3 & ( ~ (v2 = 0) |  ~ (v1 = 0) |  ~ (v0 = 0) | v3 = 0))
% 51.17/18.23  																	|
% 51.17/18.23  																	| Instantiating formula (73) with all_277_5_581, b, all_13_9_55, all_277_6_582 and discharging atoms sent(all_13_9_55, b, all_277_6_582) = all_277_5_581, yields:
% 51.17/18.23  																	| (1218)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (party_of_protocol(all_13_9_55) = v1 & party_of_protocol(b) = v2 & intruder_message(all_277_6_582) = v0 & message(all_277_5_581) = v3 & ( ~ (v2 = 0) |  ~ (v1 = 0) |  ~ (v0 = 0) | v3 = 0))
% 51.17/18.23  																	|
% 51.17/18.23  																	| Instantiating formula (73) with all_369_10_781, b, all_11_4_36, all_131_6_319 and discharging atoms sent(all_11_4_36, b, all_131_6_319) = all_369_10_781, yields:
% 51.17/18.23  																	| (1219)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (party_of_protocol(all_11_4_36) = v1 & party_of_protocol(b) = v2 & intruder_message(all_131_6_319) = v0 & message(all_369_10_781) = v3 & ( ~ (v2 = 0) |  ~ (v1 = 0) |  ~ (v0 = 0) | v3 = 0))
% 51.17/18.23  																	|
% 51.17/18.23  																	| Instantiating formula (73) with all_285_5_621, b, b, all_285_6_622 and discharging atoms sent(b, b, all_285_6_622) = all_285_5_621, yields:
% 51.17/18.23  																	| (1220)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (party_of_protocol(b) = v2 & party_of_protocol(b) = v1 & intruder_message(all_285_6_622) = v0 & message(all_285_5_621) = v3 & ( ~ (v2 = 0) |  ~ (v1 = 0) |  ~ (v0 = 0) | v3 = 0))
% 51.17/18.23  																	|
% 51.17/18.23  																	| Instantiating formula (73) with all_369_2_773, t, b, all_369_3_774 and discharging atoms sent(b, t, all_369_3_774) = all_369_2_773, yields:
% 51.17/18.23  																	| (1221)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (party_of_protocol(b) = v1 & party_of_protocol(t) = v2 & intruder_message(all_369_3_774) = v0 & message(all_369_2_773) = v3 & ( ~ (v2 = 0) |  ~ (v1 = 0) |  ~ (v0 = 0) | v3 = 0))
% 51.17/18.23  																	|
% 51.17/18.23  																	| Instantiating formula (73) with all_375_5_795, b, a, all_375_6_796 and discharging atoms sent(a, b, all_375_6_796) = all_375_5_795, yields:
% 51.17/18.23  																	| (1222)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (party_of_protocol(b) = v2 & party_of_protocol(a) = v1 & intruder_message(all_375_6_796) = v0 & message(all_375_5_795) = v3 & ( ~ (v2 = 0) |  ~ (v1 = 0) |  ~ (v0 = 0) | v3 = 0))
% 51.17/18.23  																	|
% 51.17/18.23  																	| Instantiating formula (4) with all_375_5_795, all_375_6_796, b, a and discharging atoms sent(a, b, all_375_6_796) = all_375_5_795, yields:
% 51.17/18.23  																	| (1223)  ? [v0] :  ? [v1] : (intruder_message(all_375_6_796) = v1 & message(all_375_5_795) = v0 & ( ~ (v0 = 0) | v1 = 0))
% 51.17/18.23  																	|
% 51.17/18.23  																	| Instantiating formula (57) with all_277_1_577, all_13_9_55, all_13_7_53 and discharging atoms key(all_13_7_53, all_13_9_55) = all_277_1_577, yields:
% 51.17/18.24  																	| (1224)  ? [v0] :  ? [v1] :  ? [v2] : (intruder_holds(all_277_1_577) = v2 & party_of_protocol(all_13_9_55) = v1 & intruder_message(all_13_7_53) = v0 & ( ~ (v1 = 0) |  ~ (v0 = 0) | v2 = 0))
% 51.17/18.24  																	|
% 51.17/18.24  																	| Instantiating formula (39) with all_285_1_617, an_a_nonce and discharging atoms key(an_a_nonce, b) = all_285_1_617, yields:
% 51.17/18.24  																	| (1225)  ? [v0] :  ? [v1] :  ? [v2] : (intruder_holds(all_285_1_617) = v0 & b_holds(v1) = v2 & key(an_a_nonce, a) = v1 & ( ~ (v2 = 0) |  ~ (v0 = 0)))
% 51.17/18.24  																	|
% 51.17/18.24  																	| Instantiating formula (57) with all_285_1_617, b, an_a_nonce and discharging atoms key(an_a_nonce, b) = all_285_1_617, yields:
% 51.17/18.24  																	| (1226)  ? [v0] :  ? [v1] :  ? [v2] : (intruder_holds(all_285_1_617) = v2 & party_of_protocol(b) = v1 & intruder_message(an_a_nonce) = v0 & ( ~ (v1 = 0) |  ~ (v0 = 0) | v2 = 0))
% 51.17/18.24  																	|
% 51.17/18.24  																	| Instantiating formula (62) with all_375_1_791, an_a_nonce and discharging atoms key(an_a_nonce, a) = all_375_1_791, yields:
% 51.17/18.24  																	| (1227)  ? [v0] :  ? [v1] :  ? [v2] : (intruder_holds(v0) = v1 & b_holds(all_375_1_791) = v2 & key(an_a_nonce, b) = v0 & ( ~ (v2 = 0) |  ~ (v1 = 0)))
% 51.17/18.24  																	|
% 51.17/18.24  																	| Instantiating formula (57) with all_375_1_791, a, an_a_nonce and discharging atoms key(an_a_nonce, a) = all_375_1_791, yields:
% 51.17/18.24  																	| (1228)  ? [v0] :  ? [v1] :  ? [v2] : (intruder_holds(all_375_1_791) = v2 & party_of_protocol(a) = v1 & intruder_message(an_a_nonce) = v0 & ( ~ (v1 = 0) |  ~ (v0 = 0) | v2 = 0))
% 51.17/18.24  																	|
% 51.17/18.24  																	| Instantiating (1206) with all_745_0_803, all_745_1_804, all_745_2_805 yields:
% 51.17/18.24  																	| (1229) intruder_holds(all_745_2_805) = all_745_1_804 & intruder_message(all_19_7_96) = all_745_0_803 & key(all_19_7_96, a) = all_745_2_805 & ( ~ (all_745_1_804 = 0) | all_745_0_803 = 0)
% 51.17/18.24  																	|
% 51.17/18.24  																	| Applying alpha-rule on (1229) yields:
% 51.17/18.24  																	| (1230) intruder_holds(all_745_2_805) = all_745_1_804
% 51.17/18.24  																	| (1231) intruder_message(all_19_7_96) = all_745_0_803
% 51.17/18.24  																	| (1232) key(all_19_7_96, a) = all_745_2_805
% 51.17/18.24  																	| (1233)  ~ (all_745_1_804 = 0) | all_745_0_803 = 0
% 51.17/18.24  																	|
% 51.17/18.24  																	| Instantiating (1228) with all_753_0_815, all_753_1_816, all_753_2_817 yields:
% 51.17/18.24  																	| (1234) intruder_holds(all_375_1_791) = all_753_0_815 & party_of_protocol(a) = all_753_1_816 & intruder_message(an_a_nonce) = all_753_2_817 & ( ~ (all_753_1_816 = 0) |  ~ (all_753_2_817 = 0) | all_753_0_815 = 0)
% 51.17/18.24  																	|
% 51.17/18.24  																	| Applying alpha-rule on (1234) yields:
% 51.17/18.24  																	| (1235) intruder_holds(all_375_1_791) = all_753_0_815
% 51.17/18.24  																	| (1236) party_of_protocol(a) = all_753_1_816
% 51.17/18.24  																	| (1237) intruder_message(an_a_nonce) = all_753_2_817
% 51.17/18.24  																	| (1238)  ~ (all_753_1_816 = 0) |  ~ (all_753_2_817 = 0) | all_753_0_815 = 0
% 51.17/18.24  																	|
% 51.17/18.24  																	| Instantiating (1226) with all_755_0_818, all_755_1_819, all_755_2_820 yields:
% 51.17/18.24  																	| (1239) intruder_holds(all_285_1_617) = all_755_0_818 & party_of_protocol(b) = all_755_1_819 & intruder_message(an_a_nonce) = all_755_2_820 & ( ~ (all_755_1_819 = 0) |  ~ (all_755_2_820 = 0) | all_755_0_818 = 0)
% 51.17/18.24  																	|
% 51.17/18.24  																	| Applying alpha-rule on (1239) yields:
% 51.17/18.24  																	| (1240) intruder_holds(all_285_1_617) = all_755_0_818
% 51.17/18.24  																	| (1241) party_of_protocol(b) = all_755_1_819
% 51.17/18.24  																	| (1242) intruder_message(an_a_nonce) = all_755_2_820
% 51.17/18.24  																	| (1243)  ~ (all_755_1_819 = 0) |  ~ (all_755_2_820 = 0) | all_755_0_818 = 0
% 51.17/18.24  																	|
% 51.17/18.24  																	| Instantiating (1225) with all_757_0_821, all_757_1_822, all_757_2_823 yields:
% 51.17/18.24  																	| (1244) intruder_holds(all_285_1_617) = all_757_2_823 & b_holds(all_757_1_822) = all_757_0_821 & key(an_a_nonce, a) = all_757_1_822 & ( ~ (all_757_0_821 = 0) |  ~ (all_757_2_823 = 0))
% 51.17/18.24  																	|
% 51.17/18.24  																	| Applying alpha-rule on (1244) yields:
% 51.17/18.24  																	| (1245) intruder_holds(all_285_1_617) = all_757_2_823
% 51.17/18.24  																	| (1246) b_holds(all_757_1_822) = all_757_0_821
% 51.17/18.24  																	| (1247) key(an_a_nonce, a) = all_757_1_822
% 51.17/18.24  																	| (1248)  ~ (all_757_0_821 = 0) |  ~ (all_757_2_823 = 0)
% 51.17/18.24  																	|
% 51.17/18.24  																	| Instantiating (1227) with all_759_0_824, all_759_1_825, all_759_2_826 yields:
% 51.17/18.24  																	| (1249) intruder_holds(all_759_2_826) = all_759_1_825 & b_holds(all_375_1_791) = all_759_0_824 & key(an_a_nonce, b) = all_759_2_826 & ( ~ (all_759_0_824 = 0) |  ~ (all_759_1_825 = 0))
% 51.17/18.24  																	|
% 51.17/18.24  																	| Applying alpha-rule on (1249) yields:
% 51.17/18.24  																	| (1250) intruder_holds(all_759_2_826) = all_759_1_825
% 51.17/18.24  																	| (1251) b_holds(all_375_1_791) = all_759_0_824
% 51.17/18.24  																	| (1252) key(an_a_nonce, b) = all_759_2_826
% 51.17/18.24  																	| (1253)  ~ (all_759_0_824 = 0) |  ~ (all_759_1_825 = 0)
% 51.17/18.24  																	|
% 51.17/18.24  																	| Instantiating (1222) with all_763_0_830, all_763_1_831, all_763_2_832, all_763_3_833 yields:
% 51.17/18.24  																	| (1254) party_of_protocol(b) = all_763_1_831 & party_of_protocol(a) = all_763_2_832 & intruder_message(all_375_6_796) = all_763_3_833 & message(all_375_5_795) = all_763_0_830 & ( ~ (all_763_1_831 = 0) |  ~ (all_763_2_832 = 0) |  ~ (all_763_3_833 = 0) | all_763_0_830 = 0)
% 51.17/18.24  																	|
% 51.17/18.24  																	| Applying alpha-rule on (1254) yields:
% 51.17/18.24  																	| (1255) party_of_protocol(b) = all_763_1_831
% 51.17/18.24  																	| (1256) intruder_message(all_375_6_796) = all_763_3_833
% 51.17/18.24  																	| (1257) party_of_protocol(a) = all_763_2_832
% 51.17/18.24  																	| (1258)  ~ (all_763_1_831 = 0) |  ~ (all_763_2_832 = 0) |  ~ (all_763_3_833 = 0) | all_763_0_830 = 0
% 51.17/18.24  																	| (1259) message(all_375_5_795) = all_763_0_830
% 51.17/18.24  																	|
% 51.17/18.24  																	| Instantiating (1223) with all_779_0_870, all_779_1_871 yields:
% 51.17/18.24  																	| (1260) intruder_message(all_375_6_796) = all_779_0_870 & message(all_375_5_795) = all_779_1_871 & ( ~ (all_779_1_871 = 0) | all_779_0_870 = 0)
% 51.17/18.24  																	|
% 51.17/18.24  																	| Applying alpha-rule on (1260) yields:
% 51.17/18.24  																	| (1261) intruder_message(all_375_6_796) = all_779_0_870
% 51.17/18.24  																	| (1262) message(all_375_5_795) = all_779_1_871
% 51.17/18.24  																	| (1263)  ~ (all_779_1_871 = 0) | all_779_0_870 = 0
% 51.17/18.24  																	|
% 51.17/18.24  																	| Instantiating (1219) with all_781_0_872, all_781_1_873, all_781_2_874, all_781_3_875 yields:
% 51.17/18.24  																	| (1264) party_of_protocol(all_11_4_36) = all_781_2_874 & party_of_protocol(b) = all_781_1_873 & intruder_message(all_131_6_319) = all_781_3_875 & message(all_369_10_781) = all_781_0_872 & ( ~ (all_781_1_873 = 0) |  ~ (all_781_2_874 = 0) |  ~ (all_781_3_875 = 0) | all_781_0_872 = 0)
% 51.17/18.24  																	|
% 51.17/18.24  																	| Applying alpha-rule on (1264) yields:
% 51.17/18.24  																	| (1265)  ~ (all_781_1_873 = 0) |  ~ (all_781_2_874 = 0) |  ~ (all_781_3_875 = 0) | all_781_0_872 = 0
% 51.17/18.24  																	| (1266) party_of_protocol(b) = all_781_1_873
% 51.17/18.24  																	| (1267) message(all_369_10_781) = all_781_0_872
% 51.17/18.24  																	| (1268) intruder_message(all_131_6_319) = all_781_3_875
% 51.17/18.24  																	| (1269) party_of_protocol(all_11_4_36) = all_781_2_874
% 51.17/18.24  																	|
% 51.17/18.24  																	| Instantiating (1218) with all_783_0_876, all_783_1_877, all_783_2_878, all_783_3_879 yields:
% 51.17/18.24  																	| (1270) party_of_protocol(all_13_9_55) = all_783_2_878 & party_of_protocol(b) = all_783_1_877 & intruder_message(all_277_6_582) = all_783_3_879 & message(all_277_5_581) = all_783_0_876 & ( ~ (all_783_1_877 = 0) |  ~ (all_783_2_878 = 0) |  ~ (all_783_3_879 = 0) | all_783_0_876 = 0)
% 51.17/18.24  																	|
% 51.17/18.24  																	| Applying alpha-rule on (1270) yields:
% 51.17/18.24  																	| (1271) message(all_277_5_581) = all_783_0_876
% 51.17/18.24  																	| (1272) party_of_protocol(b) = all_783_1_877
% 51.17/18.24  																	| (1273) party_of_protocol(all_13_9_55) = all_783_2_878
% 51.17/18.24  																	| (1274) intruder_message(all_277_6_582) = all_783_3_879
% 51.17/18.24  																	| (1275)  ~ (all_783_1_877 = 0) |  ~ (all_783_2_878 = 0) |  ~ (all_783_3_879 = 0) | all_783_0_876 = 0
% 51.17/18.24  																	|
% 51.17/18.24  																	| Instantiating (1221) with all_789_0_884, all_789_1_885, all_789_2_886, all_789_3_887 yields:
% 51.17/18.24  																	| (1276) party_of_protocol(b) = all_789_2_886 & party_of_protocol(t) = all_789_1_885 & intruder_message(all_369_3_774) = all_789_3_887 & message(all_369_2_773) = all_789_0_884 & ( ~ (all_789_1_885 = 0) |  ~ (all_789_2_886 = 0) |  ~ (all_789_3_887 = 0) | all_789_0_884 = 0)
% 51.17/18.24  																	|
% 51.17/18.24  																	| Applying alpha-rule on (1276) yields:
% 51.17/18.24  																	| (1277) party_of_protocol(t) = all_789_1_885
% 51.17/18.24  																	| (1278) intruder_message(all_369_3_774) = all_789_3_887
% 51.17/18.24  																	| (1279) message(all_369_2_773) = all_789_0_884
% 51.17/18.24  																	| (1280)  ~ (all_789_1_885 = 0) |  ~ (all_789_2_886 = 0) |  ~ (all_789_3_887 = 0) | all_789_0_884 = 0
% 51.17/18.24  																	| (1281) party_of_protocol(b) = all_789_2_886
% 51.17/18.24  																	|
% 51.17/18.24  																	| Instantiating (1220) with all_793_0_890, all_793_1_891, all_793_2_892, all_793_3_893 yields:
% 51.17/18.24  																	| (1282) party_of_protocol(b) = all_793_1_891 & party_of_protocol(b) = all_793_2_892 & intruder_message(all_285_6_622) = all_793_3_893 & message(all_285_5_621) = all_793_0_890 & ( ~ (all_793_1_891 = 0) |  ~ (all_793_2_892 = 0) |  ~ (all_793_3_893 = 0) | all_793_0_890 = 0)
% 51.17/18.24  																	|
% 51.17/18.24  																	| Applying alpha-rule on (1282) yields:
% 51.17/18.24  																	| (1283) message(all_285_5_621) = all_793_0_890
% 51.17/18.24  																	| (1284)  ~ (all_793_1_891 = 0) |  ~ (all_793_2_892 = 0) |  ~ (all_793_3_893 = 0) | all_793_0_890 = 0
% 51.17/18.24  																	| (1285) intruder_message(all_285_6_622) = all_793_3_893
% 51.17/18.24  																	| (1286) party_of_protocol(b) = all_793_1_891
% 51.17/18.24  																	| (1287) party_of_protocol(b) = all_793_2_892
% 51.17/18.24  																	|
% 51.17/18.24  																	| Instantiating (1217) with all_797_0_896, all_797_1_897, all_797_2_898, all_797_3_899 yields:
% 51.17/18.24  																	| (1288) party_of_protocol(all_15_15_76) = all_797_2_898 & party_of_protocol(b) = all_797_1_897 & intruder_message(all_269_6_560) = all_797_3_899 & message(all_269_5_559) = all_797_0_896 & ( ~ (all_797_1_897 = 0) |  ~ (all_797_2_898 = 0) |  ~ (all_797_3_899 = 0) | all_797_0_896 = 0)
% 51.17/18.24  																	|
% 51.17/18.24  																	| Applying alpha-rule on (1288) yields:
% 51.17/18.24  																	| (1289) intruder_message(all_269_6_560) = all_797_3_899
% 51.17/18.24  																	| (1290) party_of_protocol(b) = all_797_1_897
% 51.17/18.24  																	| (1291) message(all_269_5_559) = all_797_0_896
% 51.17/18.24  																	| (1292) party_of_protocol(all_15_15_76) = all_797_2_898
% 51.17/18.24  																	| (1293)  ~ (all_797_1_897 = 0) |  ~ (all_797_2_898 = 0) |  ~ (all_797_3_899 = 0) | all_797_0_896 = 0
% 51.17/18.24  																	|
% 51.17/18.24  																	| Instantiating (1209) with all_807_0_911, all_807_1_912, all_807_2_913, all_807_3_914 yields:
% 51.17/18.24  																	| (1294) intruder_message(all_369_3_774) = all_807_3_914 & intruder_message(all_369_4_775) = all_807_0_911 & intruder_message(all_369_7_778) = all_807_1_912 & intruder_message(b) = all_807_2_913 & ( ~ (all_807_3_914 = 0) | (all_807_0_911 = 0 & all_807_1_912 = 0 & all_807_2_913 = 0))
% 51.17/18.24  																	|
% 51.17/18.24  																	| Applying alpha-rule on (1294) yields:
% 51.17/18.24  																	| (1295) intruder_message(all_369_4_775) = all_807_0_911
% 51.17/18.24  																	| (1296) intruder_message(all_369_7_778) = all_807_1_912
% 51.17/18.24  																	| (1297) intruder_message(all_369_3_774) = all_807_3_914
% 51.17/18.24  																	| (1298) intruder_message(b) = all_807_2_913
% 51.17/18.25  																	| (1299)  ~ (all_807_3_914 = 0) | (all_807_0_911 = 0 & all_807_1_912 = 0 & all_807_2_913 = 0)
% 51.17/18.25  																	|
% 51.17/18.25  																	| Instantiating (1208) with all_809_0_915, all_809_1_916, all_809_2_917, all_809_3_918 yields:
% 51.17/18.25  																	| (1300) intruder_message(all_369_3_774) = all_809_0_915 & intruder_message(all_369_4_775) = all_809_1_916 & intruder_message(all_369_7_778) = all_809_2_917 & intruder_message(b) = all_809_3_918 & ( ~ (all_809_1_916 = 0) |  ~ (all_809_2_917 = 0) |  ~ (all_809_3_918 = 0) | all_809_0_915 = 0)
% 51.17/18.25  																	|
% 51.17/18.25  																	| Applying alpha-rule on (1300) yields:
% 51.17/18.25  																	| (1301) intruder_message(all_369_3_774) = all_809_0_915
% 51.17/18.25  																	| (1302)  ~ (all_809_1_916 = 0) |  ~ (all_809_2_917 = 0) |  ~ (all_809_3_918 = 0) | all_809_0_915 = 0
% 51.17/18.25  																	| (1303) intruder_message(all_369_7_778) = all_809_2_917
% 51.17/18.25  																	| (1304) intruder_message(b) = all_809_3_918
% 51.17/18.25  																	| (1305) intruder_message(all_369_4_775) = all_809_1_916
% 51.17/18.25  																	|
% 51.17/18.25  																	| Instantiating (1224) with all_813_0_930, all_813_1_931, all_813_2_932 yields:
% 51.17/18.25  																	| (1306) intruder_holds(all_277_1_577) = all_813_0_930 & party_of_protocol(all_13_9_55) = all_813_1_931 & intruder_message(all_13_7_53) = all_813_2_932 & ( ~ (all_813_1_931 = 0) |  ~ (all_813_2_932 = 0) | all_813_0_930 = 0)
% 51.17/18.25  																	|
% 51.17/18.25  																	| Applying alpha-rule on (1306) yields:
% 51.17/18.25  																	| (1307) intruder_holds(all_277_1_577) = all_813_0_930
% 51.17/18.25  																	| (1308) party_of_protocol(all_13_9_55) = all_813_1_931
% 51.17/18.25  																	| (1309) intruder_message(all_13_7_53) = all_813_2_932
% 51.17/18.25  																	| (1310)  ~ (all_813_1_931 = 0) |  ~ (all_813_2_932 = 0) | all_813_0_930 = 0
% 51.17/18.25  																	|
% 51.17/18.25  																	| Instantiating (1216) with all_821_0_950, all_821_1_951, all_821_2_952, all_821_3_953 yields:
% 51.17/18.25  																	| (1311) party_of_protocol(all_15_14_75) = all_821_2_952 & party_of_protocol(b) = all_821_1_951 & intruder_message(all_281_6_602) = all_821_3_953 & message(all_281_5_601) = all_821_0_950 & ( ~ (all_821_1_951 = 0) |  ~ (all_821_2_952 = 0) |  ~ (all_821_3_953 = 0) | all_821_0_950 = 0)
% 51.17/18.25  																	|
% 51.17/18.25  																	| Applying alpha-rule on (1311) yields:
% 51.17/18.25  																	| (1312)  ~ (all_821_1_951 = 0) |  ~ (all_821_2_952 = 0) |  ~ (all_821_3_953 = 0) | all_821_0_950 = 0
% 51.17/18.25  																	| (1313) message(all_281_5_601) = all_821_0_950
% 51.17/18.25  																	| (1314) party_of_protocol(b) = all_821_1_951
% 51.17/18.25  																	| (1315) intruder_message(all_281_6_602) = all_821_3_953
% 51.17/18.25  																	| (1316) party_of_protocol(all_15_14_75) = all_821_2_952
% 51.17/18.25  																	|
% 51.17/18.25  																	| Instantiating (1215) with all_823_0_954, all_823_1_955, all_823_2_956 yields:
% 51.17/18.25  																	| (1317) intruder_message(all_375_6_796) = all_823_2_956 & intruder_message(all_285_7_623) = all_823_0_954 & intruder_message(all_61_4_176) = all_823_1_955 & ( ~ (all_823_2_956 = 0) | (all_823_0_954 = 0 & all_823_1_955 = 0))
% 51.17/18.25  																	|
% 51.17/18.25  																	| Applying alpha-rule on (1317) yields:
% 51.17/18.25  																	| (1318) intruder_message(all_375_6_796) = all_823_2_956
% 51.17/18.25  																	| (1319) intruder_message(all_285_7_623) = all_823_0_954
% 51.17/18.25  																	| (1320) intruder_message(all_61_4_176) = all_823_1_955
% 51.17/18.25  																	| (1321)  ~ (all_823_2_956 = 0) | (all_823_0_954 = 0 & all_823_1_955 = 0)
% 51.17/18.25  																	|
% 51.17/18.25  																	| Instantiating (1214) with all_825_0_957, all_825_1_958, all_825_2_959 yields:
% 51.17/18.25  																	| (1322) intruder_message(all_375_6_796) = all_825_0_957 & intruder_message(all_285_7_623) = all_825_1_958 & intruder_message(all_61_4_176) = all_825_2_959 & ( ~ (all_825_1_958 = 0) |  ~ (all_825_2_959 = 0) | all_825_0_957 = 0)
% 51.17/18.25  																	|
% 51.17/18.25  																	| Applying alpha-rule on (1322) yields:
% 51.17/18.25  																	| (1323) intruder_message(all_375_6_796) = all_825_0_957
% 51.17/18.25  																	| (1324) intruder_message(all_285_7_623) = all_825_1_958
% 51.17/18.25  																	| (1325) intruder_message(all_61_4_176) = all_825_2_959
% 51.17/18.25  																	| (1326)  ~ (all_825_1_958 = 0) |  ~ (all_825_2_959 = 0) | all_825_0_957 = 0
% 51.17/18.25  																	|
% 51.17/18.25  																	| Instantiating (1212) with all_827_0_960, all_827_1_961, all_827_2_962 yields:
% 51.17/18.25  																	| (1327) intruder_message(all_285_6_622) = all_827_2_962 & intruder_message(all_285_7_623) = all_827_0_960 & intruder_message(all_63_4_187) = all_827_1_961 & ( ~ (all_827_2_962 = 0) | (all_827_0_960 = 0 & all_827_1_961 = 0))
% 51.17/18.25  																	|
% 51.17/18.25  																	| Applying alpha-rule on (1327) yields:
% 51.17/18.25  																	| (1328) intruder_message(all_285_6_622) = all_827_2_962
% 51.17/18.25  																	| (1329) intruder_message(all_285_7_623) = all_827_0_960
% 51.17/18.25  																	| (1330) intruder_message(all_63_4_187) = all_827_1_961
% 51.17/18.25  																	| (1331)  ~ (all_827_2_962 = 0) | (all_827_0_960 = 0 & all_827_1_961 = 0)
% 51.17/18.25  																	|
% 51.17/18.25  																	| Instantiating (1211) with all_829_0_963, all_829_1_964, all_829_2_965 yields:
% 51.17/18.25  																	| (1332) intruder_message(all_285_6_622) = all_829_0_963 & intruder_message(all_285_7_623) = all_829_1_964 & intruder_message(all_63_4_187) = all_829_2_965 & ( ~ (all_829_1_964 = 0) |  ~ (all_829_2_965 = 0) | all_829_0_963 = 0)
% 51.17/18.25  																	|
% 51.17/18.25  																	| Applying alpha-rule on (1332) yields:
% 51.17/18.25  																	| (1333) intruder_message(all_285_6_622) = all_829_0_963
% 51.17/18.25  																	| (1334) intruder_message(all_285_7_623) = all_829_1_964
% 51.17/18.25  																	| (1335) intruder_message(all_63_4_187) = all_829_2_965
% 51.17/18.25  																	| (1336)  ~ (all_829_1_964 = 0) |  ~ (all_829_2_965 = 0) | all_829_0_963 = 0
% 51.17/18.25  																	|
% 51.17/18.25  																	| Instantiating (1207) with all_833_0_969, all_833_1_970, all_833_2_971 yields:
% 51.17/18.25  																	| (1337) intruder_holds(all_833_2_971) = all_833_1_970 & intruder_message(all_17_7_87) = all_833_0_969 & key(all_17_7_87, a) = all_833_2_971 & ( ~ (all_833_1_970 = 0) | all_833_0_969 = 0)
% 51.17/18.25  																	|
% 51.17/18.25  																	| Applying alpha-rule on (1337) yields:
% 51.17/18.25  																	| (1338) intruder_holds(all_833_2_971) = all_833_1_970
% 51.17/18.25  																	| (1339) intruder_message(all_17_7_87) = all_833_0_969
% 51.17/18.25  																	| (1340) key(all_17_7_87, a) = all_833_2_971
% 51.17/18.25  																	| (1341)  ~ (all_833_1_970 = 0) | all_833_0_969 = 0
% 51.17/18.25  																	|
% 51.17/18.25  																	| Instantiating (1213) with all_835_0_972, all_835_1_973, all_835_2_974, all_835_3_975, all_835_4_976, all_835_5_977, all_835_6_978, all_835_7_979, all_835_8_980, all_835_9_981, all_835_10_982 yields:
% 51.17/18.25  																	| (1342) fresh_to_b(all_285_7_623) = all_835_8_980 & generate_b_nonce(all_285_7_623) = all_835_7_979 & generate_expiration_time(all_285_7_623) = all_835_6_978 & b_stored(all_375_6_796) = all_835_0_972 & triple(all_61_4_176, all_285_7_623, all_835_6_978) = all_835_5_977 & triple(b, all_835_7_979, all_835_4_976) = all_835_3_975 & encrypt(all_835_5_977, bt) = all_835_4_976 & sent(all_61_4_176, b, all_375_6_796) = all_835_10_982 & sent(b, t, all_835_3_975) = all_835_2_974 & message(all_835_2_974) = all_835_1_973 & message(all_835_10_982) = all_835_9_981 & ( ~ (all_835_8_980 = 0) |  ~ (all_835_9_981 = 0) | (all_835_0_972 = 0 & all_835_1_973 = 0))
% 51.17/18.25  																	|
% 51.17/18.25  																	| Applying alpha-rule on (1342) yields:
% 51.17/18.25  																	| (1343) generate_expiration_time(all_285_7_623) = all_835_6_978
% 51.17/18.25  																	| (1344) message(all_835_2_974) = all_835_1_973
% 51.17/18.25  																	| (1345)  ~ (all_835_8_980 = 0) |  ~ (all_835_9_981 = 0) | (all_835_0_972 = 0 & all_835_1_973 = 0)
% 51.17/18.25  																	| (1346) message(all_835_10_982) = all_835_9_981
% 51.17/18.25  																	| (1347) triple(b, all_835_7_979, all_835_4_976) = all_835_3_975
% 51.17/18.25  																	| (1348) triple(all_61_4_176, all_285_7_623, all_835_6_978) = all_835_5_977
% 51.17/18.25  																	| (1349) encrypt(all_835_5_977, bt) = all_835_4_976
% 51.17/18.25  																	| (1350) fresh_to_b(all_285_7_623) = all_835_8_980
% 51.17/18.25  																	| (1351) sent(b, t, all_835_3_975) = all_835_2_974
% 51.17/18.25  																	| (1352) b_stored(all_375_6_796) = all_835_0_972
% 51.17/18.25  																	| (1353) sent(all_61_4_176, b, all_375_6_796) = all_835_10_982
% 51.17/18.25  																	| (1354) generate_b_nonce(all_285_7_623) = all_835_7_979
% 51.17/18.25  																	|
% 51.17/18.25  																	| Instantiating (1210) with all_837_0_983, all_837_1_984, all_837_2_985, all_837_3_986, all_837_4_987, all_837_5_988, all_837_6_989, all_837_7_990, all_837_8_991, all_837_9_992, all_837_10_993 yields:
% 51.17/18.25  																	| (1355) fresh_to_b(all_285_7_623) = all_837_8_991 & generate_b_nonce(all_285_7_623) = all_837_7_990 & generate_expiration_time(all_285_7_623) = all_837_6_989 & b_stored(all_285_6_622) = all_837_0_983 & triple(all_63_4_187, all_285_7_623, all_837_6_989) = all_837_5_988 & triple(b, all_837_7_990, all_837_4_987) = all_837_3_986 & encrypt(all_837_5_988, bt) = all_837_4_987 & sent(all_63_4_187, b, all_285_6_622) = all_837_10_993 & sent(b, t, all_837_3_986) = all_837_2_985 & message(all_837_2_985) = all_837_1_984 & message(all_837_10_993) = all_837_9_992 & ( ~ (all_837_8_991 = 0) |  ~ (all_837_9_992 = 0) | (all_837_0_983 = 0 & all_837_1_984 = 0))
% 51.17/18.25  																	|
% 51.17/18.25  																	| Applying alpha-rule on (1355) yields:
% 51.17/18.25  																	| (1356) message(all_837_2_985) = all_837_1_984
% 51.17/18.25  																	| (1357) encrypt(all_837_5_988, bt) = all_837_4_987
% 51.17/18.25  																	| (1358) generate_b_nonce(all_285_7_623) = all_837_7_990
% 51.17/18.25  																	| (1359) b_stored(all_285_6_622) = all_837_0_983
% 51.17/18.25  																	| (1360) message(all_837_10_993) = all_837_9_992
% 51.17/18.25  																	| (1361) triple(all_63_4_187, all_285_7_623, all_837_6_989) = all_837_5_988
% 51.17/18.25  																	| (1362) sent(b, t, all_837_3_986) = all_837_2_985
% 51.17/18.25  																	| (1363)  ~ (all_837_8_991 = 0) |  ~ (all_837_9_992 = 0) | (all_837_0_983 = 0 & all_837_1_984 = 0)
% 51.17/18.25  																	| (1364) generate_expiration_time(all_285_7_623) = all_837_6_989
% 51.17/18.25  																	| (1365) fresh_to_b(all_285_7_623) = all_837_8_991
% 51.17/18.25  																	| (1366) triple(b, all_837_7_990, all_837_4_987) = all_837_3_986
% 51.17/18.25  																	| (1367) sent(all_63_4_187, b, all_285_6_622) = all_837_10_993
% 51.17/18.25  																	|
% 51.17/18.25  																	| Instantiating formula (37) with all_285_1_617, all_755_0_818, all_757_2_823 and discharging atoms intruder_holds(all_285_1_617) = all_757_2_823, intruder_holds(all_285_1_617) = all_755_0_818, yields:
% 51.17/18.25  																	| (1368) all_757_2_823 = all_755_0_818
% 51.17/18.25  																	|
% 51.17/18.25  																	| Instantiating formula (66) with b, all_797_1_897, 0 and discharging atoms party_of_protocol(b) = all_797_1_897, party_of_protocol(b) = 0, yields:
% 51.17/18.25  																	| (1369) all_797_1_897 = 0
% 51.17/18.25  																	|
% 51.17/18.25  																	| Instantiating formula (66) with b, all_793_1_891, all_821_1_951 and discharging atoms party_of_protocol(b) = all_821_1_951, party_of_protocol(b) = all_793_1_891, yields:
% 51.17/18.25  																	| (1370) all_821_1_951 = all_793_1_891
% 51.17/18.25  																	|
% 51.17/18.25  																	| Instantiating formula (66) with b, all_793_1_891, all_797_1_897 and discharging atoms party_of_protocol(b) = all_797_1_897, party_of_protocol(b) = all_793_1_891, yields:
% 51.17/18.25  																	| (1371) all_797_1_897 = all_793_1_891
% 51.17/18.25  																	|
% 51.17/18.25  																	| Instantiating formula (66) with b, all_793_2_892, all_821_1_951 and discharging atoms party_of_protocol(b) = all_821_1_951, party_of_protocol(b) = all_793_2_892, yields:
% 51.17/18.25  																	| (1372) all_821_1_951 = all_793_2_892
% 51.17/18.25  																	|
% 51.17/18.25  																	| Instantiating formula (66) with b, all_789_2_886, all_793_2_892 and discharging atoms party_of_protocol(b) = all_793_2_892, party_of_protocol(b) = all_789_2_886, yields:
% 51.17/18.25  																	| (1373) all_793_2_892 = all_789_2_886
% 51.17/18.25  																	|
% 51.17/18.25  																	| Instantiating formula (66) with b, all_783_1_877, all_821_1_951 and discharging atoms party_of_protocol(b) = all_821_1_951, party_of_protocol(b) = all_783_1_877, yields:
% 51.17/18.25  																	| (1374) all_821_1_951 = all_783_1_877
% 51.17/18.25  																	|
% 51.17/18.25  																	| Instantiating formula (66) with b, all_781_1_873, all_793_2_892 and discharging atoms party_of_protocol(b) = all_793_2_892, party_of_protocol(b) = all_781_1_873, yields:
% 51.17/18.25  																	| (1375) all_793_2_892 = all_781_1_873
% 51.17/18.25  																	|
% 51.17/18.25  																	| Instantiating formula (66) with b, all_763_1_831, all_821_1_951 and discharging atoms party_of_protocol(b) = all_821_1_951, party_of_protocol(b) = all_763_1_831, yields:
% 51.17/18.25  																	| (1376) all_821_1_951 = all_763_1_831
% 51.17/18.25  																	|
% 51.17/18.25  																	| Instantiating formula (66) with b, all_755_1_819, all_763_1_831 and discharging atoms party_of_protocol(b) = all_763_1_831, party_of_protocol(b) = all_755_1_819, yields:
% 51.17/18.25  																	| (1377) all_763_1_831 = all_755_1_819
% 51.17/18.26  																	|
% 51.17/18.26  																	| Instantiating formula (66) with a, all_763_2_832, 0 and discharging atoms party_of_protocol(a) = all_763_2_832, party_of_protocol(a) = 0, yields:
% 51.17/18.26  																	| (1378) all_763_2_832 = 0
% 51.17/18.26  																	|
% 51.17/18.26  																	| Instantiating formula (66) with a, all_753_1_816, all_763_2_832 and discharging atoms party_of_protocol(a) = all_763_2_832, party_of_protocol(a) = all_753_1_816, yields:
% 51.17/18.26  																	| (1379) all_763_2_832 = all_753_1_816
% 51.17/18.26  																	|
% 51.17/18.26  																	| Instantiating formula (66) with t, all_789_1_885, 0 and discharging atoms party_of_protocol(t) = all_789_1_885, party_of_protocol(t) = 0, yields:
% 51.17/18.26  																	| (1380) all_789_1_885 = 0
% 51.17/18.26  																	|
% 51.17/18.26  																	| Instantiating formula (31) with all_375_6_796, all_763_3_833, all_825_0_957 and discharging atoms intruder_message(all_375_6_796) = all_825_0_957, intruder_message(all_375_6_796) = all_763_3_833, yields:
% 51.17/18.26  																	| (1381) all_825_0_957 = all_763_3_833
% 51.17/18.26  																	|
% 51.17/18.26  																	| Instantiating formula (31) with all_285_7_623, all_827_0_960, all_829_1_964 and discharging atoms intruder_message(all_285_7_623) = all_829_1_964, intruder_message(all_285_7_623) = all_827_0_960, yields:
% 51.17/18.26  																	| (1382) all_829_1_964 = all_827_0_960
% 51.17/18.26  																	|
% 51.17/18.26  																	| Instantiating formula (31) with all_285_7_623, all_825_1_958, all_827_0_960 and discharging atoms intruder_message(all_285_7_623) = all_827_0_960, intruder_message(all_285_7_623) = all_825_1_958, yields:
% 51.17/18.26  																	| (1383) all_827_0_960 = all_825_1_958
% 51.17/18.26  																	|
% 51.17/18.26  																	| Instantiating formula (31) with all_285_7_623, all_823_0_954, all_829_1_964 and discharging atoms intruder_message(all_285_7_623) = all_829_1_964, intruder_message(all_285_7_623) = all_823_0_954, yields:
% 51.17/18.26  																	| (1384) all_829_1_964 = all_823_0_954
% 51.17/18.26  																	|
% 51.17/18.26  																	| Instantiating formula (31) with all_63_4_187, all_829_2_965, 0 and discharging atoms intruder_message(all_63_4_187) = all_829_2_965, intruder_message(all_63_4_187) = 0, yields:
% 51.17/18.26  																	| (1385) all_829_2_965 = 0
% 51.17/18.26  																	|
% 51.17/18.26  																	| Instantiating formula (31) with all_63_4_187, all_827_1_961, all_829_2_965 and discharging atoms intruder_message(all_63_4_187) = all_829_2_965, intruder_message(all_63_4_187) = all_827_1_961, yields:
% 51.17/18.26  																	| (1386) all_829_2_965 = all_827_1_961
% 51.17/18.26  																	|
% 51.17/18.26  																	| Instantiating formula (31) with all_61_4_176, all_825_2_959, 0 and discharging atoms intruder_message(all_61_4_176) = all_825_2_959, intruder_message(all_61_4_176) = 0, yields:
% 51.17/18.26  																	| (1387) all_825_2_959 = 0
% 51.17/18.26  																	|
% 51.17/18.26  																	| Instantiating formula (31) with all_61_4_176, all_823_1_955, all_825_2_959 and discharging atoms intruder_message(all_61_4_176) = all_825_2_959, intruder_message(all_61_4_176) = all_823_1_955, yields:
% 51.17/18.26  																	| (1388) all_825_2_959 = all_823_1_955
% 51.17/18.26  																	|
% 51.17/18.26  																	| Instantiating formula (31) with all_13_7_53, all_813_2_932, all_135_1_334 and discharging atoms intruder_message(all_13_7_53) = all_813_2_932, intruder_message(all_13_7_53) = all_135_1_334, yields:
% 51.17/18.26  																	| (1389) all_813_2_932 = all_135_1_334
% 51.17/18.26  																	|
% 51.17/18.26  																	| Instantiating formula (31) with an_a_nonce, all_755_2_820, 0 and discharging atoms intruder_message(an_a_nonce) = all_755_2_820, intruder_message(an_a_nonce) = 0, yields:
% 51.17/18.26  																	| (1390) all_755_2_820 = 0
% 51.17/18.26  																	|
% 51.17/18.26  																	| Instantiating formula (31) with an_a_nonce, all_753_2_817, all_755_2_820 and discharging atoms intruder_message(an_a_nonce) = all_755_2_820, intruder_message(an_a_nonce) = all_753_2_817, yields:
% 51.17/18.26  																	| (1391) all_755_2_820 = all_753_2_817
% 51.17/18.26  																	|
% 51.17/18.26  																	| Instantiating formula (31) with b, all_809_3_918, 0 and discharging atoms intruder_message(b) = all_809_3_918, intruder_message(b) = 0, yields:
% 51.17/18.26  																	| (1392) all_809_3_918 = 0
% 51.17/18.26  																	|
% 51.17/18.26  																	| Instantiating formula (31) with b, all_807_2_913, all_809_3_918 and discharging atoms intruder_message(b) = all_809_3_918, intruder_message(b) = all_807_2_913, yields:
% 51.17/18.26  																	| (1393) all_809_3_918 = all_807_2_913
% 51.17/18.26  																	|
% 51.17/18.26  																	| Instantiating formula (26) with all_375_1_791, all_759_0_824, all_375_0_790 and discharging atoms b_holds(all_375_1_791) = all_759_0_824, b_holds(all_375_1_791) = all_375_0_790, yields:
% 51.17/18.26  																	| (1394) all_759_0_824 = all_375_0_790
% 51.17/18.26  																	|
% 51.17/18.26  																	| Instantiating formula (18) with all_285_7_623, all_835_6_978, all_837_6_989 and discharging atoms generate_expiration_time(all_285_7_623) = all_837_6_989, generate_expiration_time(all_285_7_623) = all_835_6_978, yields:
% 51.17/18.26  																	| (1395) all_837_6_989 = all_835_6_978
% 51.17/18.26  																	|
% 51.17/18.26  																	| Instantiating formula (15) with all_375_5_795, all_779_1_871, all_375_4_794 and discharging atoms message(all_375_5_795) = all_779_1_871, message(all_375_5_795) = all_375_4_794, yields:
% 51.17/18.26  																	| (1396) all_779_1_871 = all_375_4_794
% 51.17/18.26  																	|
% 51.17/18.26  																	| Instantiating formula (15) with all_375_5_795, all_763_0_830, all_779_1_871 and discharging atoms message(all_375_5_795) = all_779_1_871, message(all_375_5_795) = all_763_0_830, yields:
% 51.17/18.26  																	| (1397) all_779_1_871 = all_763_0_830
% 51.17/18.26  																	|
% 51.17/18.26  																	| Instantiating formula (55) with an_a_nonce, b, all_759_2_826, all_285_1_617 and discharging atoms key(an_a_nonce, b) = all_759_2_826, key(an_a_nonce, b) = all_285_1_617, yields:
% 51.17/18.26  																	| (1398) all_759_2_826 = all_285_1_617
% 51.17/18.26  																	|
% 51.17/18.26  																	| Instantiating formula (55) with an_a_nonce, a, all_757_1_822, all_375_1_791 and discharging atoms key(an_a_nonce, a) = all_757_1_822, key(an_a_nonce, a) = all_375_1_791, yields:
% 51.17/18.26  																	| (1399) all_757_1_822 = all_375_1_791
% 51.17/18.26  																	|
% 51.17/18.26  																	| Combining equations (1382,1384) yields a new equation:
% 51.17/18.26  																	| (1400) all_827_0_960 = all_823_0_954
% 51.17/18.26  																	|
% 51.17/18.26  																	| Simplifying 1400 yields:
% 51.17/18.26  																	| (1401) all_827_0_960 = all_823_0_954
% 51.17/18.26  																	|
% 51.17/18.26  																	| Combining equations (1385,1386) yields a new equation:
% 51.17/18.26  																	| (1402) all_827_1_961 = 0
% 51.17/18.26  																	|
% 51.17/18.26  																	| Combining equations (1383,1401) yields a new equation:
% 51.17/18.26  																	| (1403) all_825_1_958 = all_823_0_954
% 51.17/18.26  																	|
% 51.17/18.26  																	| Simplifying 1403 yields:
% 51.17/18.26  																	| (1404) all_825_1_958 = all_823_0_954
% 51.17/18.26  																	|
% 51.17/18.26  																	| Combining equations (1388,1387) yields a new equation:
% 51.17/18.26  																	| (1405) all_823_1_955 = 0
% 51.17/18.26  																	|
% 51.17/18.26  																	| Simplifying 1405 yields:
% 51.17/18.26  																	| (1406) all_823_1_955 = 0
% 51.17/18.26  																	|
% 51.17/18.26  																	| Combining equations (1370,1374) yields a new equation:
% 51.17/18.26  																	| (1407) all_793_1_891 = all_783_1_877
% 51.17/18.26  																	|
% 51.17/18.26  																	| Simplifying 1407 yields:
% 51.17/18.26  																	| (1408) all_793_1_891 = all_783_1_877
% 51.17/18.26  																	|
% 51.17/18.26  																	| Combining equations (1372,1374) yields a new equation:
% 51.17/18.26  																	| (1409) all_793_2_892 = all_783_1_877
% 51.17/18.26  																	|
% 51.17/18.26  																	| Simplifying 1409 yields:
% 51.17/18.26  																	| (1410) all_793_2_892 = all_783_1_877
% 51.17/18.26  																	|
% 51.17/18.26  																	| Combining equations (1376,1374) yields a new equation:
% 51.17/18.26  																	| (1411) all_783_1_877 = all_763_1_831
% 51.17/18.26  																	|
% 51.17/18.26  																	| Combining equations (1392,1393) yields a new equation:
% 51.17/18.26  																	| (1412) all_807_2_913 = 0
% 51.17/18.26  																	|
% 51.17/18.26  																	| Combining equations (1371,1369) yields a new equation:
% 51.17/18.26  																	| (1413) all_793_1_891 = 0
% 51.17/18.26  																	|
% 51.17/18.26  																	| Simplifying 1413 yields:
% 51.17/18.26  																	| (1414) all_793_1_891 = 0
% 51.17/18.26  																	|
% 51.17/18.26  																	| Combining equations (1408,1414) yields a new equation:
% 51.17/18.26  																	| (1415) all_783_1_877 = 0
% 51.17/18.26  																	|
% 51.17/18.26  																	| Simplifying 1415 yields:
% 51.17/18.26  																	| (1416) all_783_1_877 = 0
% 51.17/18.26  																	|
% 51.17/18.26  																	| Combining equations (1410,1373) yields a new equation:
% 51.17/18.26  																	| (1417) all_789_2_886 = all_783_1_877
% 51.17/18.26  																	|
% 51.17/18.26  																	| Combining equations (1375,1373) yields a new equation:
% 51.17/18.26  																	| (1418) all_789_2_886 = all_781_1_873
% 51.17/18.26  																	|
% 51.17/18.26  																	| Combining equations (1417,1418) yields a new equation:
% 51.17/18.26  																	| (1419) all_783_1_877 = all_781_1_873
% 51.17/18.26  																	|
% 51.17/18.26  																	| Simplifying 1419 yields:
% 51.17/18.26  																	| (1420) all_783_1_877 = all_781_1_873
% 51.17/18.26  																	|
% 51.17/18.26  																	| Combining equations (1411,1420) yields a new equation:
% 51.17/18.26  																	| (1421) all_781_1_873 = all_763_1_831
% 51.17/18.26  																	|
% 51.17/18.26  																	| Combining equations (1416,1420) yields a new equation:
% 51.17/18.26  																	| (1422) all_781_1_873 = 0
% 51.17/18.26  																	|
% 51.17/18.26  																	| Combining equations (1421,1422) yields a new equation:
% 51.17/18.26  																	| (1423) all_763_1_831 = 0
% 51.17/18.26  																	|
% 51.17/18.26  																	| Simplifying 1423 yields:
% 51.17/18.26  																	| (1424) all_763_1_831 = 0
% 51.17/18.26  																	|
% 51.17/18.26  																	| Combining equations (1397,1396) yields a new equation:
% 51.17/18.26  																	| (1425) all_763_0_830 = all_375_4_794
% 51.17/18.26  																	|
% 51.17/18.26  																	| Simplifying 1425 yields:
% 51.17/18.26  																	| (1426) all_763_0_830 = all_375_4_794
% 51.17/18.26  																	|
% 51.17/18.26  																	| Combining equations (1377,1424) yields a new equation:
% 51.17/18.26  																	| (1427) all_755_1_819 = 0
% 51.17/18.26  																	|
% 51.17/18.26  																	| Simplifying 1427 yields:
% 51.17/18.26  																	| (1428) all_755_1_819 = 0
% 51.17/18.26  																	|
% 51.17/18.26  																	| Combining equations (1379,1378) yields a new equation:
% 51.17/18.26  																	| (1429) all_753_1_816 = 0
% 51.17/18.26  																	|
% 51.17/18.26  																	| Simplifying 1429 yields:
% 51.17/18.26  																	| (1430) all_753_1_816 = 0
% 51.17/18.26  																	|
% 51.17/18.26  																	| Combining equations (1390,1391) yields a new equation:
% 51.17/18.26  																	| (1431) all_753_2_817 = 0
% 51.17/18.26  																	|
% 51.17/18.26  																	| Combining equations (1431,1391) yields a new equation:
% 51.17/18.26  																	| (1390) all_755_2_820 = 0
% 51.17/18.26  																	|
% 51.17/18.26  																	| From (1398) and (1250) follows:
% 51.17/18.26  																	| (1433) intruder_holds(all_285_1_617) = all_759_1_825
% 51.17/18.26  																	|
% 51.17/18.26  																	| From (1368) and (1245) follows:
% 51.17/18.26  																	| (1240) intruder_holds(all_285_1_617) = all_755_0_818
% 51.17/18.26  																	|
% 51.17/18.26  																	| From (1428) and (1241) follows:
% 51.17/18.26  																	| (10) party_of_protocol(b) = 0
% 51.17/18.26  																	|
% 51.17/18.26  																	| From (1430) and (1236) follows:
% 51.17/18.26  																	| (43) party_of_protocol(a) = 0
% 51.17/18.26  																	|
% 51.17/18.26  																	| From (1380) and (1277) follows:
% 51.17/18.26  																	| (34) party_of_protocol(t) = 0
% 51.17/18.26  																	|
% 51.17/18.26  																	| From (1404) and (1324) follows:
% 51.17/18.26  																	| (1319) intruder_message(all_285_7_623) = all_823_0_954
% 51.17/18.26  																	|
% 51.17/18.26  																	| From (1402) and (1330) follows:
% 51.17/18.26  																	| (1197) intruder_message(all_63_4_187) = 0
% 51.17/18.26  																	|
% 51.17/18.26  																	| From (1406) and (1320) follows:
% 51.17/18.26  																	| (1145) intruder_message(all_61_4_176) = 0
% 51.17/18.26  																	|
% 51.17/18.26  																	| From (1389) and (1309) follows:
% 51.17/18.26  																	| (375) intruder_message(all_13_7_53) = all_135_1_334
% 51.17/18.26  																	|
% 51.17/18.26  																	| From (1431) and (1237) follows:
% 51.17/18.26  																	| (566) intruder_message(an_a_nonce) = 0
% 51.17/18.26  																	|
% 51.17/18.26  																	| From (1412) and (1298) follows:
% 51.17/18.26  																	| (1147) intruder_message(b) = 0
% 51.17/18.26  																	|
% 51.17/18.26  																	| From (1399) and (1246) follows:
% 51.17/18.26  																	| (1444) b_holds(all_375_1_791) = all_757_0_821
% 51.17/18.26  																	|
% 51.17/18.26  																	| From (1394) and (1251) follows:
% 51.17/18.26  																	| (918) b_holds(all_375_1_791) = all_375_0_790
% 51.17/18.26  																	|
% 51.17/18.26  																	| From (1395) and (1361) follows:
% 51.17/18.26  																	| (1446) triple(all_63_4_187, all_285_7_623, all_835_6_978) = all_837_5_988
% 51.17/18.26  																	|
% 51.17/18.26  																	| From (1398) and (1252) follows:
% 51.17/18.26  																	| (716) key(an_a_nonce, b) = all_285_1_617
% 51.17/18.26  																	|
% 51.17/18.26  																	| From (1399) and (1247) follows:
% 51.17/18.26  																	| (917) key(an_a_nonce, a) = all_375_1_791
% 51.17/18.26  																	|
% 51.17/18.26  																	+-Applying beta-rule and splitting (1243), into two cases.
% 51.17/18.26  																	|-Branch one:
% 51.17/18.26  																	| (1449)  ~ (all_755_1_819 = 0)
% 51.17/18.26  																	|
% 51.17/18.26  																		| Equations (1428) can reduce 1449 to:
% 51.17/18.26  																		| (551) $false
% 51.17/18.26  																		|
% 51.17/18.26  																		|-The branch is then unsatisfiable
% 51.17/18.26  																	|-Branch two:
% 51.17/18.26  																	| (1428) all_755_1_819 = 0
% 51.17/18.26  																	| (1452)  ~ (all_755_2_820 = 0) | all_755_0_818 = 0
% 51.17/18.26  																	|
% 51.17/18.26  																		+-Applying beta-rule and splitting (1238), into two cases.
% 51.17/18.26  																		|-Branch one:
% 51.17/18.26  																		| (1453)  ~ (all_753_1_816 = 0)
% 51.17/18.26  																		|
% 51.17/18.26  																			| Equations (1430) can reduce 1453 to:
% 51.17/18.26  																			| (551) $false
% 51.17/18.26  																			|
% 51.17/18.26  																			|-The branch is then unsatisfiable
% 51.17/18.26  																		|-Branch two:
% 51.17/18.26  																		| (1430) all_753_1_816 = 0
% 51.17/18.26  																		| (1456)  ~ (all_753_2_817 = 0) | all_753_0_815 = 0
% 51.17/18.27  																		|
% 51.17/18.27  																			+-Applying beta-rule and splitting (1456), into two cases.
% 51.17/18.27  																			|-Branch one:
% 51.17/18.27  																			| (1457)  ~ (all_753_2_817 = 0)
% 51.17/18.27  																			|
% 51.17/18.27  																				| Equations (1431) can reduce 1457 to:
% 51.17/18.27  																				| (551) $false
% 51.17/18.27  																				|
% 51.17/18.27  																				|-The branch is then unsatisfiable
% 51.17/18.27  																			|-Branch two:
% 51.17/18.27  																			| (1431) all_753_2_817 = 0
% 51.17/18.27  																			| (1460) all_753_0_815 = 0
% 51.17/18.27  																			|
% 51.17/18.27  																				| From (1460) and (1235) follows:
% 51.17/18.27  																				| (1461) intruder_holds(all_375_1_791) = 0
% 51.17/18.27  																				|
% 51.17/18.27  																				+-Applying beta-rule and splitting (1452), into two cases.
% 51.17/18.27  																				|-Branch one:
% 51.17/18.27  																				| (1462)  ~ (all_755_2_820 = 0)
% 51.17/18.27  																				|
% 51.17/18.27  																					| Equations (1390) can reduce 1462 to:
% 51.17/18.27  																					| (551) $false
% 51.17/18.27  																					|
% 51.17/18.27  																					|-The branch is then unsatisfiable
% 51.17/18.27  																				|-Branch two:
% 51.17/18.27  																				| (1390) all_755_2_820 = 0
% 51.17/18.27  																				| (1465) all_755_0_818 = 0
% 51.17/18.27  																				|
% 51.17/18.27  																					| Combining equations (1465,1368) yields a new equation:
% 51.17/18.27  																					| (1466) all_757_2_823 = 0
% 51.17/18.27  																					|
% 51.17/18.27  																					| From (1465) and (1240) follows:
% 51.17/18.27  																					| (1467) intruder_holds(all_285_1_617) = 0
% 51.17/18.27  																					|
% 51.17/18.27  																					+-Applying beta-rule and splitting (1248), into two cases.
% 51.17/18.27  																					|-Branch one:
% 51.17/18.27  																					| (1468)  ~ (all_757_0_821 = 0)
% 51.17/18.27  																					|
% 51.17/18.27  																						| Instantiating formula (37) with all_285_1_617, 0, all_759_1_825 and discharging atoms intruder_holds(all_285_1_617) = all_759_1_825, intruder_holds(all_285_1_617) = 0, yields:
% 51.17/18.27  																						| (1469) all_759_1_825 = 0
% 51.17/18.27  																						|
% 51.17/18.27  																						| Instantiating formula (26) with all_375_1_791, all_757_0_821, all_375_0_790 and discharging atoms b_holds(all_375_1_791) = all_757_0_821, b_holds(all_375_1_791) = all_375_0_790, yields:
% 51.17/18.27  																						| (1470) all_757_0_821 = all_375_0_790
% 51.17/18.27  																						|
% 51.17/18.27  																						| Equations (1470) can reduce 1468 to:
% 51.17/18.27  																						| (1471)  ~ (all_375_0_790 = 0)
% 51.17/18.27  																						|
% 51.17/18.27  																						| From (1469) and (1433) follows:
% 51.17/18.27  																						| (1467) intruder_holds(all_285_1_617) = 0
% 51.17/18.27  																						|
% 51.17/18.27  																						+-Applying beta-rule and splitting (916), into two cases.
% 51.17/18.27  																						|-Branch one:
% 51.17/18.27  																						| (1473)  ~ (all_375_2_792 = 0)
% 51.17/18.27  																						|
% 51.17/18.27  																							| Equations (1198) can reduce 1473 to:
% 51.17/18.27  																							| (551) $false
% 51.17/18.27  																							|
% 51.17/18.27  																							|-The branch is then unsatisfiable
% 51.17/18.27  																						|-Branch two:
% 51.17/18.27  																						| (1198) all_375_2_792 = 0
% 51.17/18.27  																						| (1476)  ~ (all_375_4_794 = 0) | all_375_0_790 = 0
% 51.17/18.27  																						|
% 51.17/18.27  																							+-Applying beta-rule and splitting (1476), into two cases.
% 51.17/18.27  																							|-Branch one:
% 51.17/18.27  																							| (1477)  ~ (all_375_4_794 = 0)
% 51.17/18.27  																							|
% 51.17/18.27  																								+-Applying beta-rule and splitting (1258), into two cases.
% 51.17/18.27  																								|-Branch one:
% 51.17/18.27  																								| (1478)  ~ (all_763_1_831 = 0)
% 51.17/18.27  																								|
% 51.17/18.27  																									| Equations (1424) can reduce 1478 to:
% 51.17/18.27  																									| (551) $false
% 51.17/18.27  																									|
% 51.17/18.27  																									|-The branch is then unsatisfiable
% 51.17/18.27  																								|-Branch two:
% 51.17/18.27  																								| (1424) all_763_1_831 = 0
% 51.17/18.27  																								| (1481)  ~ (all_763_2_832 = 0) |  ~ (all_763_3_833 = 0) | all_763_0_830 = 0
% 51.17/18.27  																								|
% 51.17/18.27  																									+-Applying beta-rule and splitting (1481), into two cases.
% 51.17/18.27  																									|-Branch one:
% 51.17/18.27  																									| (1482)  ~ (all_763_2_832 = 0)
% 51.17/18.27  																									|
% 51.17/18.27  																										| Equations (1378) can reduce 1482 to:
% 51.17/18.27  																										| (551) $false
% 51.17/18.27  																										|
% 51.17/18.27  																										|-The branch is then unsatisfiable
% 51.17/18.27  																									|-Branch two:
% 51.17/18.27  																									| (1378) all_763_2_832 = 0
% 51.17/18.27  																									| (1485)  ~ (all_763_3_833 = 0) | all_763_0_830 = 0
% 51.17/18.27  																									|
% 51.17/18.27  																										+-Applying beta-rule and splitting (1485), into two cases.
% 51.17/18.27  																										|-Branch one:
% 51.17/18.27  																										| (1486)  ~ (all_763_3_833 = 0)
% 51.17/18.27  																										|
% 51.17/18.27  																											+-Applying beta-rule and splitting (1326), into two cases.
% 51.17/18.27  																											|-Branch one:
% 51.17/18.27  																											| (1487)  ~ (all_825_1_958 = 0)
% 51.17/18.27  																											|
% 51.17/18.27  																												| Equations (1404) can reduce 1487 to:
% 51.17/18.27  																												| (1488)  ~ (all_823_0_954 = 0)
% 51.17/18.27  																												|
% 51.17/18.27  																												+-Applying beta-rule and splitting (377), into two cases.
% 51.17/18.27  																												|-Branch one:
% 51.17/18.27  																												| (1489)  ~ (all_135_1_334 = 0)
% 51.17/18.27  																												|
% 51.17/18.27  																													+-Applying beta-rule and splitting (583), into two cases.
% 51.17/18.27  																													|-Branch one:
% 51.17/18.27  																													| (1490) all_135_1_334 = 0
% 51.17/18.27  																													|
% 51.17/18.27  																														| Equations (1490) can reduce 1489 to:
% 51.17/18.27  																														| (551) $false
% 51.17/18.27  																														|
% 51.17/18.27  																														|-The branch is then unsatisfiable
% 51.17/18.27  																													|-Branch two:
% 51.17/18.27  																													| (1489)  ~ (all_135_1_334 = 0)
% 51.17/18.27  																													| (1493)  ? [v0] :  ? [v1] :  ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_13_8_54) = v0 & key(all_13_14_60, a) = v1 & ( ~ (v2 = 0) |  ~ (v0 = 0)))
% 51.17/18.27  																													|
% 51.17/18.27  																														| Instantiating (1493) with all_952_0_1011, all_952_1_1012, all_952_2_1013 yields:
% 51.17/18.27  																														| (1494) intruder_holds(all_952_1_1012) = all_952_0_1011 & intruder_message(all_13_8_54) = all_952_2_1013 & key(all_13_14_60, a) = all_952_1_1012 & ( ~ (all_952_0_1011 = 0) |  ~ (all_952_2_1013 = 0))
% 51.17/18.27  																														|
% 51.17/18.27  																														| Applying alpha-rule on (1494) yields:
% 51.17/18.27  																														| (1495) intruder_holds(all_952_1_1012) = all_952_0_1011
% 51.17/18.27  																														| (1496) intruder_message(all_13_8_54) = all_952_2_1013
% 51.17/18.27  																														| (1497) key(all_13_14_60, a) = all_952_1_1012
% 51.17/18.27  																														| (1498)  ~ (all_952_0_1011 = 0) |  ~ (all_952_2_1013 = 0)
% 51.17/18.27  																														|
% 51.17/18.27  																														| Instantiating formula (63) with all_375_1_791, a, an_a_nonce, all_63_3_186 and discharging atoms intruder_holds(all_375_1_791) = 0, intruder_message(all_63_3_186) = 0, key(an_a_nonce, a) = all_375_1_791, yields:
% 51.17/18.27  																														| (1499)  ? [v0] :  ? [v1] :  ? [v2] : (party_of_protocol(a) = v0 & intruder_message(v1) = v2 & encrypt(all_63_3_186, an_a_nonce) = v1 & ( ~ (v0 = 0) | v2 = 0))
% 51.17/18.27  																														|
% 51.17/18.27  																														| Instantiating formula (63) with all_375_1_791, a, an_a_nonce, all_63_4_187 and discharging atoms intruder_holds(all_375_1_791) = 0, intruder_message(all_63_4_187) = 0, key(an_a_nonce, a) = all_375_1_791, yields:
% 51.17/18.27  																														| (1500)  ? [v0] :  ? [v1] :  ? [v2] : (party_of_protocol(a) = v0 & intruder_message(v1) = v2 & encrypt(all_63_4_187, an_a_nonce) = v1 & ( ~ (v0 = 0) | v2 = 0))
% 51.17/18.27  																														|
% 51.17/18.27  																														| Instantiating formula (63) with all_375_1_791, a, an_a_nonce, all_61_3_175 and discharging atoms intruder_holds(all_375_1_791) = 0, intruder_message(all_61_3_175) = 0, key(an_a_nonce, a) = all_375_1_791, yields:
% 51.17/18.27  																														| (1501)  ? [v0] :  ? [v1] :  ? [v2] : (party_of_protocol(a) = v0 & intruder_message(v1) = v2 & encrypt(all_61_3_175, an_a_nonce) = v1 & ( ~ (v0 = 0) | v2 = 0))
% 51.17/18.27  																														|
% 51.17/18.27  																														| Instantiating formula (63) with all_375_1_791, a, an_a_nonce, all_61_4_176 and discharging atoms intruder_holds(all_375_1_791) = 0, intruder_message(all_61_4_176) = 0, key(an_a_nonce, a) = all_375_1_791, yields:
% 51.17/18.27  																														| (1502)  ? [v0] :  ? [v1] :  ? [v2] : (party_of_protocol(a) = v0 & intruder_message(v1) = v2 & encrypt(all_61_4_176, an_a_nonce) = v1 & ( ~ (v0 = 0) | v2 = 0))
% 51.17/18.27  																														|
% 51.17/18.27  																														| Instantiating formula (63) with all_375_1_791, a, an_a_nonce, all_61_7_179 and discharging atoms intruder_holds(all_375_1_791) = 0, intruder_message(all_61_7_179) = 0, key(an_a_nonce, a) = all_375_1_791, yields:
% 51.17/18.27  																														| (1503)  ? [v0] :  ? [v1] :  ? [v2] : (party_of_protocol(a) = v0 & intruder_message(v1) = v2 & encrypt(all_61_7_179, an_a_nonce) = v1 & ( ~ (v0 = 0) | v2 = 0))
% 51.17/18.27  																														|
% 51.17/18.27  																														| Instantiating formula (63) with all_375_1_791, a, an_a_nonce, all_19_5_94 and discharging atoms intruder_holds(all_375_1_791) = 0, intruder_message(all_19_5_94) = 0, key(an_a_nonce, a) = all_375_1_791, yields:
% 51.17/18.27  																														| (1504)  ? [v0] :  ? [v1] :  ? [v2] : (party_of_protocol(a) = v0 & intruder_message(v1) = v2 & encrypt(all_19_5_94, an_a_nonce) = v1 & ( ~ (v0 = 0) | v2 = 0))
% 51.17/18.27  																														|
% 51.17/18.27  																														| Instantiating formula (63) with all_375_1_791, a, an_a_nonce, all_17_1_81 and discharging atoms intruder_holds(all_375_1_791) = 0, intruder_message(all_17_1_81) = 0, key(an_a_nonce, a) = all_375_1_791, yields:
% 51.17/18.27  																														| (1505)  ? [v0] :  ? [v1] :  ? [v2] : (party_of_protocol(a) = v0 & intruder_message(v1) = v2 & encrypt(all_17_1_81, an_a_nonce) = v1 & ( ~ (v0 = 0) | v2 = 0))
% 51.17/18.27  																														|
% 51.17/18.27  																														| Instantiating formula (63) with all_375_1_791, a, an_a_nonce, all_0_2_2 and discharging atoms intruder_holds(all_375_1_791) = 0, intruder_message(all_0_2_2) = 0, key(an_a_nonce, a) = all_375_1_791, yields:
% 51.17/18.27  																														| (1506)  ? [v0] :  ? [v1] :  ? [v2] : (party_of_protocol(a) = v0 & intruder_message(v1) = v2 & encrypt(all_0_2_2, an_a_nonce) = v1 & ( ~ (v0 = 0) | v2 = 0))
% 51.17/18.27  																														|
% 51.17/18.27  																														| Instantiating formula (63) with all_375_1_791, a, an_a_nonce, all_0_3_3 and discharging atoms intruder_holds(all_375_1_791) = 0, intruder_message(all_0_3_3) = 0, key(an_a_nonce, a) = all_375_1_791, yields:
% 51.17/18.27  																														| (1507)  ? [v0] :  ? [v1] :  ? [v2] : (party_of_protocol(a) = v0 & intruder_message(v1) = v2 & encrypt(all_0_3_3, an_a_nonce) = v1 & ( ~ (v0 = 0) | v2 = 0))
% 51.17/18.27  																														|
% 51.17/18.27  																														| Instantiating formula (63) with all_375_1_791, a, an_a_nonce, an_a_nonce and discharging atoms intruder_holds(all_375_1_791) = 0, intruder_message(an_a_nonce) = 0, key(an_a_nonce, a) = all_375_1_791, yields:
% 51.17/18.27  																														| (1508)  ? [v0] :  ? [v1] :  ? [v2] : (party_of_protocol(a) = v0 & intruder_message(v1) = v2 & encrypt(an_a_nonce, an_a_nonce) = v1 & ( ~ (v0 = 0) | v2 = 0))
% 51.17/18.27  																														|
% 51.17/18.27  																														| Instantiating formula (63) with all_375_1_791, a, an_a_nonce, b and discharging atoms intruder_holds(all_375_1_791) = 0, intruder_message(b) = 0, key(an_a_nonce, a) = all_375_1_791, yields:
% 51.17/18.27  																														| (1509)  ? [v0] :  ? [v1] :  ? [v2] : (party_of_protocol(a) = v0 & intruder_message(v1) = v2 & encrypt(b, an_a_nonce) = v1 & ( ~ (v0 = 0) | v2 = 0))
% 51.17/18.27  																														|
% 51.17/18.27  																														| Instantiating formula (63) with all_375_1_791, a, an_a_nonce, a and discharging atoms intruder_holds(all_375_1_791) = 0, intruder_message(a) = 0, key(an_a_nonce, a) = all_375_1_791, yields:
% 51.17/18.27  																														| (1510)  ? [v0] :  ? [v1] :  ? [v2] : (party_of_protocol(a) = v0 & intruder_message(v1) = v2 & encrypt(a, an_a_nonce) = v1 & ( ~ (v0 = 0) | v2 = 0))
% 51.17/18.27  																														|
% 51.17/18.27  																														| Instantiating formula (63) with all_285_1_617, b, an_a_nonce, all_61_7_179 and discharging atoms intruder_holds(all_285_1_617) = 0, intruder_message(all_61_7_179) = 0, key(an_a_nonce, b) = all_285_1_617, yields:
% 51.17/18.27  																														| (1511)  ? [v0] :  ? [v1] :  ? [v2] : (party_of_protocol(b) = v0 & intruder_message(v1) = v2 & encrypt(all_61_7_179, an_a_nonce) = v1 & ( ~ (v0 = 0) | v2 = 0))
% 51.17/18.27  																														|
% 51.17/18.27  																														| Instantiating formula (45) with all_823_0_954, all_285_7_623, all_375_1_791, a, an_a_nonce, all_61_7_179 and discharging atoms intruder_holds(all_375_1_791) = 0, intruder_message(all_285_7_623) = all_823_0_954, encrypt(all_61_7_179, an_a_nonce) = all_285_7_623, key(an_a_nonce, a) = all_375_1_791, yields:
% 51.17/18.27  																														| (1512) all_823_0_954 = 0 |  ? [v0] :  ? [v1] : (party_of_protocol(a) = v1 & intruder_message(all_61_7_179) = v0 & ( ~ (v1 = 0) |  ~ (v0 = 0)))
% 51.17/18.27  																														|
% 51.17/18.27  																														| Instantiating formula (45) with all_823_0_954, all_285_7_623, all_285_1_617, b, an_a_nonce, all_61_7_179 and discharging atoms intruder_holds(all_285_1_617) = 0, intruder_message(all_285_7_623) = all_823_0_954, encrypt(all_61_7_179, an_a_nonce) = all_285_7_623, key(an_a_nonce, b) = all_285_1_617, yields:
% 51.17/18.27  																														| (1513) all_823_0_954 = 0 |  ? [v0] :  ? [v1] : (party_of_protocol(b) = v1 & intruder_message(all_61_7_179) = v0 & ( ~ (v1 = 0) |  ~ (v0 = 0)))
% 51.17/18.27  																														|
% 51.17/18.27  																														| Instantiating formula (7) with all_823_0_954, all_285_7_623, b, an_a_nonce, all_61_7_179 and discharging atoms party_of_protocol(b) = 0, intruder_message(all_285_7_623) = all_823_0_954, encrypt(all_61_7_179, an_a_nonce) = all_285_7_623, yields:
% 51.17/18.27  																														| (1514) all_823_0_954 = 0 |  ? [v0] :  ? [v1] :  ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_61_7_179) = v0 & key(an_a_nonce, b) = v1 & ( ~ (v2 = 0) |  ~ (v0 = 0)))
% 51.17/18.27  																														|
% 51.17/18.27  																														| Instantiating formula (7) with all_823_0_954, all_285_7_623, a, an_a_nonce, all_61_7_179 and discharging atoms party_of_protocol(a) = 0, intruder_message(all_285_7_623) = all_823_0_954, encrypt(all_61_7_179, an_a_nonce) = all_285_7_623, yields:
% 51.17/18.28  																														| (1515) all_823_0_954 = 0 |  ? [v0] :  ? [v1] :  ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_61_7_179) = v0 & key(an_a_nonce, a) = v1 & ( ~ (v2 = 0) |  ~ (v0 = 0)))
% 51.17/18.28  																														|
% 51.17/18.28  																														| Instantiating formula (7) with all_823_0_954, all_285_7_623, t, an_a_nonce, all_61_7_179 and discharging atoms party_of_protocol(t) = 0, intruder_message(all_285_7_623) = all_823_0_954, encrypt(all_61_7_179, an_a_nonce) = all_285_7_623, yields:
% 51.17/18.28  																														| (1516) all_823_0_954 = 0 |  ? [v0] :  ? [v1] :  ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_61_7_179) = v0 & key(an_a_nonce, t) = v1 & ( ~ (v2 = 0) |  ~ (v0 = 0)))
% 51.17/18.28  																														|
% 51.17/18.28  																														| Instantiating formula (40) with all_837_5_988, all_835_6_978, all_285_7_623, all_63_4_187 and discharging atoms triple(all_63_4_187, all_285_7_623, all_835_6_978) = all_837_5_988, yields:
% 51.17/18.28  																														| (1517)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (intruder_message(all_837_5_988) = v3 & intruder_message(all_835_6_978) = v2 & intruder_message(all_285_7_623) = v1 & intruder_message(all_63_4_187) = v0 & ( ~ (v2 = 0) |  ~ (v1 = 0) |  ~ (v0 = 0) | v3 = 0))
% 51.17/18.28  																														|
% 51.17/18.28  																														| Instantiating formula (68) with all_837_5_988, all_835_6_978, all_285_7_623, all_63_4_187 and discharging atoms triple(all_63_4_187, all_285_7_623, all_835_6_978) = all_837_5_988, yields:
% 51.17/18.28  																														| (1518)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (intruder_message(all_837_5_988) = v0 & intruder_message(all_835_6_978) = v3 & intruder_message(all_285_7_623) = v2 & intruder_message(all_63_4_187) = v1 & ( ~ (v0 = 0) | (v3 = 0 & v2 = 0 & v1 = 0)))
% 51.17/18.28  																														|
% 51.17/18.28  																														| Instantiating formula (40) with all_835_5_977, all_835_6_978, all_285_7_623, all_61_4_176 and discharging atoms triple(all_61_4_176, all_285_7_623, all_835_6_978) = all_835_5_977, yields:
% 51.17/18.28  																														| (1519)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (intruder_message(all_835_5_977) = v3 & intruder_message(all_835_6_978) = v2 & intruder_message(all_285_7_623) = v1 & intruder_message(all_61_4_176) = v0 & ( ~ (v2 = 0) |  ~ (v1 = 0) |  ~ (v0 = 0) | v3 = 0))
% 51.17/18.28  																														|
% 51.17/18.28  																														| Instantiating formula (68) with all_835_5_977, all_835_6_978, all_285_7_623, all_61_4_176 and discharging atoms triple(all_61_4_176, all_285_7_623, all_835_6_978) = all_835_5_977, yields:
% 51.17/18.28  																														| (1520)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (intruder_message(all_835_5_977) = v0 & intruder_message(all_835_6_978) = v3 & intruder_message(all_285_7_623) = v2 & intruder_message(all_61_4_176) = v1 & ( ~ (v0 = 0) | (v3 = 0 & v2 = 0 & v1 = 0)))
% 51.17/18.28  																														|
% 51.17/18.28  																														| Instantiating formula (57) with all_745_2_805, a, all_19_7_96 and discharging atoms key(all_19_7_96, a) = all_745_2_805, yields:
% 51.17/18.28  																														| (1521)  ? [v0] :  ? [v1] :  ? [v2] : (intruder_holds(all_745_2_805) = v2 & party_of_protocol(a) = v1 & intruder_message(all_19_7_96) = v0 & ( ~ (v1 = 0) |  ~ (v0 = 0) | v2 = 0))
% 51.17/18.28  																														|
% 51.17/18.28  																														| Instantiating formula (57) with all_833_2_971, a, all_17_7_87 and discharging atoms key(all_17_7_87, a) = all_833_2_971, yields:
% 51.17/18.28  																														| (1522)  ? [v0] :  ? [v1] :  ? [v2] : (intruder_holds(all_833_2_971) = v2 & party_of_protocol(a) = v1 & intruder_message(all_17_7_87) = v0 & ( ~ (v1 = 0) |  ~ (v0 = 0) | v2 = 0))
% 51.17/18.28  																														|
% 51.17/18.28  																														| Instantiating formula (57) with all_952_1_1012, a, all_13_14_60 and discharging atoms key(all_13_14_60, a) = all_952_1_1012, yields:
% 51.17/18.28  																														| (1523)  ? [v0] :  ? [v1] :  ? [v2] : (intruder_holds(all_952_1_1012) = v2 & party_of_protocol(a) = v1 & intruder_message(all_13_14_60) = v0 & ( ~ (v1 = 0) |  ~ (v0 = 0) | v2 = 0))
% 51.17/18.28  																														|
% 51.17/18.28  																														| Instantiating (1510) with all_1279_0_1464, all_1279_1_1465, all_1279_2_1466 yields:
% 51.17/18.28  																														| (1524) party_of_protocol(a) = all_1279_2_1466 & intruder_message(all_1279_1_1465) = all_1279_0_1464 & encrypt(a, an_a_nonce) = all_1279_1_1465 & ( ~ (all_1279_2_1466 = 0) | all_1279_0_1464 = 0)
% 51.17/18.28  																														|
% 51.17/18.28  																														| Applying alpha-rule on (1524) yields:
% 51.17/18.28  																														| (1525) party_of_protocol(a) = all_1279_2_1466
% 51.17/18.28  																														| (1526) intruder_message(all_1279_1_1465) = all_1279_0_1464
% 51.17/18.28  																														| (1527) encrypt(a, an_a_nonce) = all_1279_1_1465
% 51.17/18.28  																														| (1528)  ~ (all_1279_2_1466 = 0) | all_1279_0_1464 = 0
% 51.17/18.28  																														|
% 51.17/18.28  																														| Instantiating (1508) with all_1281_0_1467, all_1281_1_1468, all_1281_2_1469 yields:
% 51.17/18.28  																														| (1529) party_of_protocol(a) = all_1281_2_1469 & intruder_message(all_1281_1_1468) = all_1281_0_1467 & encrypt(an_a_nonce, an_a_nonce) = all_1281_1_1468 & ( ~ (all_1281_2_1469 = 0) | all_1281_0_1467 = 0)
% 51.17/18.28  																														|
% 51.17/18.28  																														| Applying alpha-rule on (1529) yields:
% 51.17/18.28  																														| (1530) party_of_protocol(a) = all_1281_2_1469
% 51.17/18.28  																														| (1531) intruder_message(all_1281_1_1468) = all_1281_0_1467
% 51.17/18.28  																														| (1532) encrypt(an_a_nonce, an_a_nonce) = all_1281_1_1468
% 51.17/18.28  																														| (1533)  ~ (all_1281_2_1469 = 0) | all_1281_0_1467 = 0
% 51.17/18.28  																														|
% 51.17/18.28  																														| Instantiating (1507) with all_1283_0_1470, all_1283_1_1471, all_1283_2_1472 yields:
% 51.17/18.28  																														| (1534) party_of_protocol(a) = all_1283_2_1472 & intruder_message(all_1283_1_1471) = all_1283_0_1470 & encrypt(all_0_3_3, an_a_nonce) = all_1283_1_1471 & ( ~ (all_1283_2_1472 = 0) | all_1283_0_1470 = 0)
% 51.17/18.28  																														|
% 51.17/18.28  																														| Applying alpha-rule on (1534) yields:
% 51.17/18.28  																														| (1535) party_of_protocol(a) = all_1283_2_1472
% 51.17/18.28  																														| (1536) intruder_message(all_1283_1_1471) = all_1283_0_1470
% 51.17/18.28  																														| (1537) encrypt(all_0_3_3, an_a_nonce) = all_1283_1_1471
% 51.17/18.28  																														| (1538)  ~ (all_1283_2_1472 = 0) | all_1283_0_1470 = 0
% 51.17/18.28  																														|
% 51.17/18.28  																														| Instantiating (1509) with all_1285_0_1473, all_1285_1_1474, all_1285_2_1475 yields:
% 51.17/18.28  																														| (1539) party_of_protocol(a) = all_1285_2_1475 & intruder_message(all_1285_1_1474) = all_1285_0_1473 & encrypt(b, an_a_nonce) = all_1285_1_1474 & ( ~ (all_1285_2_1475 = 0) | all_1285_0_1473 = 0)
% 51.17/18.28  																														|
% 51.17/18.28  																														| Applying alpha-rule on (1539) yields:
% 51.17/18.28  																														| (1540) party_of_protocol(a) = all_1285_2_1475
% 51.17/18.28  																														| (1541) intruder_message(all_1285_1_1474) = all_1285_0_1473
% 51.17/18.28  																														| (1542) encrypt(b, an_a_nonce) = all_1285_1_1474
% 51.17/18.28  																														| (1543)  ~ (all_1285_2_1475 = 0) | all_1285_0_1473 = 0
% 51.17/18.28  																														|
% 51.17/18.28  																														| Instantiating (1523) with all_1303_0_1500, all_1303_1_1501, all_1303_2_1502 yields:
% 51.17/18.28  																														| (1544) intruder_holds(all_952_1_1012) = all_1303_0_1500 & party_of_protocol(a) = all_1303_1_1501 & intruder_message(all_13_14_60) = all_1303_2_1502 & ( ~ (all_1303_1_1501 = 0) |  ~ (all_1303_2_1502 = 0) | all_1303_0_1500 = 0)
% 51.17/18.28  																														|
% 51.17/18.28  																														| Applying alpha-rule on (1544) yields:
% 51.17/18.28  																														| (1545) intruder_holds(all_952_1_1012) = all_1303_0_1500
% 51.17/18.28  																														| (1546) party_of_protocol(a) = all_1303_1_1501
% 51.17/18.28  																														| (1547) intruder_message(all_13_14_60) = all_1303_2_1502
% 51.17/18.28  																														| (1548)  ~ (all_1303_1_1501 = 0) |  ~ (all_1303_2_1502 = 0) | all_1303_0_1500 = 0
% 51.17/18.28  																														|
% 51.17/18.28  																														| Instantiating (1519) with all_1311_0_1515, all_1311_1_1516, all_1311_2_1517, all_1311_3_1518 yields:
% 51.17/18.28  																														| (1549) intruder_message(all_835_5_977) = all_1311_0_1515 & intruder_message(all_835_6_978) = all_1311_1_1516 & intruder_message(all_285_7_623) = all_1311_2_1517 & intruder_message(all_61_4_176) = all_1311_3_1518 & ( ~ (all_1311_1_1516 = 0) |  ~ (all_1311_2_1517 = 0) |  ~ (all_1311_3_1518 = 0) | all_1311_0_1515 = 0)
% 51.17/18.28  																														|
% 51.17/18.28  																														| Applying alpha-rule on (1549) yields:
% 51.17/18.28  																														| (1550) intruder_message(all_61_4_176) = all_1311_3_1518
% 51.17/18.28  																														| (1551) intruder_message(all_835_6_978) = all_1311_1_1516
% 51.17/18.28  																														| (1552) intruder_message(all_285_7_623) = all_1311_2_1517
% 51.17/18.28  																														| (1553)  ~ (all_1311_1_1516 = 0) |  ~ (all_1311_2_1517 = 0) |  ~ (all_1311_3_1518 = 0) | all_1311_0_1515 = 0
% 51.17/18.28  																														| (1554) intruder_message(all_835_5_977) = all_1311_0_1515
% 51.17/18.28  																														|
% 51.17/18.28  																														| Instantiating (1518) with all_1325_0_1555, all_1325_1_1556, all_1325_2_1557, all_1325_3_1558 yields:
% 51.17/18.28  																														| (1555) intruder_message(all_837_5_988) = all_1325_3_1558 & intruder_message(all_835_6_978) = all_1325_0_1555 & intruder_message(all_285_7_623) = all_1325_1_1556 & intruder_message(all_63_4_187) = all_1325_2_1557 & ( ~ (all_1325_3_1558 = 0) | (all_1325_0_1555 = 0 & all_1325_1_1556 = 0 & all_1325_2_1557 = 0))
% 51.17/18.28  																														|
% 51.17/18.28  																														| Applying alpha-rule on (1555) yields:
% 51.17/18.28  																														| (1556) intruder_message(all_835_6_978) = all_1325_0_1555
% 51.17/18.28  																														| (1557) intruder_message(all_63_4_187) = all_1325_2_1557
% 51.17/18.28  																														| (1558)  ~ (all_1325_3_1558 = 0) | (all_1325_0_1555 = 0 & all_1325_1_1556 = 0 & all_1325_2_1557 = 0)
% 51.17/18.28  																														| (1559) intruder_message(all_837_5_988) = all_1325_3_1558
% 51.17/18.28  																														| (1560) intruder_message(all_285_7_623) = all_1325_1_1556
% 51.17/18.28  																														|
% 51.17/18.28  																														| Instantiating (1517) with all_1327_0_1559, all_1327_1_1560, all_1327_2_1561, all_1327_3_1562 yields:
% 51.17/18.28  																														| (1561) intruder_message(all_837_5_988) = all_1327_0_1559 & intruder_message(all_835_6_978) = all_1327_1_1560 & intruder_message(all_285_7_623) = all_1327_2_1561 & intruder_message(all_63_4_187) = all_1327_3_1562 & ( ~ (all_1327_1_1560 = 0) |  ~ (all_1327_2_1561 = 0) |  ~ (all_1327_3_1562 = 0) | all_1327_0_1559 = 0)
% 51.17/18.28  																														|
% 51.17/18.28  																														| Applying alpha-rule on (1561) yields:
% 51.17/18.28  																														| (1562) intruder_message(all_835_6_978) = all_1327_1_1560
% 51.17/18.28  																														| (1563) intruder_message(all_837_5_988) = all_1327_0_1559
% 51.17/18.28  																														| (1564) intruder_message(all_285_7_623) = all_1327_2_1561
% 51.17/18.28  																														| (1565) intruder_message(all_63_4_187) = all_1327_3_1562
% 51.17/18.28  																														| (1566)  ~ (all_1327_1_1560 = 0) |  ~ (all_1327_2_1561 = 0) |  ~ (all_1327_3_1562 = 0) | all_1327_0_1559 = 0
% 51.17/18.28  																														|
% 51.17/18.28  																														| Instantiating (1520) with all_1333_0_1583, all_1333_1_1584, all_1333_2_1585, all_1333_3_1586 yields:
% 51.17/18.28  																														| (1567) intruder_message(all_835_5_977) = all_1333_3_1586 & intruder_message(all_835_6_978) = all_1333_0_1583 & intruder_message(all_285_7_623) = all_1333_1_1584 & intruder_message(all_61_4_176) = all_1333_2_1585 & ( ~ (all_1333_3_1586 = 0) | (all_1333_0_1583 = 0 & all_1333_1_1584 = 0 & all_1333_2_1585 = 0))
% 51.17/18.28  																														|
% 51.17/18.28  																														| Applying alpha-rule on (1567) yields:
% 51.17/18.28  																														| (1568) intruder_message(all_835_5_977) = all_1333_3_1586
% 51.17/18.28  																														| (1569) intruder_message(all_835_6_978) = all_1333_0_1583
% 51.17/18.28  																														| (1570)  ~ (all_1333_3_1586 = 0) | (all_1333_0_1583 = 0 & all_1333_1_1584 = 0 & all_1333_2_1585 = 0)
% 51.17/18.28  																														| (1571) intruder_message(all_61_4_176) = all_1333_2_1585
% 51.17/18.28  																														| (1572) intruder_message(all_285_7_623) = all_1333_1_1584
% 51.17/18.28  																														|
% 51.17/18.28  																														| Instantiating (1522) with all_1337_0_1590, all_1337_1_1591, all_1337_2_1592 yields:
% 51.17/18.28  																														| (1573) intruder_holds(all_833_2_971) = all_1337_0_1590 & party_of_protocol(a) = all_1337_1_1591 & intruder_message(all_17_7_87) = all_1337_2_1592 & ( ~ (all_1337_1_1591 = 0) |  ~ (all_1337_2_1592 = 0) | all_1337_0_1590 = 0)
% 51.17/18.28  																														|
% 51.17/18.28  																														| Applying alpha-rule on (1573) yields:
% 51.17/18.28  																														| (1574) intruder_holds(all_833_2_971) = all_1337_0_1590
% 51.17/18.28  																														| (1575) party_of_protocol(a) = all_1337_1_1591
% 51.17/18.28  																														| (1576) intruder_message(all_17_7_87) = all_1337_2_1592
% 51.17/18.28  																														| (1577)  ~ (all_1337_1_1591 = 0) |  ~ (all_1337_2_1592 = 0) | all_1337_0_1590 = 0
% 51.17/18.29  																														|
% 51.17/18.29  																														| Instantiating (1521) with all_1369_0_1646, all_1369_1_1647, all_1369_2_1648 yields:
% 51.17/18.29  																														| (1578) intruder_holds(all_745_2_805) = all_1369_0_1646 & party_of_protocol(a) = all_1369_1_1647 & intruder_message(all_19_7_96) = all_1369_2_1648 & ( ~ (all_1369_1_1647 = 0) |  ~ (all_1369_2_1648 = 0) | all_1369_0_1646 = 0)
% 51.17/18.29  																														|
% 51.17/18.29  																														| Applying alpha-rule on (1578) yields:
% 51.17/18.29  																														| (1579) intruder_holds(all_745_2_805) = all_1369_0_1646
% 51.17/18.29  																														| (1580) party_of_protocol(a) = all_1369_1_1647
% 51.17/18.29  																														| (1581) intruder_message(all_19_7_96) = all_1369_2_1648
% 51.17/18.29  																														| (1582)  ~ (all_1369_1_1647 = 0) |  ~ (all_1369_2_1648 = 0) | all_1369_0_1646 = 0
% 51.17/18.29  																														|
% 51.17/18.29  																														| Instantiating (1506) with all_1423_0_1765, all_1423_1_1766, all_1423_2_1767 yields:
% 51.17/18.29  																														| (1583) party_of_protocol(a) = all_1423_2_1767 & intruder_message(all_1423_1_1766) = all_1423_0_1765 & encrypt(all_0_2_2, an_a_nonce) = all_1423_1_1766 & ( ~ (all_1423_2_1767 = 0) | all_1423_0_1765 = 0)
% 51.17/18.29  																														|
% 51.17/18.29  																														| Applying alpha-rule on (1583) yields:
% 51.17/18.29  																														| (1584) party_of_protocol(a) = all_1423_2_1767
% 51.17/18.29  																														| (1585) intruder_message(all_1423_1_1766) = all_1423_0_1765
% 51.17/18.29  																														| (1586) encrypt(all_0_2_2, an_a_nonce) = all_1423_1_1766
% 51.17/18.29  																														| (1587)  ~ (all_1423_2_1767 = 0) | all_1423_0_1765 = 0
% 51.17/18.29  																														|
% 51.17/18.29  																														| Instantiating (1505) with all_1425_0_1768, all_1425_1_1769, all_1425_2_1770 yields:
% 51.17/18.29  																														| (1588) party_of_protocol(a) = all_1425_2_1770 & intruder_message(all_1425_1_1769) = all_1425_0_1768 & encrypt(all_17_1_81, an_a_nonce) = all_1425_1_1769 & ( ~ (all_1425_2_1770 = 0) | all_1425_0_1768 = 0)
% 51.17/18.29  																														|
% 51.17/18.29  																														| Applying alpha-rule on (1588) yields:
% 51.17/18.29  																														| (1589) party_of_protocol(a) = all_1425_2_1770
% 51.17/18.29  																														| (1590) intruder_message(all_1425_1_1769) = all_1425_0_1768
% 51.17/18.29  																														| (1591) encrypt(all_17_1_81, an_a_nonce) = all_1425_1_1769
% 51.17/18.29  																														| (1592)  ~ (all_1425_2_1770 = 0) | all_1425_0_1768 = 0
% 51.17/18.29  																														|
% 51.17/18.29  																														| Instantiating (1511) with all_1431_0_1777, all_1431_1_1778, all_1431_2_1779 yields:
% 51.17/18.29  																														| (1593) party_of_protocol(b) = all_1431_2_1779 & intruder_message(all_1431_1_1778) = all_1431_0_1777 & encrypt(all_61_7_179, an_a_nonce) = all_1431_1_1778 & ( ~ (all_1431_2_1779 = 0) | all_1431_0_1777 = 0)
% 51.17/18.29  																														|
% 51.17/18.29  																														| Applying alpha-rule on (1593) yields:
% 51.17/18.29  																														| (1594) party_of_protocol(b) = all_1431_2_1779
% 51.17/18.29  																														| (1595) intruder_message(all_1431_1_1778) = all_1431_0_1777
% 51.17/18.29  																														| (1596) encrypt(all_61_7_179, an_a_nonce) = all_1431_1_1778
% 51.17/18.29  																														| (1597)  ~ (all_1431_2_1779 = 0) | all_1431_0_1777 = 0
% 51.17/18.29  																														|
% 51.17/18.29  																														| Instantiating (1502) with all_1433_0_1780, all_1433_1_1781, all_1433_2_1782 yields:
% 51.17/18.29  																														| (1598) party_of_protocol(a) = all_1433_2_1782 & intruder_message(all_1433_1_1781) = all_1433_0_1780 & encrypt(all_61_4_176, an_a_nonce) = all_1433_1_1781 & ( ~ (all_1433_2_1782 = 0) | all_1433_0_1780 = 0)
% 51.17/18.29  																														|
% 51.17/18.29  																														| Applying alpha-rule on (1598) yields:
% 51.17/18.29  																														| (1599) party_of_protocol(a) = all_1433_2_1782
% 51.17/18.29  																														| (1600) intruder_message(all_1433_1_1781) = all_1433_0_1780
% 51.17/18.29  																														| (1601) encrypt(all_61_4_176, an_a_nonce) = all_1433_1_1781
% 51.17/18.29  																														| (1602)  ~ (all_1433_2_1782 = 0) | all_1433_0_1780 = 0
% 51.17/18.29  																														|
% 51.17/18.29  																														| Instantiating (1501) with all_1435_0_1783, all_1435_1_1784, all_1435_2_1785 yields:
% 51.17/18.29  																														| (1603) party_of_protocol(a) = all_1435_2_1785 & intruder_message(all_1435_1_1784) = all_1435_0_1783 & encrypt(all_61_3_175, an_a_nonce) = all_1435_1_1784 & ( ~ (all_1435_2_1785 = 0) | all_1435_0_1783 = 0)
% 51.17/18.29  																														|
% 51.17/18.29  																														| Applying alpha-rule on (1603) yields:
% 51.17/18.29  																														| (1604) party_of_protocol(a) = all_1435_2_1785
% 51.17/18.29  																														| (1605) intruder_message(all_1435_1_1784) = all_1435_0_1783
% 51.17/18.29  																														| (1606) encrypt(all_61_3_175, an_a_nonce) = all_1435_1_1784
% 51.17/18.29  																														| (1607)  ~ (all_1435_2_1785 = 0) | all_1435_0_1783 = 0
% 51.17/18.29  																														|
% 51.17/18.29  																														| Instantiating (1500) with all_1437_0_1786, all_1437_1_1787, all_1437_2_1788 yields:
% 51.17/18.29  																														| (1608) party_of_protocol(a) = all_1437_2_1788 & intruder_message(all_1437_1_1787) = all_1437_0_1786 & encrypt(all_63_4_187, an_a_nonce) = all_1437_1_1787 & ( ~ (all_1437_2_1788 = 0) | all_1437_0_1786 = 0)
% 51.17/18.29  																														|
% 51.17/18.29  																														| Applying alpha-rule on (1608) yields:
% 51.17/18.29  																														| (1609) party_of_protocol(a) = all_1437_2_1788
% 51.17/18.29  																														| (1610) intruder_message(all_1437_1_1787) = all_1437_0_1786
% 51.17/18.29  																														| (1611) encrypt(all_63_4_187, an_a_nonce) = all_1437_1_1787
% 51.17/18.29  																														| (1612)  ~ (all_1437_2_1788 = 0) | all_1437_0_1786 = 0
% 51.17/18.29  																														|
% 51.17/18.29  																														| Instantiating (1499) with all_1439_0_1789, all_1439_1_1790, all_1439_2_1791 yields:
% 51.17/18.29  																														| (1613) party_of_protocol(a) = all_1439_2_1791 & intruder_message(all_1439_1_1790) = all_1439_0_1789 & encrypt(all_63_3_186, an_a_nonce) = all_1439_1_1790 & ( ~ (all_1439_2_1791 = 0) | all_1439_0_1789 = 0)
% 51.17/18.29  																														|
% 51.17/18.29  																														| Applying alpha-rule on (1613) yields:
% 51.17/18.29  																														| (1614) party_of_protocol(a) = all_1439_2_1791
% 51.17/18.29  																														| (1615) intruder_message(all_1439_1_1790) = all_1439_0_1789
% 51.17/18.29  																														| (1616) encrypt(all_63_3_186, an_a_nonce) = all_1439_1_1790
% 51.17/18.29  																														| (1617)  ~ (all_1439_2_1791 = 0) | all_1439_0_1789 = 0
% 51.17/18.29  																														|
% 51.17/18.29  																														| Instantiating (1504) with all_1441_0_1792, all_1441_1_1793, all_1441_2_1794 yields:
% 51.17/18.29  																														| (1618) party_of_protocol(a) = all_1441_2_1794 & intruder_message(all_1441_1_1793) = all_1441_0_1792 & encrypt(all_19_5_94, an_a_nonce) = all_1441_1_1793 & ( ~ (all_1441_2_1794 = 0) | all_1441_0_1792 = 0)
% 51.17/18.29  																														|
% 51.17/18.29  																														| Applying alpha-rule on (1618) yields:
% 51.17/18.29  																														| (1619) party_of_protocol(a) = all_1441_2_1794
% 51.17/18.29  																														| (1620) intruder_message(all_1441_1_1793) = all_1441_0_1792
% 51.17/18.29  																														| (1621) encrypt(all_19_5_94, an_a_nonce) = all_1441_1_1793
% 51.17/18.29  																														| (1622)  ~ (all_1441_2_1794 = 0) | all_1441_0_1792 = 0
% 51.17/18.29  																														|
% 51.17/18.29  																														| Instantiating (1503) with all_1443_0_1795, all_1443_1_1796, all_1443_2_1797 yields:
% 51.17/18.29  																														| (1623) party_of_protocol(a) = all_1443_2_1797 & intruder_message(all_1443_1_1796) = all_1443_0_1795 & encrypt(all_61_7_179, an_a_nonce) = all_1443_1_1796 & ( ~ (all_1443_2_1797 = 0) | all_1443_0_1795 = 0)
% 51.17/18.29  																														|
% 51.17/18.29  																														| Applying alpha-rule on (1623) yields:
% 51.17/18.29  																														| (1624) party_of_protocol(a) = all_1443_2_1797
% 51.17/18.29  																														| (1625) intruder_message(all_1443_1_1796) = all_1443_0_1795
% 51.17/18.29  																														| (1626) encrypt(all_61_7_179, an_a_nonce) = all_1443_1_1796
% 51.17/18.29  																														| (1627)  ~ (all_1443_2_1797 = 0) | all_1443_0_1795 = 0
% 51.17/18.29  																														|
% 51.17/18.29  																														+-Applying beta-rule and splitting (1515), into two cases.
% 51.17/18.29  																														|-Branch one:
% 51.17/18.29  																														| (1628) all_823_0_954 = 0
% 51.17/18.29  																														|
% 51.17/18.29  																															| Equations (1628) can reduce 1488 to:
% 51.17/18.29  																															| (551) $false
% 51.17/18.29  																															|
% 51.17/18.29  																															|-The branch is then unsatisfiable
% 51.17/18.29  																														|-Branch two:
% 51.17/18.29  																														| (1488)  ~ (all_823_0_954 = 0)
% 51.17/18.29  																														| (1631)  ? [v0] :  ? [v1] :  ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_61_7_179) = v0 & key(an_a_nonce, a) = v1 & ( ~ (v2 = 0) |  ~ (v0 = 0)))
% 51.17/18.29  																														|
% 51.17/18.29  																															+-Applying beta-rule and splitting (1516), into two cases.
% 51.17/18.29  																															|-Branch one:
% 51.17/18.29  																															| (1628) all_823_0_954 = 0
% 51.17/18.29  																															|
% 51.17/18.29  																																| Equations (1628) can reduce 1488 to:
% 51.17/18.29  																																| (551) $false
% 51.17/18.29  																																|
% 51.17/18.29  																																|-The branch is then unsatisfiable
% 51.17/18.29  																															|-Branch two:
% 51.17/18.29  																															| (1488)  ~ (all_823_0_954 = 0)
% 51.17/18.29  																															| (1635)  ? [v0] :  ? [v1] :  ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_61_7_179) = v0 & key(an_a_nonce, t) = v1 & ( ~ (v2 = 0) |  ~ (v0 = 0)))
% 51.17/18.29  																															|
% 51.17/18.29  																																+-Applying beta-rule and splitting (1514), into two cases.
% 51.17/18.29  																																|-Branch one:
% 51.17/18.29  																																| (1628) all_823_0_954 = 0
% 51.17/18.29  																																|
% 51.17/18.29  																																	| Equations (1628) can reduce 1488 to:
% 51.17/18.29  																																	| (551) $false
% 51.17/18.29  																																	|
% 51.17/18.29  																																	|-The branch is then unsatisfiable
% 51.17/18.29  																																|-Branch two:
% 51.17/18.29  																																| (1488)  ~ (all_823_0_954 = 0)
% 51.44/18.29  																																| (1639)  ? [v0] :  ? [v1] :  ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_61_7_179) = v0 & key(an_a_nonce, b) = v1 & ( ~ (v2 = 0) |  ~ (v0 = 0)))
% 51.44/18.29  																																|
% 51.44/18.29  																																	| Instantiating formula (66) with a, all_1439_2_1791, 0 and discharging atoms party_of_protocol(a) = all_1439_2_1791, party_of_protocol(a) = 0, yields:
% 51.44/18.29  																																	| (1640) all_1439_2_1791 = 0
% 51.44/18.29  																																	|
% 51.44/18.29  																																	| Instantiating formula (66) with a, all_1435_2_1785, all_1443_2_1797 and discharging atoms party_of_protocol(a) = all_1443_2_1797, party_of_protocol(a) = all_1435_2_1785, yields:
% 51.44/18.29  																																	| (1641) all_1443_2_1797 = all_1435_2_1785
% 51.44/18.29  																																	|
% 51.44/18.29  																																	| Instantiating formula (66) with a, all_1435_2_1785, all_1437_2_1788 and discharging atoms party_of_protocol(a) = all_1437_2_1788, party_of_protocol(a) = all_1435_2_1785, yields:
% 51.44/18.29  																																	| (1642) all_1437_2_1788 = all_1435_2_1785
% 51.44/18.29  																																	|
% 51.44/18.29  																																	| Instantiating formula (66) with a, all_1433_2_1782, all_1443_2_1797 and discharging atoms party_of_protocol(a) = all_1443_2_1797, party_of_protocol(a) = all_1433_2_1782, yields:
% 51.44/18.29  																																	| (1643) all_1443_2_1797 = all_1433_2_1782
% 51.44/18.29  																																	|
% 51.44/18.29  																																	| Instantiating formula (66) with a, all_1425_2_1770, all_1439_2_1791 and discharging atoms party_of_protocol(a) = all_1439_2_1791, party_of_protocol(a) = all_1425_2_1770, yields:
% 51.44/18.29  																																	| (1644) all_1439_2_1791 = all_1425_2_1770
% 51.44/18.29  																																	|
% 51.44/18.29  																																	| Instantiating formula (66) with a, all_1369_1_1647, all_1441_2_1794 and discharging atoms party_of_protocol(a) = all_1441_2_1794, party_of_protocol(a) = all_1369_1_1647, yields:
% 51.44/18.29  																																	| (1645) all_1441_2_1794 = all_1369_1_1647
% 51.44/18.29  																																	|
% 51.44/18.29  																																	| Instantiating formula (66) with a, all_1337_1_1591, all_1439_2_1791 and discharging atoms party_of_protocol(a) = all_1439_2_1791, party_of_protocol(a) = all_1337_1_1591, yields:
% 51.44/18.29  																																	| (1646) all_1439_2_1791 = all_1337_1_1591
% 51.44/18.29  																																	|
% 51.44/18.29  																																	| Instantiating formula (66) with a, all_1303_1_1501, all_1369_1_1647 and discharging atoms party_of_protocol(a) = all_1369_1_1647, party_of_protocol(a) = all_1303_1_1501, yields:
% 51.44/18.29  																																	| (1647) all_1369_1_1647 = all_1303_1_1501
% 51.44/18.29  																																	|
% 51.44/18.29  																																	| Instantiating formula (66) with a, all_1285_2_1475, all_1435_2_1785 and discharging atoms party_of_protocol(a) = all_1435_2_1785, party_of_protocol(a) = all_1285_2_1475, yields:
% 51.44/18.29  																																	| (1648) all_1435_2_1785 = all_1285_2_1475
% 51.44/18.29  																																	|
% 51.44/18.29  																																	| Instantiating formula (66) with a, all_1285_2_1475, all_1423_2_1767 and discharging atoms party_of_protocol(a) = all_1423_2_1767, party_of_protocol(a) = all_1285_2_1475, yields:
% 51.44/18.29  																																	| (1649) all_1423_2_1767 = all_1285_2_1475
% 51.44/18.29  																																	|
% 51.44/18.29  																																	| Instantiating formula (66) with a, all_1285_2_1475, all_1337_1_1591 and discharging atoms party_of_protocol(a) = all_1337_1_1591, party_of_protocol(a) = all_1285_2_1475, yields:
% 51.44/18.29  																																	| (1650) all_1337_1_1591 = all_1285_2_1475
% 51.44/18.29  																																	|
% 51.44/18.29  																																	| Instantiating formula (66) with a, all_1285_2_1475, all_1303_1_1501 and discharging atoms party_of_protocol(a) = all_1303_1_1501, party_of_protocol(a) = all_1285_2_1475, yields:
% 51.44/18.30  																																	| (1651) all_1303_1_1501 = all_1285_2_1475
% 51.44/18.30  																																	|
% 51.44/18.30  																																	| Instantiating formula (66) with a, all_1283_2_1472, all_1441_2_1794 and discharging atoms party_of_protocol(a) = all_1441_2_1794, party_of_protocol(a) = all_1283_2_1472, yields:
% 51.44/18.30  																																	| (1652) all_1441_2_1794 = all_1283_2_1472
% 51.44/18.30  																																	|
% 51.44/18.30  																																	| Instantiating formula (66) with a, all_1281_2_1469, all_1423_2_1767 and discharging atoms party_of_protocol(a) = all_1423_2_1767, party_of_protocol(a) = all_1281_2_1469, yields:
% 51.44/18.30  																																	| (1653) all_1423_2_1767 = all_1281_2_1469
% 51.44/18.30  																																	|
% 51.44/18.30  																																	| Instantiating formula (66) with a, all_1279_2_1466, all_1437_2_1788 and discharging atoms party_of_protocol(a) = all_1437_2_1788, party_of_protocol(a) = all_1279_2_1466, yields:
% 51.44/18.30  																																	| (1654) all_1437_2_1788 = all_1279_2_1466
% 51.44/18.30  																																	|
% 51.44/18.30  																																	| Instantiating formula (31) with all_285_7_623, all_1333_1_1584, all_823_0_954 and discharging atoms intruder_message(all_285_7_623) = all_1333_1_1584, intruder_message(all_285_7_623) = all_823_0_954, yields:
% 51.44/18.30  																																	| (1655) all_1333_1_1584 = all_823_0_954
% 51.44/18.30  																																	|
% 51.44/18.30  																																	| Instantiating formula (31) with all_285_7_623, all_1327_2_1561, all_1333_1_1584 and discharging atoms intruder_message(all_285_7_623) = all_1333_1_1584, intruder_message(all_285_7_623) = all_1327_2_1561, yields:
% 51.44/18.30  																																	| (1656) all_1333_1_1584 = all_1327_2_1561
% 51.44/18.30  																																	|
% 51.44/18.30  																																	| Instantiating formula (31) with all_285_7_623, all_1325_1_1556, all_1333_1_1584 and discharging atoms intruder_message(all_285_7_623) = all_1333_1_1584, intruder_message(all_285_7_623) = all_1325_1_1556, yields:
% 51.44/18.30  																																	| (1657) all_1333_1_1584 = all_1325_1_1556
% 51.44/18.30  																																	|
% 51.44/18.30  																																	| Instantiating formula (31) with all_285_7_623, all_1311_2_1517, all_1325_1_1556 and discharging atoms intruder_message(all_285_7_623) = all_1325_1_1556, intruder_message(all_285_7_623) = all_1311_2_1517, yields:
% 51.44/18.30  																																	| (1658) all_1325_1_1556 = all_1311_2_1517
% 51.44/18.30  																																	|
% 51.44/18.30  																																	| Instantiating formula (8) with all_61_7_179, an_a_nonce, all_1443_1_1796, all_285_7_623 and discharging atoms encrypt(all_61_7_179, an_a_nonce) = all_1443_1_1796, encrypt(all_61_7_179, an_a_nonce) = all_285_7_623, yields:
% 51.44/18.30  																																	| (1659) all_1443_1_1796 = all_285_7_623
% 51.44/18.30  																																	|
% 51.44/18.30  																																	| Instantiating formula (8) with all_61_7_179, an_a_nonce, all_1431_1_1778, all_1443_1_1796 and discharging atoms encrypt(all_61_7_179, an_a_nonce) = all_1443_1_1796, encrypt(all_61_7_179, an_a_nonce) = all_1431_1_1778, yields:
% 51.44/18.30  																																	| (1660) all_1443_1_1796 = all_1431_1_1778
% 51.44/18.30  																																	|
% 51.44/18.30  																																	| Combining equations (1659,1660) yields a new equation:
% 51.44/18.30  																																	| (1661) all_1431_1_1778 = all_285_7_623
% 51.44/18.30  																																	|
% 51.44/18.30  																																	| Combining equations (1641,1643) yields a new equation:
% 51.44/18.30  																																	| (1662) all_1435_2_1785 = all_1433_2_1782
% 51.44/18.30  																																	|
% 51.44/18.30  																																	| Simplifying 1662 yields:
% 51.44/18.30  																																	| (1663) all_1435_2_1785 = all_1433_2_1782
% 51.44/18.30  																																	|
% 51.44/18.30  																																	| Combining equations (1645,1652) yields a new equation:
% 51.44/18.30  																																	| (1664) all_1369_1_1647 = all_1283_2_1472
% 51.44/18.30  																																	|
% 51.44/18.30  																																	| Simplifying 1664 yields:
% 51.44/18.30  																																	| (1665) all_1369_1_1647 = all_1283_2_1472
% 51.44/18.30  																																	|
% 51.44/18.30  																																	| Combining equations (1646,1644) yields a new equation:
% 51.44/18.30  																																	| (1666) all_1425_2_1770 = all_1337_1_1591
% 51.44/18.30  																																	|
% 51.44/18.30  																																	| Combining equations (1640,1644) yields a new equation:
% 51.44/18.30  																																	| (1667) all_1425_2_1770 = 0
% 51.44/18.30  																																	|
% 51.44/18.30  																																	| Combining equations (1642,1654) yields a new equation:
% 51.44/18.30  																																	| (1668) all_1435_2_1785 = all_1279_2_1466
% 51.44/18.30  																																	|
% 51.44/18.30  																																	| Simplifying 1668 yields:
% 51.44/18.30  																																	| (1669) all_1435_2_1785 = all_1279_2_1466
% 51.44/18.30  																																	|
% 51.44/18.30  																																	| Combining equations (1648,1663) yields a new equation:
% 51.44/18.30  																																	| (1670) all_1433_2_1782 = all_1285_2_1475
% 51.44/18.30  																																	|
% 51.44/18.30  																																	| Combining equations (1669,1663) yields a new equation:
% 51.44/18.30  																																	| (1671) all_1433_2_1782 = all_1279_2_1466
% 51.44/18.30  																																	|
% 51.44/18.30  																																	| Combining equations (1670,1671) yields a new equation:
% 51.44/18.30  																																	| (1672) all_1285_2_1475 = all_1279_2_1466
% 51.44/18.30  																																	|
% 51.44/18.30  																																	| Simplifying 1672 yields:
% 51.44/18.30  																																	| (1673) all_1285_2_1475 = all_1279_2_1466
% 51.44/18.30  																																	|
% 51.44/18.30  																																	| Combining equations (1666,1667) yields a new equation:
% 51.44/18.30  																																	| (1674) all_1337_1_1591 = 0
% 51.44/18.30  																																	|
% 51.44/18.30  																																	| Simplifying 1674 yields:
% 51.44/18.30  																																	| (1675) all_1337_1_1591 = 0
% 51.44/18.30  																																	|
% 51.44/18.30  																																	| Combining equations (1649,1653) yields a new equation:
% 51.44/18.30  																																	| (1676) all_1285_2_1475 = all_1281_2_1469
% 51.44/18.30  																																	|
% 51.44/18.30  																																	| Simplifying 1676 yields:
% 51.44/18.30  																																	| (1677) all_1285_2_1475 = all_1281_2_1469
% 51.44/18.30  																																	|
% 51.44/18.30  																																	| Combining equations (1647,1665) yields a new equation:
% 51.44/18.30  																																	| (1678) all_1303_1_1501 = all_1283_2_1472
% 51.44/18.30  																																	|
% 51.44/18.30  																																	| Simplifying 1678 yields:
% 51.44/18.30  																																	| (1679) all_1303_1_1501 = all_1283_2_1472
% 51.44/18.30  																																	|
% 51.44/18.30  																																	| Combining equations (1650,1675) yields a new equation:
% 51.44/18.30  																																	| (1680) all_1285_2_1475 = 0
% 51.44/18.30  																																	|
% 51.44/18.30  																																	| Simplifying 1680 yields:
% 51.44/18.30  																																	| (1681) all_1285_2_1475 = 0
% 51.44/18.30  																																	|
% 51.44/18.30  																																	| Combining equations (1655,1656) yields a new equation:
% 51.44/18.30  																																	| (1682) all_1327_2_1561 = all_823_0_954
% 51.44/18.30  																																	|
% 51.44/18.30  																																	| Combining equations (1657,1656) yields a new equation:
% 51.44/18.30  																																	| (1683) all_1327_2_1561 = all_1325_1_1556
% 51.44/18.30  																																	|
% 51.44/18.30  																																	| Combining equations (1683,1682) yields a new equation:
% 51.44/18.30  																																	| (1684) all_1325_1_1556 = all_823_0_954
% 51.44/18.30  																																	|
% 51.44/18.30  																																	| Simplifying 1684 yields:
% 51.44/18.30  																																	| (1685) all_1325_1_1556 = all_823_0_954
% 51.44/18.30  																																	|
% 51.44/18.30  																																	| Combining equations (1685,1658) yields a new equation:
% 51.44/18.30  																																	| (1686) all_1311_2_1517 = all_823_0_954
% 51.44/18.30  																																	|
% 51.44/18.30  																																	| Combining equations (1651,1679) yields a new equation:
% 51.44/18.30  																																	| (1687) all_1285_2_1475 = all_1283_2_1472
% 51.44/18.30  																																	|
% 51.44/18.30  																																	| Simplifying 1687 yields:
% 51.44/18.30  																																	| (1688) all_1285_2_1475 = all_1283_2_1472
% 51.44/18.30  																																	|
% 51.44/18.30  																																	| Combining equations (1673,1688) yields a new equation:
% 51.44/18.30  																																	| (1689) all_1283_2_1472 = all_1279_2_1466
% 51.44/18.30  																																	|
% 51.44/18.30  																																	| Combining equations (1677,1688) yields a new equation:
% 51.44/18.30  																																	| (1690) all_1283_2_1472 = all_1281_2_1469
% 51.44/18.30  																																	|
% 51.44/18.30  																																	| Combining equations (1681,1688) yields a new equation:
% 51.44/18.30  																																	| (1691) all_1283_2_1472 = 0
% 51.44/18.30  																																	|
% 51.44/18.30  																																	| Combining equations (1691,1690) yields a new equation:
% 51.44/18.30  																																	| (1692) all_1281_2_1469 = 0
% 51.44/18.30  																																	|
% 51.44/18.30  																																	| Combining equations (1689,1690) yields a new equation:
% 51.44/18.30  																																	| (1693) all_1281_2_1469 = all_1279_2_1466
% 51.44/18.30  																																	|
% 51.44/18.30  																																	| Combining equations (1692,1693) yields a new equation:
% 51.44/18.30  																																	| (1694) all_1279_2_1466 = 0
% 51.44/18.30  																																	|
% 51.44/18.30  																																	| Combining equations (1694,1671) yields a new equation:
% 51.44/18.30  																																	| (1695) all_1433_2_1782 = 0
% 51.44/18.30  																																	|
% 51.44/18.30  																																	| Combining equations (1695,1643) yields a new equation:
% 51.44/18.30  																																	| (1696) all_1443_2_1797 = 0
% 51.44/18.30  																																	|
% 51.44/18.30  																																	| Combining equations (1661,1660) yields a new equation:
% 51.44/18.30  																																	| (1659) all_1443_1_1796 = all_285_7_623
% 51.44/18.30  																																	|
% 51.44/18.30  																																	| From (1659) and (1625) follows:
% 51.44/18.30  																																	| (1698) intruder_message(all_285_7_623) = all_1443_0_1795
% 51.44/18.30  																																	|
% 51.44/18.30  																																	| From (1686) and (1552) follows:
% 51.44/18.30  																																	| (1319) intruder_message(all_285_7_623) = all_823_0_954
% 51.44/18.30  																																	|
% 51.44/18.30  																																	+-Applying beta-rule and splitting (1512), into two cases.
% 51.44/18.30  																																	|-Branch one:
% 51.44/18.30  																																	| (1628) all_823_0_954 = 0
% 51.44/18.30  																																	|
% 51.44/18.30  																																		| Equations (1628) can reduce 1488 to:
% 51.44/18.30  																																		| (551) $false
% 51.44/18.30  																																		|
% 51.44/18.30  																																		|-The branch is then unsatisfiable
% 51.44/18.30  																																	|-Branch two:
% 51.44/18.30  																																	| (1488)  ~ (all_823_0_954 = 0)
% 51.44/18.30  																																	| (1703)  ? [v0] :  ? [v1] : (party_of_protocol(a) = v1 & intruder_message(all_61_7_179) = v0 & ( ~ (v1 = 0) |  ~ (v0 = 0)))
% 51.44/18.30  																																	|
% 51.44/18.30  																																		+-Applying beta-rule and splitting (1513), into two cases.
% 51.44/18.30  																																		|-Branch one:
% 51.44/18.30  																																		| (1628) all_823_0_954 = 0
% 51.44/18.30  																																		|
% 51.44/18.30  																																			| Equations (1628) can reduce 1488 to:
% 51.44/18.30  																																			| (551) $false
% 51.44/18.30  																																			|
% 51.44/18.30  																																			|-The branch is then unsatisfiable
% 51.44/18.30  																																		|-Branch two:
% 51.44/18.30  																																		| (1488)  ~ (all_823_0_954 = 0)
% 51.44/18.30  																																		| (1707)  ? [v0] :  ? [v1] : (party_of_protocol(b) = v1 & intruder_message(all_61_7_179) = v0 & ( ~ (v1 = 0) |  ~ (v0 = 0)))
% 51.44/18.30  																																		|
% 51.44/18.30  																																			+-Applying beta-rule and splitting (1627), into two cases.
% 51.44/18.30  																																			|-Branch one:
% 51.44/18.30  																																			| (1708)  ~ (all_1443_2_1797 = 0)
% 51.44/18.30  																																			|
% 51.44/18.30  																																				| Equations (1696) can reduce 1708 to:
% 51.44/18.30  																																				| (551) $false
% 51.44/18.30  																																				|
% 51.44/18.30  																																				|-The branch is then unsatisfiable
% 51.44/18.30  																																			|-Branch two:
% 51.44/18.30  																																			| (1696) all_1443_2_1797 = 0
% 51.44/18.30  																																			| (1711) all_1443_0_1795 = 0
% 51.44/18.30  																																			|
% 51.44/18.30  																																				| From (1711) and (1698) follows:
% 51.44/18.30  																																				| (1712) intruder_message(all_285_7_623) = 0
% 51.44/18.30  																																				|
% 51.44/18.30  																																				| Instantiating formula (31) with all_285_7_623, 0, all_823_0_954 and discharging atoms intruder_message(all_285_7_623) = all_823_0_954, intruder_message(all_285_7_623) = 0, yields:
% 51.44/18.30  																																				| (1628) all_823_0_954 = 0
% 51.44/18.30  																																				|
% 51.44/18.30  																																				| Equations (1628) can reduce 1488 to:
% 51.44/18.30  																																				| (551) $false
% 51.44/18.30  																																				|
% 51.44/18.30  																																				|-The branch is then unsatisfiable
% 51.44/18.30  																												|-Branch two:
% 51.44/18.30  																												| (1490) all_135_1_334 = 0
% 51.44/18.30  																												| (1716)  ~ (all_135_2_335 = 0) | all_135_0_333 = 0
% 51.44/18.30  																												|
% 51.44/18.30  																													| From (1490) and (375) follows:
% 51.44/18.30  																													| (1717) intruder_message(all_13_7_53) = 0
% 51.44/18.30  																													|
% 51.44/18.30  																													| Instantiating formula (63) with all_375_1_791, a, an_a_nonce, all_63_3_186 and discharging atoms intruder_holds(all_375_1_791) = 0, intruder_message(all_63_3_186) = 0, key(an_a_nonce, a) = all_375_1_791, yields:
% 51.44/18.30  																													| (1499)  ? [v0] :  ? [v1] :  ? [v2] : (party_of_protocol(a) = v0 & intruder_message(v1) = v2 & encrypt(all_63_3_186, an_a_nonce) = v1 & ( ~ (v0 = 0) | v2 = 0))
% 51.44/18.31  																													|
% 51.44/18.31  																													| Instantiating formula (63) with all_375_1_791, a, an_a_nonce, all_63_4_187 and discharging atoms intruder_holds(all_375_1_791) = 0, intruder_message(all_63_4_187) = 0, key(an_a_nonce, a) = all_375_1_791, yields:
% 51.44/18.31  																													| (1500)  ? [v0] :  ? [v1] :  ? [v2] : (party_of_protocol(a) = v0 & intruder_message(v1) = v2 & encrypt(all_63_4_187, an_a_nonce) = v1 & ( ~ (v0 = 0) | v2 = 0))
% 51.44/18.31  																													|
% 51.44/18.31  																													| Instantiating formula (63) with all_375_1_791, a, an_a_nonce, all_61_3_175 and discharging atoms intruder_holds(all_375_1_791) = 0, intruder_message(all_61_3_175) = 0, key(an_a_nonce, a) = all_375_1_791, yields:
% 51.44/18.31  																													| (1501)  ? [v0] :  ? [v1] :  ? [v2] : (party_of_protocol(a) = v0 & intruder_message(v1) = v2 & encrypt(all_61_3_175, an_a_nonce) = v1 & ( ~ (v0 = 0) | v2 = 0))
% 51.44/18.31  																													|
% 51.44/18.31  																													| Instantiating formula (63) with all_375_1_791, a, an_a_nonce, all_61_4_176 and discharging atoms intruder_holds(all_375_1_791) = 0, intruder_message(all_61_4_176) = 0, key(an_a_nonce, a) = all_375_1_791, yields:
% 51.44/18.31  																													| (1502)  ? [v0] :  ? [v1] :  ? [v2] : (party_of_protocol(a) = v0 & intruder_message(v1) = v2 & encrypt(all_61_4_176, an_a_nonce) = v1 & ( ~ (v0 = 0) | v2 = 0))
% 51.44/18.31  																													|
% 51.44/18.31  																													| Instantiating formula (63) with all_375_1_791, a, an_a_nonce, all_61_7_179 and discharging atoms intruder_holds(all_375_1_791) = 0, intruder_message(all_61_7_179) = 0, key(an_a_nonce, a) = all_375_1_791, yields:
% 51.44/18.31  																													| (1503)  ? [v0] :  ? [v1] :  ? [v2] : (party_of_protocol(a) = v0 & intruder_message(v1) = v2 & encrypt(all_61_7_179, an_a_nonce) = v1 & ( ~ (v0 = 0) | v2 = 0))
% 51.44/18.31  																													|
% 51.44/18.31  																													| Instantiating formula (63) with all_375_1_791, a, an_a_nonce, all_19_5_94 and discharging atoms intruder_holds(all_375_1_791) = 0, intruder_message(all_19_5_94) = 0, key(an_a_nonce, a) = all_375_1_791, yields:
% 51.44/18.31  																													| (1504)  ? [v0] :  ? [v1] :  ? [v2] : (party_of_protocol(a) = v0 & intruder_message(v1) = v2 & encrypt(all_19_5_94, an_a_nonce) = v1 & ( ~ (v0 = 0) | v2 = 0))
% 51.44/18.31  																													|
% 51.44/18.31  																													| Instantiating formula (63) with all_375_1_791, a, an_a_nonce, all_17_1_81 and discharging atoms intruder_holds(all_375_1_791) = 0, intruder_message(all_17_1_81) = 0, key(an_a_nonce, a) = all_375_1_791, yields:
% 51.44/18.31  																													| (1505)  ? [v0] :  ? [v1] :  ? [v2] : (party_of_protocol(a) = v0 & intruder_message(v1) = v2 & encrypt(all_17_1_81, an_a_nonce) = v1 & ( ~ (v0 = 0) | v2 = 0))
% 51.44/18.31  																													|
% 51.44/18.31  																													| Instantiating formula (63) with all_375_1_791, a, an_a_nonce, all_0_2_2 and discharging atoms intruder_holds(all_375_1_791) = 0, intruder_message(all_0_2_2) = 0, key(an_a_nonce, a) = all_375_1_791, yields:
% 51.44/18.31  																													| (1506)  ? [v0] :  ? [v1] :  ? [v2] : (party_of_protocol(a) = v0 & intruder_message(v1) = v2 & encrypt(all_0_2_2, an_a_nonce) = v1 & ( ~ (v0 = 0) | v2 = 0))
% 51.44/18.31  																													|
% 51.44/18.31  																													| Instantiating formula (63) with all_375_1_791, a, an_a_nonce, all_0_3_3 and discharging atoms intruder_holds(all_375_1_791) = 0, intruder_message(all_0_3_3) = 0, key(an_a_nonce, a) = all_375_1_791, yields:
% 51.44/18.31  																													| (1507)  ? [v0] :  ? [v1] :  ? [v2] : (party_of_protocol(a) = v0 & intruder_message(v1) = v2 & encrypt(all_0_3_3, an_a_nonce) = v1 & ( ~ (v0 = 0) | v2 = 0))
% 51.44/18.31  																													|
% 51.44/18.31  																													| Instantiating formula (63) with all_375_1_791, a, an_a_nonce, an_a_nonce and discharging atoms intruder_holds(all_375_1_791) = 0, intruder_message(an_a_nonce) = 0, key(an_a_nonce, a) = all_375_1_791, yields:
% 51.44/18.31  																													| (1508)  ? [v0] :  ? [v1] :  ? [v2] : (party_of_protocol(a) = v0 & intruder_message(v1) = v2 & encrypt(an_a_nonce, an_a_nonce) = v1 & ( ~ (v0 = 0) | v2 = 0))
% 51.44/18.31  																													|
% 51.44/18.31  																													| Instantiating formula (63) with all_375_1_791, a, an_a_nonce, b and discharging atoms intruder_holds(all_375_1_791) = 0, intruder_message(b) = 0, key(an_a_nonce, a) = all_375_1_791, yields:
% 51.44/18.31  																													| (1509)  ? [v0] :  ? [v1] :  ? [v2] : (party_of_protocol(a) = v0 & intruder_message(v1) = v2 & encrypt(b, an_a_nonce) = v1 & ( ~ (v0 = 0) | v2 = 0))
% 51.44/18.31  																													|
% 51.44/18.31  																													| Instantiating formula (63) with all_375_1_791, a, an_a_nonce, a and discharging atoms intruder_holds(all_375_1_791) = 0, intruder_message(a) = 0, key(an_a_nonce, a) = all_375_1_791, yields:
% 51.44/18.31  																													| (1510)  ? [v0] :  ? [v1] :  ? [v2] : (party_of_protocol(a) = v0 & intruder_message(v1) = v2 & encrypt(a, an_a_nonce) = v1 & ( ~ (v0 = 0) | v2 = 0))
% 51.44/18.31  																													|
% 51.44/18.31  																													| Instantiating formula (63) with all_285_1_617, b, an_a_nonce, all_61_7_179 and discharging atoms intruder_holds(all_285_1_617) = 0, intruder_message(all_61_7_179) = 0, key(an_a_nonce, b) = all_285_1_617, yields:
% 51.44/18.31  																													| (1511)  ? [v0] :  ? [v1] :  ? [v2] : (party_of_protocol(b) = v0 & intruder_message(v1) = v2 & encrypt(all_61_7_179, an_a_nonce) = v1 & ( ~ (v0 = 0) | v2 = 0))
% 51.44/18.31  																													|
% 51.44/18.31  																													| Instantiating formula (45) with all_823_0_954, all_285_7_623, all_375_1_791, a, an_a_nonce, all_61_7_179 and discharging atoms intruder_holds(all_375_1_791) = 0, intruder_message(all_285_7_623) = all_823_0_954, encrypt(all_61_7_179, an_a_nonce) = all_285_7_623, key(an_a_nonce, a) = all_375_1_791, yields:
% 51.44/18.31  																													| (1512) all_823_0_954 = 0 |  ? [v0] :  ? [v1] : (party_of_protocol(a) = v1 & intruder_message(all_61_7_179) = v0 & ( ~ (v1 = 0) |  ~ (v0 = 0)))
% 51.44/18.31  																													|
% 51.44/18.31  																													| Instantiating formula (45) with all_823_0_954, all_285_7_623, all_285_1_617, b, an_a_nonce, all_61_7_179 and discharging atoms intruder_holds(all_285_1_617) = 0, intruder_message(all_285_7_623) = all_823_0_954, encrypt(all_61_7_179, an_a_nonce) = all_285_7_623, key(an_a_nonce, b) = all_285_1_617, yields:
% 51.44/18.31  																													| (1513) all_823_0_954 = 0 |  ? [v0] :  ? [v1] : (party_of_protocol(b) = v1 & intruder_message(all_61_7_179) = v0 & ( ~ (v1 = 0) |  ~ (v0 = 0)))
% 51.44/18.31  																													|
% 51.44/18.31  																													| Instantiating formula (7) with all_823_0_954, all_285_7_623, b, an_a_nonce, all_61_7_179 and discharging atoms party_of_protocol(b) = 0, intruder_message(all_285_7_623) = all_823_0_954, encrypt(all_61_7_179, an_a_nonce) = all_285_7_623, yields:
% 51.44/18.31  																													| (1514) all_823_0_954 = 0 |  ? [v0] :  ? [v1] :  ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_61_7_179) = v0 & key(an_a_nonce, b) = v1 & ( ~ (v2 = 0) |  ~ (v0 = 0)))
% 51.44/18.31  																													|
% 51.44/18.31  																													| Instantiating formula (7) with all_823_0_954, all_285_7_623, a, an_a_nonce, all_61_7_179 and discharging atoms party_of_protocol(a) = 0, intruder_message(all_285_7_623) = all_823_0_954, encrypt(all_61_7_179, an_a_nonce) = all_285_7_623, yields:
% 51.44/18.31  																													| (1515) all_823_0_954 = 0 |  ? [v0] :  ? [v1] :  ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_61_7_179) = v0 & key(an_a_nonce, a) = v1 & ( ~ (v2 = 0) |  ~ (v0 = 0)))
% 51.44/18.31  																													|
% 51.44/18.31  																													| Instantiating formula (7) with all_823_0_954, all_285_7_623, t, an_a_nonce, all_61_7_179 and discharging atoms party_of_protocol(t) = 0, intruder_message(all_285_7_623) = all_823_0_954, encrypt(all_61_7_179, an_a_nonce) = all_285_7_623, yields:
% 51.44/18.31  																													| (1516) all_823_0_954 = 0 |  ? [v0] :  ? [v1] :  ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_61_7_179) = v0 & key(an_a_nonce, t) = v1 & ( ~ (v2 = 0) |  ~ (v0 = 0)))
% 51.44/18.31  																													|
% 51.44/18.31  																													| Instantiating formula (63) with all_375_1_791, a, an_a_nonce, all_13_7_53 and discharging atoms intruder_holds(all_375_1_791) = 0, intruder_message(all_13_7_53) = 0, key(an_a_nonce, a) = all_375_1_791, yields:
% 51.44/18.31  																													| (1736)  ? [v0] :  ? [v1] :  ? [v2] : (party_of_protocol(a) = v0 & intruder_message(v1) = v2 & encrypt(all_13_7_53, an_a_nonce) = v1 & ( ~ (v0 = 0) | v2 = 0))
% 51.44/18.31  																													|
% 51.44/18.31  																													| Instantiating formula (40) with all_837_5_988, all_835_6_978, all_285_7_623, all_63_4_187 and discharging atoms triple(all_63_4_187, all_285_7_623, all_835_6_978) = all_837_5_988, yields:
% 51.44/18.31  																													| (1517)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (intruder_message(all_837_5_988) = v3 & intruder_message(all_835_6_978) = v2 & intruder_message(all_285_7_623) = v1 & intruder_message(all_63_4_187) = v0 & ( ~ (v2 = 0) |  ~ (v1 = 0) |  ~ (v0 = 0) | v3 = 0))
% 51.44/18.31  																													|
% 51.44/18.31  																													| Instantiating formula (68) with all_837_5_988, all_835_6_978, all_285_7_623, all_63_4_187 and discharging atoms triple(all_63_4_187, all_285_7_623, all_835_6_978) = all_837_5_988, yields:
% 51.44/18.31  																													| (1518)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (intruder_message(all_837_5_988) = v0 & intruder_message(all_835_6_978) = v3 & intruder_message(all_285_7_623) = v2 & intruder_message(all_63_4_187) = v1 & ( ~ (v0 = 0) | (v3 = 0 & v2 = 0 & v1 = 0)))
% 51.44/18.31  																													|
% 51.44/18.31  																													| Instantiating formula (40) with all_835_5_977, all_835_6_978, all_285_7_623, all_61_4_176 and discharging atoms triple(all_61_4_176, all_285_7_623, all_835_6_978) = all_835_5_977, yields:
% 51.44/18.31  																													| (1519)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (intruder_message(all_835_5_977) = v3 & intruder_message(all_835_6_978) = v2 & intruder_message(all_285_7_623) = v1 & intruder_message(all_61_4_176) = v0 & ( ~ (v2 = 0) |  ~ (v1 = 0) |  ~ (v0 = 0) | v3 = 0))
% 51.44/18.31  																													|
% 51.44/18.31  																													| Instantiating formula (68) with all_835_5_977, all_835_6_978, all_285_7_623, all_61_4_176 and discharging atoms triple(all_61_4_176, all_285_7_623, all_835_6_978) = all_835_5_977, yields:
% 51.44/18.31  																													| (1520)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (intruder_message(all_835_5_977) = v0 & intruder_message(all_835_6_978) = v3 & intruder_message(all_285_7_623) = v2 & intruder_message(all_61_4_176) = v1 & ( ~ (v0 = 0) | (v3 = 0 & v2 = 0 & v1 = 0)))
% 51.44/18.31  																													|
% 51.44/18.31  																													| Instantiating formula (57) with all_745_2_805, a, all_19_7_96 and discharging atoms key(all_19_7_96, a) = all_745_2_805, yields:
% 51.44/18.31  																													| (1521)  ? [v0] :  ? [v1] :  ? [v2] : (intruder_holds(all_745_2_805) = v2 & party_of_protocol(a) = v1 & intruder_message(all_19_7_96) = v0 & ( ~ (v1 = 0) |  ~ (v0 = 0) | v2 = 0))
% 51.44/18.31  																													|
% 51.44/18.31  																													| Instantiating formula (57) with all_833_2_971, a, all_17_7_87 and discharging atoms key(all_17_7_87, a) = all_833_2_971, yields:
% 51.44/18.31  																													| (1522)  ? [v0] :  ? [v1] :  ? [v2] : (intruder_holds(all_833_2_971) = v2 & party_of_protocol(a) = v1 & intruder_message(all_17_7_87) = v0 & ( ~ (v1 = 0) |  ~ (v0 = 0) | v2 = 0))
% 51.44/18.31  																													|
% 51.44/18.31  																													| Instantiating (1520) with all_1274_0_2310, all_1274_1_2311, all_1274_2_2312, all_1274_3_2313 yields:
% 51.44/18.31  																													| (1743) intruder_message(all_835_5_977) = all_1274_3_2313 & intruder_message(all_835_6_978) = all_1274_0_2310 & intruder_message(all_285_7_623) = all_1274_1_2311 & intruder_message(all_61_4_176) = all_1274_2_2312 & ( ~ (all_1274_3_2313 = 0) | (all_1274_0_2310 = 0 & all_1274_1_2311 = 0 & all_1274_2_2312 = 0))
% 51.44/18.31  																													|
% 51.44/18.31  																													| Applying alpha-rule on (1743) yields:
% 51.44/18.31  																													| (1744) intruder_message(all_285_7_623) = all_1274_1_2311
% 51.44/18.31  																													| (1745) intruder_message(all_835_6_978) = all_1274_0_2310
% 51.44/18.31  																													| (1746)  ~ (all_1274_3_2313 = 0) | (all_1274_0_2310 = 0 & all_1274_1_2311 = 0 & all_1274_2_2312 = 0)
% 51.44/18.31  																													| (1747) intruder_message(all_61_4_176) = all_1274_2_2312
% 51.44/18.31  																													| (1748) intruder_message(all_835_5_977) = all_1274_3_2313
% 51.44/18.31  																													|
% 51.44/18.31  																													| Instantiating (1519) with all_1276_0_2314, all_1276_1_2315, all_1276_2_2316, all_1276_3_2317 yields:
% 51.44/18.31  																													| (1749) intruder_message(all_835_5_977) = all_1276_0_2314 & intruder_message(all_835_6_978) = all_1276_1_2315 & intruder_message(all_285_7_623) = all_1276_2_2316 & intruder_message(all_61_4_176) = all_1276_3_2317 & ( ~ (all_1276_1_2315 = 0) |  ~ (all_1276_2_2316 = 0) |  ~ (all_1276_3_2317 = 0) | all_1276_0_2314 = 0)
% 51.44/18.31  																													|
% 51.44/18.31  																													| Applying alpha-rule on (1749) yields:
% 51.44/18.31  																													| (1750) intruder_message(all_835_6_978) = all_1276_1_2315
% 51.44/18.31  																													| (1751) intruder_message(all_835_5_977) = all_1276_0_2314
% 51.44/18.31  																													| (1752)  ~ (all_1276_1_2315 = 0) |  ~ (all_1276_2_2316 = 0) |  ~ (all_1276_3_2317 = 0) | all_1276_0_2314 = 0
% 51.44/18.31  																													| (1753) intruder_message(all_61_4_176) = all_1276_3_2317
% 51.44/18.31  																													| (1754) intruder_message(all_285_7_623) = all_1276_2_2316
% 51.44/18.31  																													|
% 51.44/18.31  																													| Instantiating (1518) with all_1314_0_2404, all_1314_1_2405, all_1314_2_2406, all_1314_3_2407 yields:
% 51.44/18.31  																													| (1755) intruder_message(all_837_5_988) = all_1314_3_2407 & intruder_message(all_835_6_978) = all_1314_0_2404 & intruder_message(all_285_7_623) = all_1314_1_2405 & intruder_message(all_63_4_187) = all_1314_2_2406 & ( ~ (all_1314_3_2407 = 0) | (all_1314_0_2404 = 0 & all_1314_1_2405 = 0 & all_1314_2_2406 = 0))
% 51.44/18.31  																													|
% 51.44/18.31  																													| Applying alpha-rule on (1755) yields:
% 51.44/18.31  																													| (1756) intruder_message(all_835_6_978) = all_1314_0_2404
% 51.44/18.32  																													| (1757) intruder_message(all_837_5_988) = all_1314_3_2407
% 51.44/18.32  																													| (1758) intruder_message(all_285_7_623) = all_1314_1_2405
% 51.44/18.32  																													| (1759) intruder_message(all_63_4_187) = all_1314_2_2406
% 51.44/18.32  																													| (1760)  ~ (all_1314_3_2407 = 0) | (all_1314_0_2404 = 0 & all_1314_1_2405 = 0 & all_1314_2_2406 = 0)
% 51.44/18.32  																													|
% 51.44/18.32  																													| Instantiating (1517) with all_1316_0_2408, all_1316_1_2409, all_1316_2_2410, all_1316_3_2411 yields:
% 51.44/18.32  																													| (1761) intruder_message(all_837_5_988) = all_1316_0_2408 & intruder_message(all_835_6_978) = all_1316_1_2409 & intruder_message(all_285_7_623) = all_1316_2_2410 & intruder_message(all_63_4_187) = all_1316_3_2411 & ( ~ (all_1316_1_2409 = 0) |  ~ (all_1316_2_2410 = 0) |  ~ (all_1316_3_2411 = 0) | all_1316_0_2408 = 0)
% 51.44/18.32  																													|
% 51.44/18.32  																													| Applying alpha-rule on (1761) yields:
% 51.44/18.32  																													| (1762) intruder_message(all_285_7_623) = all_1316_2_2410
% 51.44/18.32  																													| (1763) intruder_message(all_837_5_988) = all_1316_0_2408
% 51.44/18.32  																													| (1764) intruder_message(all_63_4_187) = all_1316_3_2411
% 51.44/18.32  																													| (1765)  ~ (all_1316_1_2409 = 0) |  ~ (all_1316_2_2410 = 0) |  ~ (all_1316_3_2411 = 0) | all_1316_0_2408 = 0
% 51.44/18.32  																													| (1766) intruder_message(all_835_6_978) = all_1316_1_2409
% 51.44/18.32  																													|
% 51.44/18.32  																													| Instantiating (1736) with all_1362_0_2514, all_1362_1_2515, all_1362_2_2516 yields:
% 51.44/18.32  																													| (1767) party_of_protocol(a) = all_1362_2_2516 & intruder_message(all_1362_1_2515) = all_1362_0_2514 & encrypt(all_13_7_53, an_a_nonce) = all_1362_1_2515 & ( ~ (all_1362_2_2516 = 0) | all_1362_0_2514 = 0)
% 51.44/18.32  																													|
% 51.44/18.32  																													| Applying alpha-rule on (1767) yields:
% 51.44/18.32  																													| (1768) party_of_protocol(a) = all_1362_2_2516
% 51.44/18.32  																													| (1769) intruder_message(all_1362_1_2515) = all_1362_0_2514
% 51.44/18.32  																													| (1770) encrypt(all_13_7_53, an_a_nonce) = all_1362_1_2515
% 51.44/18.32  																													| (1771)  ~ (all_1362_2_2516 = 0) | all_1362_0_2514 = 0
% 51.44/18.32  																													|
% 51.44/18.32  																													| Instantiating (1506) with all_1380_0_2541, all_1380_1_2542, all_1380_2_2543 yields:
% 51.44/18.32  																													| (1772) party_of_protocol(a) = all_1380_2_2543 & intruder_message(all_1380_1_2542) = all_1380_0_2541 & encrypt(all_0_2_2, an_a_nonce) = all_1380_1_2542 & ( ~ (all_1380_2_2543 = 0) | all_1380_0_2541 = 0)
% 51.44/18.32  																													|
% 51.44/18.32  																													| Applying alpha-rule on (1772) yields:
% 51.44/18.32  																													| (1773) party_of_protocol(a) = all_1380_2_2543
% 51.44/18.32  																													| (1774) intruder_message(all_1380_1_2542) = all_1380_0_2541
% 51.44/18.32  																													| (1775) encrypt(all_0_2_2, an_a_nonce) = all_1380_1_2542
% 51.44/18.32  																													| (1776)  ~ (all_1380_2_2543 = 0) | all_1380_0_2541 = 0
% 51.44/18.32  																													|
% 51.44/18.32  																													| Instantiating (1505) with all_1382_0_2544, all_1382_1_2545, all_1382_2_2546 yields:
% 51.44/18.32  																													| (1777) party_of_protocol(a) = all_1382_2_2546 & intruder_message(all_1382_1_2545) = all_1382_0_2544 & encrypt(all_17_1_81, an_a_nonce) = all_1382_1_2545 & ( ~ (all_1382_2_2546 = 0) | all_1382_0_2544 = 0)
% 51.44/18.32  																													|
% 51.44/18.32  																													| Applying alpha-rule on (1777) yields:
% 51.44/18.32  																													| (1778) party_of_protocol(a) = all_1382_2_2546
% 51.44/18.32  																													| (1779) intruder_message(all_1382_1_2545) = all_1382_0_2544
% 51.44/18.32  																													| (1780) encrypt(all_17_1_81, an_a_nonce) = all_1382_1_2545
% 51.44/18.32  																													| (1781)  ~ (all_1382_2_2546 = 0) | all_1382_0_2544 = 0
% 51.44/18.32  																													|
% 51.44/18.32  																													| Instantiating (1504) with all_1384_0_2547, all_1384_1_2548, all_1384_2_2549 yields:
% 51.44/18.32  																													| (1782) party_of_protocol(a) = all_1384_2_2549 & intruder_message(all_1384_1_2548) = all_1384_0_2547 & encrypt(all_19_5_94, an_a_nonce) = all_1384_1_2548 & ( ~ (all_1384_2_2549 = 0) | all_1384_0_2547 = 0)
% 51.44/18.32  																													|
% 51.44/18.32  																													| Applying alpha-rule on (1782) yields:
% 51.44/18.32  																													| (1783) party_of_protocol(a) = all_1384_2_2549
% 51.44/18.32  																													| (1784) intruder_message(all_1384_1_2548) = all_1384_0_2547
% 51.44/18.32  																													| (1785) encrypt(all_19_5_94, an_a_nonce) = all_1384_1_2548
% 51.44/18.32  																													| (1786)  ~ (all_1384_2_2549 = 0) | all_1384_0_2547 = 0
% 51.44/18.32  																													|
% 51.44/18.32  																													| Instantiating (1510) with all_1388_0_2553, all_1388_1_2554, all_1388_2_2555 yields:
% 51.44/18.32  																													| (1787) party_of_protocol(a) = all_1388_2_2555 & intruder_message(all_1388_1_2554) = all_1388_0_2553 & encrypt(a, an_a_nonce) = all_1388_1_2554 & ( ~ (all_1388_2_2555 = 0) | all_1388_0_2553 = 0)
% 51.44/18.32  																													|
% 51.44/18.32  																													| Applying alpha-rule on (1787) yields:
% 51.44/18.32  																													| (1788) party_of_protocol(a) = all_1388_2_2555
% 51.44/18.32  																													| (1789) intruder_message(all_1388_1_2554) = all_1388_0_2553
% 51.44/18.32  																													| (1790) encrypt(a, an_a_nonce) = all_1388_1_2554
% 51.44/18.32  																													| (1791)  ~ (all_1388_2_2555 = 0) | all_1388_0_2553 = 0
% 51.44/18.32  																													|
% 51.44/18.32  																													| Instantiating (1509) with all_1390_0_2556, all_1390_1_2557, all_1390_2_2558 yields:
% 51.44/18.32  																													| (1792) party_of_protocol(a) = all_1390_2_2558 & intruder_message(all_1390_1_2557) = all_1390_0_2556 & encrypt(b, an_a_nonce) = all_1390_1_2557 & ( ~ (all_1390_2_2558 = 0) | all_1390_0_2556 = 0)
% 51.44/18.32  																													|
% 51.44/18.32  																													| Applying alpha-rule on (1792) yields:
% 51.44/18.32  																													| (1793) party_of_protocol(a) = all_1390_2_2558
% 51.44/18.32  																													| (1794) intruder_message(all_1390_1_2557) = all_1390_0_2556
% 51.44/18.32  																													| (1795) encrypt(b, an_a_nonce) = all_1390_1_2557
% 51.44/18.32  																													| (1796)  ~ (all_1390_2_2558 = 0) | all_1390_0_2556 = 0
% 51.44/18.32  																													|
% 51.44/18.32  																													| Instantiating (1508) with all_1392_0_2559, all_1392_1_2560, all_1392_2_2561 yields:
% 51.44/18.32  																													| (1797) party_of_protocol(a) = all_1392_2_2561 & intruder_message(all_1392_1_2560) = all_1392_0_2559 & encrypt(an_a_nonce, an_a_nonce) = all_1392_1_2560 & ( ~ (all_1392_2_2561 = 0) | all_1392_0_2559 = 0)
% 51.44/18.32  																													|
% 51.44/18.32  																													| Applying alpha-rule on (1797) yields:
% 51.44/18.32  																													| (1798) party_of_protocol(a) = all_1392_2_2561
% 51.44/18.32  																													| (1799) intruder_message(all_1392_1_2560) = all_1392_0_2559
% 51.44/18.32  																													| (1800) encrypt(an_a_nonce, an_a_nonce) = all_1392_1_2560
% 51.44/18.32  																													| (1801)  ~ (all_1392_2_2561 = 0) | all_1392_0_2559 = 0
% 51.44/18.32  																													|
% 51.44/18.32  																													| Instantiating (1503) with all_1394_0_2562, all_1394_1_2563, all_1394_2_2564 yields:
% 51.44/18.32  																													| (1802) party_of_protocol(a) = all_1394_2_2564 & intruder_message(all_1394_1_2563) = all_1394_0_2562 & encrypt(all_61_7_179, an_a_nonce) = all_1394_1_2563 & ( ~ (all_1394_2_2564 = 0) | all_1394_0_2562 = 0)
% 51.44/18.32  																													|
% 51.44/18.32  																													| Applying alpha-rule on (1802) yields:
% 51.44/18.32  																													| (1803) party_of_protocol(a) = all_1394_2_2564
% 51.44/18.32  																													| (1804) intruder_message(all_1394_1_2563) = all_1394_0_2562
% 51.44/18.32  																													| (1805) encrypt(all_61_7_179, an_a_nonce) = all_1394_1_2563
% 51.44/18.32  																													| (1806)  ~ (all_1394_2_2564 = 0) | all_1394_0_2562 = 0
% 51.44/18.32  																													|
% 51.44/18.32  																													| Instantiating (1502) with all_1396_0_2565, all_1396_1_2566, all_1396_2_2567 yields:
% 51.44/18.32  																													| (1807) party_of_protocol(a) = all_1396_2_2567 & intruder_message(all_1396_1_2566) = all_1396_0_2565 & encrypt(all_61_4_176, an_a_nonce) = all_1396_1_2566 & ( ~ (all_1396_2_2567 = 0) | all_1396_0_2565 = 0)
% 51.44/18.32  																													|
% 51.44/18.32  																													| Applying alpha-rule on (1807) yields:
% 51.44/18.32  																													| (1808) party_of_protocol(a) = all_1396_2_2567
% 51.44/18.32  																													| (1809) intruder_message(all_1396_1_2566) = all_1396_0_2565
% 51.44/18.32  																													| (1810) encrypt(all_61_4_176, an_a_nonce) = all_1396_1_2566
% 51.44/18.32  																													| (1811)  ~ (all_1396_2_2567 = 0) | all_1396_0_2565 = 0
% 51.44/18.32  																													|
% 51.44/18.32  																													| Instantiating (1501) with all_1398_0_2568, all_1398_1_2569, all_1398_2_2570 yields:
% 51.44/18.32  																													| (1812) party_of_protocol(a) = all_1398_2_2570 & intruder_message(all_1398_1_2569) = all_1398_0_2568 & encrypt(all_61_3_175, an_a_nonce) = all_1398_1_2569 & ( ~ (all_1398_2_2570 = 0) | all_1398_0_2568 = 0)
% 51.44/18.32  																													|
% 51.44/18.32  																													| Applying alpha-rule on (1812) yields:
% 51.44/18.32  																													| (1813) party_of_protocol(a) = all_1398_2_2570
% 51.44/18.32  																													| (1814) intruder_message(all_1398_1_2569) = all_1398_0_2568
% 51.44/18.32  																													| (1815) encrypt(all_61_3_175, an_a_nonce) = all_1398_1_2569
% 51.44/18.32  																													| (1816)  ~ (all_1398_2_2570 = 0) | all_1398_0_2568 = 0
% 51.44/18.32  																													|
% 51.44/18.32  																													| Instantiating (1500) with all_1400_0_2571, all_1400_1_2572, all_1400_2_2573 yields:
% 51.44/18.32  																													| (1817) party_of_protocol(a) = all_1400_2_2573 & intruder_message(all_1400_1_2572) = all_1400_0_2571 & encrypt(all_63_4_187, an_a_nonce) = all_1400_1_2572 & ( ~ (all_1400_2_2573 = 0) | all_1400_0_2571 = 0)
% 51.44/18.32  																													|
% 51.44/18.32  																													| Applying alpha-rule on (1817) yields:
% 51.44/18.32  																													| (1818) party_of_protocol(a) = all_1400_2_2573
% 51.44/18.32  																													| (1819) intruder_message(all_1400_1_2572) = all_1400_0_2571
% 51.44/18.32  																													| (1820) encrypt(all_63_4_187, an_a_nonce) = all_1400_1_2572
% 51.44/18.32  																													| (1821)  ~ (all_1400_2_2573 = 0) | all_1400_0_2571 = 0
% 51.44/18.32  																													|
% 51.44/18.32  																													| Instantiating (1507) with all_1402_0_2574, all_1402_1_2575, all_1402_2_2576 yields:
% 51.44/18.32  																													| (1822) party_of_protocol(a) = all_1402_2_2576 & intruder_message(all_1402_1_2575) = all_1402_0_2574 & encrypt(all_0_3_3, an_a_nonce) = all_1402_1_2575 & ( ~ (all_1402_2_2576 = 0) | all_1402_0_2574 = 0)
% 51.44/18.32  																													|
% 51.44/18.32  																													| Applying alpha-rule on (1822) yields:
% 51.44/18.32  																													| (1823) party_of_protocol(a) = all_1402_2_2576
% 51.44/18.32  																													| (1824) intruder_message(all_1402_1_2575) = all_1402_0_2574
% 51.44/18.32  																													| (1825) encrypt(all_0_3_3, an_a_nonce) = all_1402_1_2575
% 51.44/18.32  																													| (1826)  ~ (all_1402_2_2576 = 0) | all_1402_0_2574 = 0
% 51.44/18.32  																													|
% 51.44/18.32  																													| Instantiating (1522) with all_1410_0_2588, all_1410_1_2589, all_1410_2_2590 yields:
% 51.44/18.32  																													| (1827) intruder_holds(all_833_2_971) = all_1410_0_2588 & party_of_protocol(a) = all_1410_1_2589 & intruder_message(all_17_7_87) = all_1410_2_2590 & ( ~ (all_1410_1_2589 = 0) |  ~ (all_1410_2_2590 = 0) | all_1410_0_2588 = 0)
% 51.44/18.32  																													|
% 51.44/18.32  																													| Applying alpha-rule on (1827) yields:
% 51.44/18.32  																													| (1828) intruder_holds(all_833_2_971) = all_1410_0_2588
% 51.44/18.32  																													| (1829) party_of_protocol(a) = all_1410_1_2589
% 51.44/18.33  																													| (1830) intruder_message(all_17_7_87) = all_1410_2_2590
% 51.44/18.33  																													| (1831)  ~ (all_1410_1_2589 = 0) |  ~ (all_1410_2_2590 = 0) | all_1410_0_2588 = 0
% 51.44/18.33  																													|
% 51.44/18.33  																													| Instantiating (1521) with all_1424_0_2608, all_1424_1_2609, all_1424_2_2610 yields:
% 51.44/18.33  																													| (1832) intruder_holds(all_745_2_805) = all_1424_0_2608 & party_of_protocol(a) = all_1424_1_2609 & intruder_message(all_19_7_96) = all_1424_2_2610 & ( ~ (all_1424_1_2609 = 0) |  ~ (all_1424_2_2610 = 0) | all_1424_0_2608 = 0)
% 51.44/18.33  																													|
% 51.44/18.33  																													| Applying alpha-rule on (1832) yields:
% 51.44/18.33  																													| (1833) intruder_holds(all_745_2_805) = all_1424_0_2608
% 51.44/18.33  																													| (1834) party_of_protocol(a) = all_1424_1_2609
% 51.44/18.33  																													| (1835) intruder_message(all_19_7_96) = all_1424_2_2610
% 51.44/18.33  																													| (1836)  ~ (all_1424_1_2609 = 0) |  ~ (all_1424_2_2610 = 0) | all_1424_0_2608 = 0
% 51.44/18.33  																													|
% 51.44/18.33  																													| Instantiating (1511) with all_1450_0_2655, all_1450_1_2656, all_1450_2_2657 yields:
% 51.44/18.33  																													| (1837) party_of_protocol(b) = all_1450_2_2657 & intruder_message(all_1450_1_2656) = all_1450_0_2655 & encrypt(all_61_7_179, an_a_nonce) = all_1450_1_2656 & ( ~ (all_1450_2_2657 = 0) | all_1450_0_2655 = 0)
% 51.44/18.33  																													|
% 51.44/18.33  																													| Applying alpha-rule on (1837) yields:
% 51.44/18.33  																													| (1838) party_of_protocol(b) = all_1450_2_2657
% 51.44/18.33  																													| (1839) intruder_message(all_1450_1_2656) = all_1450_0_2655
% 51.44/18.33  																													| (1840) encrypt(all_61_7_179, an_a_nonce) = all_1450_1_2656
% 51.44/18.33  																													| (1841)  ~ (all_1450_2_2657 = 0) | all_1450_0_2655 = 0
% 51.44/18.33  																													|
% 51.44/18.33  																													| Instantiating (1499) with all_1456_0_2672, all_1456_1_2673, all_1456_2_2674 yields:
% 51.44/18.33  																													| (1842) party_of_protocol(a) = all_1456_2_2674 & intruder_message(all_1456_1_2673) = all_1456_0_2672 & encrypt(all_63_3_186, an_a_nonce) = all_1456_1_2673 & ( ~ (all_1456_2_2674 = 0) | all_1456_0_2672 = 0)
% 51.44/18.33  																													|
% 51.44/18.33  																													| Applying alpha-rule on (1842) yields:
% 51.44/18.33  																													| (1843) party_of_protocol(a) = all_1456_2_2674
% 51.44/18.33  																													| (1844) intruder_message(all_1456_1_2673) = all_1456_0_2672
% 51.44/18.33  																													| (1845) encrypt(all_63_3_186, an_a_nonce) = all_1456_1_2673
% 51.44/18.33  																													| (1846)  ~ (all_1456_2_2674 = 0) | all_1456_0_2672 = 0
% 51.44/18.33  																													|
% 51.44/18.33  																													+-Applying beta-rule and splitting (1515), into two cases.
% 51.44/18.33  																													|-Branch one:
% 51.44/18.33  																													| (1628) all_823_0_954 = 0
% 51.44/18.33  																													|
% 51.44/18.33  																														| Equations (1628) can reduce 1488 to:
% 51.44/18.33  																														| (551) $false
% 51.44/18.33  																														|
% 51.44/18.33  																														|-The branch is then unsatisfiable
% 51.44/18.33  																													|-Branch two:
% 51.44/18.33  																													| (1488)  ~ (all_823_0_954 = 0)
% 51.44/18.33  																													| (1631)  ? [v0] :  ? [v1] :  ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_61_7_179) = v0 & key(an_a_nonce, a) = v1 & ( ~ (v2 = 0) |  ~ (v0 = 0)))
% 51.44/18.33  																													|
% 51.44/18.33  																														+-Applying beta-rule and splitting (1514), into two cases.
% 51.44/18.33  																														|-Branch one:
% 51.44/18.33  																														| (1628) all_823_0_954 = 0
% 51.44/18.33  																														|
% 51.44/18.33  																															| Equations (1628) can reduce 1488 to:
% 51.44/18.33  																															| (551) $false
% 51.44/18.33  																															|
% 51.44/18.33  																															|-The branch is then unsatisfiable
% 51.44/18.33  																														|-Branch two:
% 51.44/18.33  																														| (1488)  ~ (all_823_0_954 = 0)
% 51.44/18.33  																														| (1639)  ? [v0] :  ? [v1] :  ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_61_7_179) = v0 & key(an_a_nonce, b) = v1 & ( ~ (v2 = 0) |  ~ (v0 = 0)))
% 51.44/18.33  																														|
% 51.44/18.33  																															+-Applying beta-rule and splitting (1516), into two cases.
% 51.44/18.33  																															|-Branch one:
% 51.44/18.33  																															| (1628) all_823_0_954 = 0
% 51.44/18.33  																															|
% 51.44/18.33  																																| Equations (1628) can reduce 1488 to:
% 51.44/18.33  																																| (551) $false
% 51.44/18.33  																																|
% 51.44/18.33  																																|-The branch is then unsatisfiable
% 51.44/18.33  																															|-Branch two:
% 51.44/18.33  																															| (1488)  ~ (all_823_0_954 = 0)
% 51.44/18.33  																															| (1635)  ? [v0] :  ? [v1] :  ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_61_7_179) = v0 & key(an_a_nonce, t) = v1 & ( ~ (v2 = 0) |  ~ (v0 = 0)))
% 51.44/18.33  																															|
% 51.44/18.33  																																| Instantiating formula (66) with a, all_1424_1_2609, all_1456_2_2674 and discharging atoms party_of_protocol(a) = all_1456_2_2674, party_of_protocol(a) = all_1424_1_2609, yields:
% 51.44/18.33  																																| (1859) all_1456_2_2674 = all_1424_1_2609
% 51.44/18.33  																																|
% 51.44/18.33  																																| Instantiating formula (66) with a, all_1410_1_2589, all_1424_1_2609 and discharging atoms party_of_protocol(a) = all_1424_1_2609, party_of_protocol(a) = all_1410_1_2589, yields:
% 51.44/18.33  																																| (1860) all_1424_1_2609 = all_1410_1_2589
% 51.44/18.33  																																|
% 51.44/18.33  																																| Instantiating formula (66) with a, all_1402_2_2576, all_1410_1_2589 and discharging atoms party_of_protocol(a) = all_1410_1_2589, party_of_protocol(a) = all_1402_2_2576, yields:
% 51.44/18.33  																																| (1861) all_1410_1_2589 = all_1402_2_2576
% 51.44/18.33  																																|
% 51.44/18.33  																																| Instantiating formula (66) with a, all_1400_2_2573, all_1402_2_2576 and discharging atoms party_of_protocol(a) = all_1402_2_2576, party_of_protocol(a) = all_1400_2_2573, yields:
% 51.44/18.33  																																| (1862) all_1402_2_2576 = all_1400_2_2573
% 51.44/18.33  																																|
% 51.44/18.33  																																| Instantiating formula (66) with a, all_1398_2_2570, all_1400_2_2573 and discharging atoms party_of_protocol(a) = all_1400_2_2573, party_of_protocol(a) = all_1398_2_2570, yields:
% 51.44/18.33  																																| (1863) all_1400_2_2573 = all_1398_2_2570
% 51.44/18.33  																																|
% 51.44/18.33  																																| Instantiating formula (66) with a, all_1396_2_2567, all_1398_2_2570 and discharging atoms party_of_protocol(a) = all_1398_2_2570, party_of_protocol(a) = all_1396_2_2567, yields:
% 51.44/18.33  																																| (1864) all_1398_2_2570 = all_1396_2_2567
% 51.44/18.33  																																|
% 51.44/18.33  																																| Instantiating formula (66) with a, all_1394_2_2564, all_1396_2_2567 and discharging atoms party_of_protocol(a) = all_1396_2_2567, party_of_protocol(a) = all_1394_2_2564, yields:
% 51.44/18.33  																																| (1865) all_1396_2_2567 = all_1394_2_2564
% 51.44/18.33  																																|
% 51.44/18.33  																																| Instantiating formula (66) with a, all_1392_2_2561, 0 and discharging atoms party_of_protocol(a) = all_1392_2_2561, party_of_protocol(a) = 0, yields:
% 51.44/18.33  																																| (1866) all_1392_2_2561 = 0
% 51.44/18.33  																																|
% 51.44/18.33  																																| Instantiating formula (66) with a, all_1390_2_2558, all_1392_2_2561 and discharging atoms party_of_protocol(a) = all_1392_2_2561, party_of_protocol(a) = all_1390_2_2558, yields:
% 51.44/18.33  																																| (1867) all_1392_2_2561 = all_1390_2_2558
% 51.44/18.33  																																|
% 51.44/18.33  																																| Instantiating formula (66) with a, all_1388_2_2555, all_1396_2_2567 and discharging atoms party_of_protocol(a) = all_1396_2_2567, party_of_protocol(a) = all_1388_2_2555, yields:
% 51.44/18.33  																																| (1868) all_1396_2_2567 = all_1388_2_2555
% 51.44/18.33  																																|
% 51.44/18.33  																																| Instantiating formula (66) with a, all_1388_2_2555, all_1390_2_2558 and discharging atoms party_of_protocol(a) = all_1390_2_2558, party_of_protocol(a) = all_1388_2_2555, yields:
% 51.44/18.33  																																| (1869) all_1390_2_2558 = all_1388_2_2555
% 51.44/18.33  																																|
% 51.44/18.33  																																| Instantiating formula (66) with a, all_1384_2_2549, all_1392_2_2561 and discharging atoms party_of_protocol(a) = all_1392_2_2561, party_of_protocol(a) = all_1384_2_2549, yields:
% 51.44/18.33  																																| (1870) all_1392_2_2561 = all_1384_2_2549
% 51.44/18.33  																																|
% 51.44/18.33  																																| Instantiating formula (66) with a, all_1382_2_2546, all_1390_2_2558 and discharging atoms party_of_protocol(a) = all_1390_2_2558, party_of_protocol(a) = all_1382_2_2546, yields:
% 51.44/18.33  																																| (1871) all_1390_2_2558 = all_1382_2_2546
% 51.44/18.33  																																|
% 51.44/18.33  																																| Instantiating formula (66) with a, all_1380_2_2543, all_1392_2_2561 and discharging atoms party_of_protocol(a) = all_1392_2_2561, party_of_protocol(a) = all_1380_2_2543, yields:
% 51.44/18.33  																																| (1872) all_1392_2_2561 = all_1380_2_2543
% 51.44/18.33  																																|
% 51.44/18.33  																																| Instantiating formula (66) with a, all_1362_2_2516, all_1456_2_2674 and discharging atoms party_of_protocol(a) = all_1456_2_2674, party_of_protocol(a) = all_1362_2_2516, yields:
% 51.44/18.33  																																| (1873) all_1456_2_2674 = all_1362_2_2516
% 51.44/18.33  																																|
% 51.44/18.33  																																| Instantiating formula (31) with all_285_7_623, all_1314_1_2405, all_823_0_954 and discharging atoms intruder_message(all_285_7_623) = all_1314_1_2405, intruder_message(all_285_7_623) = all_823_0_954, yields:
% 51.44/18.33  																																| (1874) all_1314_1_2405 = all_823_0_954
% 51.44/18.33  																																|
% 51.44/18.33  																																| Instantiating formula (31) with all_285_7_623, all_1314_1_2405, all_1316_2_2410 and discharging atoms intruder_message(all_285_7_623) = all_1316_2_2410, intruder_message(all_285_7_623) = all_1314_1_2405, yields:
% 51.44/18.33  																																| (1875) all_1316_2_2410 = all_1314_1_2405
% 51.44/18.33  																																|
% 51.44/18.33  																																| Instantiating formula (31) with all_285_7_623, all_1276_2_2316, all_1314_1_2405 and discharging atoms intruder_message(all_285_7_623) = all_1314_1_2405, intruder_message(all_285_7_623) = all_1276_2_2316, yields:
% 51.44/18.33  																																| (1876) all_1314_1_2405 = all_1276_2_2316
% 51.44/18.33  																																|
% 51.44/18.33  																																| Instantiating formula (31) with all_285_7_623, all_1274_1_2311, all_1316_2_2410 and discharging atoms intruder_message(all_285_7_623) = all_1316_2_2410, intruder_message(all_285_7_623) = all_1274_1_2311, yields:
% 51.44/18.33  																																| (1877) all_1316_2_2410 = all_1274_1_2311
% 51.44/18.33  																																|
% 51.44/18.33  																																| Instantiating formula (8) with all_61_7_179, an_a_nonce, all_1450_1_2656, all_285_7_623 and discharging atoms encrypt(all_61_7_179, an_a_nonce) = all_1450_1_2656, encrypt(all_61_7_179, an_a_nonce) = all_285_7_623, yields:
% 51.44/18.33  																																| (1878) all_1450_1_2656 = all_285_7_623
% 51.44/18.33  																																|
% 51.44/18.33  																																| Instantiating formula (8) with all_61_7_179, an_a_nonce, all_1394_1_2563, all_1450_1_2656 and discharging atoms encrypt(all_61_7_179, an_a_nonce) = all_1450_1_2656, encrypt(all_61_7_179, an_a_nonce) = all_1394_1_2563, yields:
% 51.44/18.33  																																| (1879) all_1450_1_2656 = all_1394_1_2563
% 51.44/18.33  																																|
% 51.44/18.33  																																| Combining equations (1859,1873) yields a new equation:
% 51.44/18.33  																																| (1880) all_1424_1_2609 = all_1362_2_2516
% 51.44/18.33  																																|
% 51.44/18.33  																																| Simplifying 1880 yields:
% 51.44/18.33  																																| (1881) all_1424_1_2609 = all_1362_2_2516
% 51.44/18.33  																																|
% 51.44/18.33  																																| Combining equations (1878,1879) yields a new equation:
% 51.44/18.33  																																| (1882) all_1394_1_2563 = all_285_7_623
% 51.44/18.33  																																|
% 51.44/18.33  																																| Combining equations (1860,1881) yields a new equation:
% 51.44/18.33  																																| (1883) all_1410_1_2589 = all_1362_2_2516
% 51.44/18.33  																																|
% 51.44/18.33  																																| Simplifying 1883 yields:
% 51.44/18.33  																																| (1884) all_1410_1_2589 = all_1362_2_2516
% 51.44/18.33  																																|
% 51.44/18.33  																																| Combining equations (1861,1884) yields a new equation:
% 51.44/18.33  																																| (1885) all_1402_2_2576 = all_1362_2_2516
% 51.44/18.33  																																|
% 51.44/18.33  																																| Simplifying 1885 yields:
% 51.44/18.33  																																| (1886) all_1402_2_2576 = all_1362_2_2516
% 51.44/18.33  																																|
% 51.44/18.33  																																| Combining equations (1862,1886) yields a new equation:
% 51.44/18.33  																																| (1887) all_1400_2_2573 = all_1362_2_2516
% 51.44/18.33  																																|
% 51.44/18.33  																																| Simplifying 1887 yields:
% 51.44/18.33  																																| (1888) all_1400_2_2573 = all_1362_2_2516
% 51.44/18.33  																																|
% 51.44/18.33  																																| Combining equations (1863,1888) yields a new equation:
% 51.44/18.33  																																| (1889) all_1398_2_2570 = all_1362_2_2516
% 51.44/18.33  																																|
% 51.44/18.33  																																| Simplifying 1889 yields:
% 51.44/18.33  																																| (1890) all_1398_2_2570 = all_1362_2_2516
% 51.44/18.33  																																|
% 51.44/18.33  																																| Combining equations (1864,1890) yields a new equation:
% 51.44/18.33  																																| (1891) all_1396_2_2567 = all_1362_2_2516
% 51.44/18.33  																																|
% 51.44/18.33  																																| Simplifying 1891 yields:
% 51.44/18.33  																																| (1892) all_1396_2_2567 = all_1362_2_2516
% 51.44/18.33  																																|
% 51.44/18.33  																																| Combining equations (1868,1865) yields a new equation:
% 51.44/18.33  																																| (1893) all_1394_2_2564 = all_1388_2_2555
% 51.44/18.33  																																|
% 51.44/18.33  																																| Combining equations (1892,1865) yields a new equation:
% 51.44/18.33  																																| (1894) all_1394_2_2564 = all_1362_2_2516
% 51.44/18.33  																																|
% 51.44/18.33  																																| Combining equations (1893,1894) yields a new equation:
% 51.44/18.33  																																| (1895) all_1388_2_2555 = all_1362_2_2516
% 51.44/18.33  																																|
% 51.44/18.33  																																| Simplifying 1895 yields:
% 51.44/18.33  																																| (1896) all_1388_2_2555 = all_1362_2_2516
% 51.44/18.33  																																|
% 51.44/18.33  																																| Combining equations (1872,1870) yields a new equation:
% 51.44/18.33  																																| (1897) all_1384_2_2549 = all_1380_2_2543
% 51.44/18.33  																																|
% 51.44/18.33  																																| Combining equations (1866,1870) yields a new equation:
% 51.44/18.33  																																| (1898) all_1384_2_2549 = 0
% 51.44/18.33  																																|
% 51.44/18.33  																																| Combining equations (1867,1870) yields a new equation:
% 51.44/18.33  																																| (1899) all_1390_2_2558 = all_1384_2_2549
% 51.44/18.33  																																|
% 51.44/18.33  																																| Simplifying 1899 yields:
% 51.44/18.33  																																| (1900) all_1390_2_2558 = all_1384_2_2549
% 51.44/18.33  																																|
% 51.44/18.33  																																| Combining equations (1900,1871) yields a new equation:
% 51.44/18.34  																																| (1901) all_1384_2_2549 = all_1382_2_2546
% 51.44/18.34  																																|
% 51.44/18.34  																																| Simplifying 1901 yields:
% 51.44/18.34  																																| (1902) all_1384_2_2549 = all_1382_2_2546
% 51.44/18.34  																																|
% 51.44/18.34  																																| Combining equations (1869,1871) yields a new equation:
% 51.44/18.34  																																| (1903) all_1388_2_2555 = all_1382_2_2546
% 51.44/18.34  																																|
% 51.44/18.34  																																| Simplifying 1903 yields:
% 51.44/18.34  																																| (1904) all_1388_2_2555 = all_1382_2_2546
% 51.44/18.34  																																|
% 51.44/18.34  																																| Combining equations (1904,1896) yields a new equation:
% 51.44/18.34  																																| (1905) all_1382_2_2546 = all_1362_2_2516
% 51.44/18.34  																																|
% 51.44/18.34  																																| Simplifying 1905 yields:
% 51.44/18.34  																																| (1906) all_1382_2_2546 = all_1362_2_2516
% 51.44/18.34  																																|
% 51.44/18.34  																																| Combining equations (1898,1897) yields a new equation:
% 51.44/18.34  																																| (1907) all_1380_2_2543 = 0
% 51.44/18.34  																																|
% 51.44/18.34  																																| Combining equations (1902,1897) yields a new equation:
% 51.44/18.34  																																| (1908) all_1382_2_2546 = all_1380_2_2543
% 51.44/18.34  																																|
% 51.44/18.34  																																| Simplifying 1908 yields:
% 51.44/18.34  																																| (1909) all_1382_2_2546 = all_1380_2_2543
% 51.44/18.34  																																|
% 51.44/18.34  																																| Combining equations (1909,1906) yields a new equation:
% 51.44/18.34  																																| (1910) all_1380_2_2543 = all_1362_2_2516
% 51.44/18.34  																																|
% 51.44/18.34  																																| Simplifying 1910 yields:
% 51.44/18.34  																																| (1911) all_1380_2_2543 = all_1362_2_2516
% 51.44/18.34  																																|
% 51.44/18.34  																																| Combining equations (1907,1911) yields a new equation:
% 51.44/18.34  																																| (1912) all_1362_2_2516 = 0
% 51.44/18.34  																																|
% 51.44/18.34  																																| Combining equations (1875,1877) yields a new equation:
% 51.44/18.34  																																| (1913) all_1314_1_2405 = all_1274_1_2311
% 51.44/18.34  																																|
% 51.44/18.34  																																| Simplifying 1913 yields:
% 51.44/18.34  																																| (1914) all_1314_1_2405 = all_1274_1_2311
% 51.44/18.34  																																|
% 51.44/18.34  																																| Combining equations (1914,1876) yields a new equation:
% 51.44/18.34  																																| (1915) all_1276_2_2316 = all_1274_1_2311
% 51.44/18.34  																																|
% 51.44/18.34  																																| Combining equations (1874,1876) yields a new equation:
% 51.44/18.34  																																| (1916) all_1276_2_2316 = all_823_0_954
% 51.44/18.34  																																|
% 51.44/18.34  																																| Combining equations (1915,1916) yields a new equation:
% 51.44/18.34  																																| (1917) all_1274_1_2311 = all_823_0_954
% 51.44/18.34  																																|
% 51.44/18.34  																																| Simplifying 1917 yields:
% 51.44/18.34  																																| (1918) all_1274_1_2311 = all_823_0_954
% 51.44/18.34  																																|
% 51.44/18.34  																																| Combining equations (1912,1894) yields a new equation:
% 51.44/18.34  																																| (1919) all_1394_2_2564 = 0
% 51.44/18.34  																																|
% 51.44/18.34  																																| From (1882) and (1804) follows:
% 51.44/18.34  																																| (1920) intruder_message(all_285_7_623) = all_1394_0_2562
% 51.44/18.34  																																|
% 51.44/18.34  																																| From (1918) and (1744) follows:
% 51.44/18.34  																																| (1319) intruder_message(all_285_7_623) = all_823_0_954
% 51.44/18.34  																																|
% 51.44/18.34  																																+-Applying beta-rule and splitting (1513), into two cases.
% 51.44/18.34  																																|-Branch one:
% 51.44/18.34  																																| (1628) all_823_0_954 = 0
% 51.44/18.34  																																|
% 51.44/18.34  																																	| Equations (1628) can reduce 1488 to:
% 51.44/18.34  																																	| (551) $false
% 51.44/18.34  																																	|
% 51.44/18.34  																																	|-The branch is then unsatisfiable
% 51.44/18.34  																																|-Branch two:
% 51.44/18.34  																																| (1488)  ~ (all_823_0_954 = 0)
% 51.44/18.34  																																| (1707)  ? [v0] :  ? [v1] : (party_of_protocol(b) = v1 & intruder_message(all_61_7_179) = v0 & ( ~ (v1 = 0) |  ~ (v0 = 0)))
% 51.44/18.34  																																|
% 51.44/18.34  																																	+-Applying beta-rule and splitting (1512), into two cases.
% 51.44/18.34  																																	|-Branch one:
% 51.44/18.34  																																	| (1628) all_823_0_954 = 0
% 51.44/18.34  																																	|
% 51.44/18.34  																																		| Equations (1628) can reduce 1488 to:
% 51.44/18.34  																																		| (551) $false
% 51.44/18.34  																																		|
% 51.44/18.34  																																		|-The branch is then unsatisfiable
% 51.44/18.34  																																	|-Branch two:
% 51.44/18.34  																																	| (1488)  ~ (all_823_0_954 = 0)
% 51.44/18.34  																																	| (1703)  ? [v0] :  ? [v1] : (party_of_protocol(a) = v1 & intruder_message(all_61_7_179) = v0 & ( ~ (v1 = 0) |  ~ (v0 = 0)))
% 51.44/18.34  																																	|
% 51.44/18.34  																																		+-Applying beta-rule and splitting (1806), into two cases.
% 51.44/18.34  																																		|-Branch one:
% 51.44/18.34  																																		| (1930)  ~ (all_1394_2_2564 = 0)
% 51.44/18.34  																																		|
% 51.44/18.34  																																			| Equations (1919) can reduce 1930 to:
% 51.44/18.34  																																			| (551) $false
% 51.44/18.34  																																			|
% 51.44/18.34  																																			|-The branch is then unsatisfiable
% 51.44/18.34  																																		|-Branch two:
% 51.44/18.34  																																		| (1919) all_1394_2_2564 = 0
% 51.44/18.34  																																		| (1933) all_1394_0_2562 = 0
% 51.44/18.34  																																		|
% 51.44/18.34  																																			| From (1933) and (1920) follows:
% 51.44/18.34  																																			| (1712) intruder_message(all_285_7_623) = 0
% 51.44/18.34  																																			|
% 51.44/18.34  																																			| Instantiating formula (31) with all_285_7_623, 0, all_823_0_954 and discharging atoms intruder_message(all_285_7_623) = all_823_0_954, intruder_message(all_285_7_623) = 0, yields:
% 51.44/18.34  																																			| (1628) all_823_0_954 = 0
% 51.44/18.34  																																			|
% 51.44/18.34  																																			| Equations (1628) can reduce 1488 to:
% 51.44/18.34  																																			| (551) $false
% 51.44/18.34  																																			|
% 51.44/18.34  																																			|-The branch is then unsatisfiable
% 51.44/18.34  																											|-Branch two:
% 51.44/18.34  																											| (1937) all_825_1_958 = 0
% 51.44/18.34  																											| (1938)  ~ (all_825_2_959 = 0) | all_825_0_957 = 0
% 51.44/18.34  																											|
% 51.44/18.34  																												+-Applying beta-rule and splitting (1938), into two cases.
% 51.44/18.34  																												|-Branch one:
% 51.44/18.34  																												| (1939)  ~ (all_825_2_959 = 0)
% 51.44/18.34  																												|
% 51.44/18.34  																													| Equations (1387) can reduce 1939 to:
% 51.44/18.34  																													| (551) $false
% 51.44/18.34  																													|
% 51.44/18.34  																													|-The branch is then unsatisfiable
% 51.44/18.34  																												|-Branch two:
% 51.44/18.34  																												| (1387) all_825_2_959 = 0
% 51.44/18.34  																												| (1942) all_825_0_957 = 0
% 51.44/18.34  																												|
% 51.44/18.34  																													| Combining equations (1942,1381) yields a new equation:
% 51.44/18.34  																													| (1943) all_763_3_833 = 0
% 51.44/18.34  																													|
% 51.44/18.34  																													| Equations (1943) can reduce 1486 to:
% 51.44/18.34  																													| (551) $false
% 51.44/18.34  																													|
% 51.44/18.34  																													|-The branch is then unsatisfiable
% 51.44/18.34  																										|-Branch two:
% 51.44/18.34  																										| (1943) all_763_3_833 = 0
% 51.44/18.34  																										| (1946) all_763_0_830 = 0
% 51.44/18.34  																										|
% 51.44/18.34  																											| Combining equations (1426,1946) yields a new equation:
% 51.44/18.34  																											| (1947) all_375_4_794 = 0
% 51.44/18.34  																											|
% 51.44/18.34  																											| Simplifying 1947 yields:
% 51.44/18.34  																											| (1948) all_375_4_794 = 0
% 51.44/18.34  																											|
% 51.44/18.34  																											| Equations (1948) can reduce 1477 to:
% 51.44/18.34  																											| (551) $false
% 51.44/18.34  																											|
% 51.44/18.34  																											|-The branch is then unsatisfiable
% 51.44/18.34  																							|-Branch two:
% 51.44/18.34  																							| (1948) all_375_4_794 = 0
% 51.44/18.34  																							| (1951) all_375_0_790 = 0
% 51.44/18.34  																							|
% 51.44/18.34  																								| Equations (1951) can reduce 1471 to:
% 51.44/18.34  																								| (551) $false
% 51.44/18.34  																								|
% 51.44/18.34  																								|-The branch is then unsatisfiable
% 51.44/18.34  																					|-Branch two:
% 51.44/18.34  																					| (1953) all_757_0_821 = 0
% 51.44/18.34  																					| (1954)  ~ (all_757_2_823 = 0)
% 51.44/18.34  																					|
% 51.44/18.34  																						| Equations (1466) can reduce 1954 to:
% 51.44/18.34  																						| (551) $false
% 51.44/18.34  																						|
% 51.44/18.34  																						|-The branch is then unsatisfiable
% 51.44/18.34  																|-Branch two:
% 51.44/18.34  																| (1956)  ~ (all_17_0_80 = 0)
% 51.44/18.34  																| (1957)  ? [v0] :  ? [v1] :  ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_17_8_88) = v0 & key(all_17_7_87, b) = v1 & ( ~ (v2 = 0) |  ~ (v0 = 0)))
% 51.44/18.34  																|
% 51.44/18.34  																	| Instantiating (1957) with all_499_0_2688, all_499_1_2689, all_499_2_2690 yields:
% 51.44/18.34  																	| (1958) intruder_holds(all_499_1_2689) = all_499_0_2688 & intruder_message(all_17_8_88) = all_499_2_2690 & key(all_17_7_87, b) = all_499_1_2689 & ( ~ (all_499_0_2688 = 0) |  ~ (all_499_2_2690 = 0))
% 51.44/18.34  																	|
% 51.44/18.34  																	| Applying alpha-rule on (1958) yields:
% 51.44/18.34  																	| (1959) intruder_holds(all_499_1_2689) = all_499_0_2688
% 51.44/18.34  																	| (1960) intruder_message(all_17_8_88) = all_499_2_2690
% 51.44/18.34  																	| (1961) key(all_17_7_87, b) = all_499_1_2689
% 51.44/18.34  																	| (1962)  ~ (all_499_0_2688 = 0) |  ~ (all_499_2_2690 = 0)
% 51.44/18.34  																	|
% 51.44/18.34  																	+-Applying beta-rule and splitting (168), into two cases.
% 51.44/18.34  																	|-Branch one:
% 51.44/18.34  																	| (1204) all_17_0_80 = 0
% 51.44/18.34  																	|
% 51.44/18.34  																		| Equations (1204) can reduce 1956 to:
% 51.44/18.34  																		| (551) $false
% 51.44/18.34  																		|
% 51.44/18.34  																		|-The branch is then unsatisfiable
% 51.44/18.34  																	|-Branch two:
% 51.44/18.34  																	| (1956)  ~ (all_17_0_80 = 0)
% 51.44/18.34  																	| (1966)  ? [v0] :  ? [v1] :  ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_17_8_88) = v0 & key(all_17_7_87, a) = v1 & ( ~ (v2 = 0) |  ~ (v0 = 0)))
% 51.44/18.34  																	|
% 51.44/18.34  																		| Instantiating (1966) with all_505_0_2691, all_505_1_2692, all_505_2_2693 yields:
% 51.44/18.34  																		| (1967) intruder_holds(all_505_1_2692) = all_505_0_2691 & intruder_message(all_17_8_88) = all_505_2_2693 & key(all_17_7_87, a) = all_505_1_2692 & ( ~ (all_505_0_2691 = 0) |  ~ (all_505_2_2693 = 0))
% 51.44/18.34  																		|
% 51.44/18.34  																		| Applying alpha-rule on (1967) yields:
% 51.44/18.34  																		| (1968) intruder_holds(all_505_1_2692) = all_505_0_2691
% 51.44/18.34  																		| (1969) intruder_message(all_17_8_88) = all_505_2_2693
% 51.44/18.35  																		| (1970) key(all_17_7_87, a) = all_505_1_2692
% 51.44/18.35  																		| (1971)  ~ (all_505_0_2691 = 0) |  ~ (all_505_2_2693 = 0)
% 51.44/18.35  																		|
% 51.44/18.35  																		+-Applying beta-rule and splitting (169), into two cases.
% 51.44/18.35  																		|-Branch one:
% 51.44/18.35  																		| (1204) all_17_0_80 = 0
% 51.44/18.35  																		|
% 51.44/18.35  																			| Equations (1204) can reduce 1956 to:
% 51.44/18.35  																			| (551) $false
% 51.44/18.35  																			|
% 51.44/18.35  																			|-The branch is then unsatisfiable
% 51.44/18.35  																		|-Branch two:
% 51.44/18.35  																		| (1956)  ~ (all_17_0_80 = 0)
% 51.44/18.35  																		| (1975)  ? [v0] :  ? [v1] :  ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_17_8_88) = v0 & key(all_17_7_87, t) = v1 & ( ~ (v2 = 0) |  ~ (v0 = 0)))
% 51.44/18.35  																		|
% 51.44/18.35  																			| Instantiating (1975) with all_510_0_2694, all_510_1_2695, all_510_2_2696 yields:
% 51.44/18.35  																			| (1976) intruder_holds(all_510_1_2695) = all_510_0_2694 & intruder_message(all_17_8_88) = all_510_2_2696 & key(all_17_7_87, t) = all_510_1_2695 & ( ~ (all_510_0_2694 = 0) |  ~ (all_510_2_2696 = 0))
% 51.44/18.35  																			|
% 51.44/18.35  																			| Applying alpha-rule on (1976) yields:
% 51.44/18.35  																			| (1977) intruder_holds(all_510_1_2695) = all_510_0_2694
% 51.44/18.35  																			| (1978) intruder_message(all_17_8_88) = all_510_2_2696
% 51.44/18.35  																			| (1979) key(all_17_7_87, t) = all_510_1_2695
% 51.44/18.35  																			| (1980)  ~ (all_510_0_2694 = 0) |  ~ (all_510_2_2696 = 0)
% 51.44/18.35  																			|
% 51.44/18.35  																			| Instantiating formula (70) with all_281_6_602, all_281_7_603, all_149_4_382 and discharging atoms pair(all_149_4_382, all_281_7_603) = all_281_6_602, yields:
% 51.44/18.35  																			| (1981)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] :  ? [v4] :  ? [v5] :  ? [v6] :  ? [v7] :  ? [v8] :  ? [v9] :  ? [v10] : (fresh_to_b(all_281_7_603) = v2 & generate_b_nonce(all_281_7_603) = v3 & generate_expiration_time(all_281_7_603) = v4 & b_stored(all_281_6_602) = v10 & triple(all_149_4_382, all_281_7_603, v4) = v5 & triple(b, v3, v6) = v7 & encrypt(v5, bt) = v6 & sent(all_149_4_382, b, all_281_6_602) = v0 & sent(b, t, v7) = v8 & message(v8) = v9 & message(v0) = v1 & ( ~ (v2 = 0) |  ~ (v1 = 0) | (v10 = 0 & v9 = 0)))
% 51.44/18.35  																			|
% 51.44/18.35  																			| Instantiating formula (12) with all_285_6_622, all_285_7_623, all_63_4_187 and discharging atoms pair(all_63_4_187, all_285_7_623) = all_285_6_622, yields:
% 51.44/18.35  																			| (1211)  ? [v0] :  ? [v1] :  ? [v2] : (intruder_message(all_285_6_622) = v2 & intruder_message(all_285_7_623) = v1 & intruder_message(all_63_4_187) = v0 & ( ~ (v1 = 0) |  ~ (v0 = 0) | v2 = 0))
% 51.44/18.35  																			|
% 51.44/18.35  																			| Instantiating formula (56) with all_285_6_622, all_285_7_623, all_63_4_187 and discharging atoms pair(all_63_4_187, all_285_7_623) = all_285_6_622, yields:
% 51.44/18.35  																			| (1212)  ? [v0] :  ? [v1] :  ? [v2] : (intruder_message(all_285_6_622) = v0 & intruder_message(all_285_7_623) = v2 & intruder_message(all_63_4_187) = v1 & ( ~ (v0 = 0) | (v2 = 0 & v1 = 0)))
% 51.44/18.35  																			|
% 51.44/18.35  																			| Instantiating formula (12) with all_375_6_796, all_285_7_623, all_61_4_176 and discharging atoms pair(all_61_4_176, all_285_7_623) = all_375_6_796, yields:
% 51.44/18.35  																			| (1214)  ? [v0] :  ? [v1] :  ? [v2] : (intruder_message(all_375_6_796) = v2 & intruder_message(all_285_7_623) = v1 & intruder_message(all_61_4_176) = v0 & ( ~ (v1 = 0) |  ~ (v0 = 0) | v2 = 0))
% 51.44/18.35  																			|
% 51.44/18.35  																			| Instantiating formula (56) with all_375_6_796, all_285_7_623, all_61_4_176 and discharging atoms pair(all_61_4_176, all_285_7_623) = all_375_6_796, yields:
% 51.44/18.35  																			| (1215)  ? [v0] :  ? [v1] :  ? [v2] : (intruder_message(all_375_6_796) = v0 & intruder_message(all_285_7_623) = v2 & intruder_message(all_61_4_176) = v1 & ( ~ (v0 = 0) | (v2 = 0 & v1 = 0)))
% 51.44/18.35  																			|
% 51.44/18.35  																			| Instantiating formula (73) with all_281_5_601, b, all_15_14_75, all_281_6_602 and discharging atoms sent(all_15_14_75, b, all_281_6_602) = all_281_5_601, yields:
% 51.44/18.35  																			| (1216)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (party_of_protocol(all_15_14_75) = v1 & party_of_protocol(b) = v2 & intruder_message(all_281_6_602) = v0 & message(all_281_5_601) = v3 & ( ~ (v2 = 0) |  ~ (v1 = 0) |  ~ (v0 = 0) | v3 = 0))
% 51.44/18.35  																			|
% 51.44/18.35  																			| Instantiating formula (73) with all_269_5_559, b, all_15_15_76, all_269_6_560 and discharging atoms sent(all_15_15_76, b, all_269_6_560) = all_269_5_559, yields:
% 51.44/18.35  																			| (1217)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (party_of_protocol(all_15_15_76) = v1 & party_of_protocol(b) = v2 & intruder_message(all_269_6_560) = v0 & message(all_269_5_559) = v3 & ( ~ (v2 = 0) |  ~ (v1 = 0) |  ~ (v0 = 0) | v3 = 0))
% 51.44/18.35  																			|
% 51.44/18.35  																			| Instantiating formula (73) with all_277_5_581, b, all_13_9_55, all_277_6_582 and discharging atoms sent(all_13_9_55, b, all_277_6_582) = all_277_5_581, yields:
% 51.44/18.35  																			| (1218)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (party_of_protocol(all_13_9_55) = v1 & party_of_protocol(b) = v2 & intruder_message(all_277_6_582) = v0 & message(all_277_5_581) = v3 & ( ~ (v2 = 0) |  ~ (v1 = 0) |  ~ (v0 = 0) | v3 = 0))
% 51.44/18.35  																			|
% 51.44/18.35  																			| Instantiating formula (73) with all_369_10_781, b, all_11_4_36, all_131_6_319 and discharging atoms sent(all_11_4_36, b, all_131_6_319) = all_369_10_781, yields:
% 51.44/18.35  																			| (1219)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (party_of_protocol(all_11_4_36) = v1 & party_of_protocol(b) = v2 & intruder_message(all_131_6_319) = v0 & message(all_369_10_781) = v3 & ( ~ (v2 = 0) |  ~ (v1 = 0) |  ~ (v0 = 0) | v3 = 0))
% 51.44/18.35  																			|
% 51.44/18.35  																			| Instantiating formula (73) with all_285_5_621, b, b, all_285_6_622 and discharging atoms sent(b, b, all_285_6_622) = all_285_5_621, yields:
% 51.44/18.35  																			| (1220)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (party_of_protocol(b) = v2 & party_of_protocol(b) = v1 & intruder_message(all_285_6_622) = v0 & message(all_285_5_621) = v3 & ( ~ (v2 = 0) |  ~ (v1 = 0) |  ~ (v0 = 0) | v3 = 0))
% 51.44/18.35  																			|
% 51.44/18.35  																			| Instantiating formula (73) with all_369_2_773, t, b, all_369_3_774 and discharging atoms sent(b, t, all_369_3_774) = all_369_2_773, yields:
% 51.44/18.35  																			| (1221)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (party_of_protocol(b) = v1 & party_of_protocol(t) = v2 & intruder_message(all_369_3_774) = v0 & message(all_369_2_773) = v3 & ( ~ (v2 = 0) |  ~ (v1 = 0) |  ~ (v0 = 0) | v3 = 0))
% 51.44/18.35  																			|
% 51.44/18.35  																			| Instantiating formula (73) with all_375_5_795, b, a, all_375_6_796 and discharging atoms sent(a, b, all_375_6_796) = all_375_5_795, yields:
% 51.44/18.35  																			| (1222)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (party_of_protocol(b) = v2 & party_of_protocol(a) = v1 & intruder_message(all_375_6_796) = v0 & message(all_375_5_795) = v3 & ( ~ (v2 = 0) |  ~ (v1 = 0) |  ~ (v0 = 0) | v3 = 0))
% 51.44/18.35  																			|
% 51.44/18.35  																			| Instantiating formula (4) with all_375_5_795, all_375_6_796, b, a and discharging atoms sent(a, b, all_375_6_796) = all_375_5_795, yields:
% 51.44/18.35  																			| (1223)  ? [v0] :  ? [v1] : (intruder_message(all_375_6_796) = v1 & message(all_375_5_795) = v0 & ( ~ (v0 = 0) | v1 = 0))
% 51.44/18.35  																			|
% 51.44/18.35  																			| Instantiating formula (57) with all_499_1_2689, b, all_17_7_87 and discharging atoms key(all_17_7_87, b) = all_499_1_2689, yields:
% 51.44/18.35  																			| (1994)  ? [v0] :  ? [v1] :  ? [v2] : (intruder_holds(all_499_1_2689) = v2 & party_of_protocol(b) = v1 & intruder_message(all_17_7_87) = v0 & ( ~ (v1 = 0) |  ~ (v0 = 0) | v2 = 0))
% 51.44/18.35  																			|
% 51.44/18.35  																			| Instantiating formula (57) with all_505_1_2692, a, all_17_7_87 and discharging atoms key(all_17_7_87, a) = all_505_1_2692, yields:
% 51.44/18.35  																			| (1995)  ? [v0] :  ? [v1] :  ? [v2] : (intruder_holds(all_505_1_2692) = v2 & party_of_protocol(a) = v1 & intruder_message(all_17_7_87) = v0 & ( ~ (v1 = 0) |  ~ (v0 = 0) | v2 = 0))
% 51.44/18.35  																			|
% 51.44/18.35  																			| Instantiating formula (57) with all_510_1_2695, t, all_17_7_87 and discharging atoms key(all_17_7_87, t) = all_510_1_2695, yields:
% 51.44/18.35  																			| (1996)  ? [v0] :  ? [v1] :  ? [v2] : (intruder_holds(all_510_1_2695) = v2 & party_of_protocol(t) = v1 & intruder_message(all_17_7_87) = v0 & ( ~ (v1 = 0) |  ~ (v0 = 0) | v2 = 0))
% 51.44/18.35  																			|
% 51.44/18.35  																			| Instantiating formula (39) with all_285_1_617, an_a_nonce and discharging atoms key(an_a_nonce, b) = all_285_1_617, yields:
% 51.44/18.35  																			| (1225)  ? [v0] :  ? [v1] :  ? [v2] : (intruder_holds(all_285_1_617) = v0 & b_holds(v1) = v2 & key(an_a_nonce, a) = v1 & ( ~ (v2 = 0) |  ~ (v0 = 0)))
% 51.44/18.35  																			|
% 51.44/18.35  																			| Instantiating formula (57) with all_285_1_617, b, an_a_nonce and discharging atoms key(an_a_nonce, b) = all_285_1_617, yields:
% 51.44/18.35  																			| (1226)  ? [v0] :  ? [v1] :  ? [v2] : (intruder_holds(all_285_1_617) = v2 & party_of_protocol(b) = v1 & intruder_message(an_a_nonce) = v0 & ( ~ (v1 = 0) |  ~ (v0 = 0) | v2 = 0))
% 51.44/18.35  																			|
% 51.44/18.35  																			| Instantiating formula (62) with all_375_1_791, an_a_nonce and discharging atoms key(an_a_nonce, a) = all_375_1_791, yields:
% 51.44/18.35  																			| (1227)  ? [v0] :  ? [v1] :  ? [v2] : (intruder_holds(v0) = v1 & b_holds(all_375_1_791) = v2 & key(an_a_nonce, b) = v0 & ( ~ (v2 = 0) |  ~ (v1 = 0)))
% 51.44/18.35  																			|
% 51.44/18.35  																			| Instantiating formula (57) with all_375_1_791, a, an_a_nonce and discharging atoms key(an_a_nonce, a) = all_375_1_791, yields:
% 51.44/18.35  																			| (1228)  ? [v0] :  ? [v1] :  ? [v2] : (intruder_holds(all_375_1_791) = v2 & party_of_protocol(a) = v1 & intruder_message(an_a_nonce) = v0 & ( ~ (v1 = 0) |  ~ (v0 = 0) | v2 = 0))
% 51.44/18.35  																			|
% 51.44/18.35  																			| Instantiating (1981) with all_766_0_2697, all_766_1_2698, all_766_2_2699, all_766_3_2700, all_766_4_2701, all_766_5_2702, all_766_6_2703, all_766_7_2704, all_766_8_2705, all_766_9_2706, all_766_10_2707 yields:
% 51.44/18.35  																			| (2001) fresh_to_b(all_281_7_603) = all_766_8_2705 & generate_b_nonce(all_281_7_603) = all_766_7_2704 & generate_expiration_time(all_281_7_603) = all_766_6_2703 & b_stored(all_281_6_602) = all_766_0_2697 & triple(all_149_4_382, all_281_7_603, all_766_6_2703) = all_766_5_2702 & triple(b, all_766_7_2704, all_766_4_2701) = all_766_3_2700 & encrypt(all_766_5_2702, bt) = all_766_4_2701 & sent(all_149_4_382, b, all_281_6_602) = all_766_10_2707 & sent(b, t, all_766_3_2700) = all_766_2_2699 & message(all_766_2_2699) = all_766_1_2698 & message(all_766_10_2707) = all_766_9_2706 & ( ~ (all_766_8_2705 = 0) |  ~ (all_766_9_2706 = 0) | (all_766_0_2697 = 0 & all_766_1_2698 = 0))
% 51.44/18.35  																			|
% 51.44/18.35  																			| Applying alpha-rule on (2001) yields:
% 51.44/18.35  																			| (2002) b_stored(all_281_6_602) = all_766_0_2697
% 51.44/18.35  																			| (2003) triple(b, all_766_7_2704, all_766_4_2701) = all_766_3_2700
% 51.44/18.35  																			| (2004) triple(all_149_4_382, all_281_7_603, all_766_6_2703) = all_766_5_2702
% 51.44/18.35  																			| (2005) generate_expiration_time(all_281_7_603) = all_766_6_2703
% 51.44/18.35  																			| (2006) sent(b, t, all_766_3_2700) = all_766_2_2699
% 51.44/18.35  																			| (2007) message(all_766_10_2707) = all_766_9_2706
% 51.44/18.35  																			| (2008) encrypt(all_766_5_2702, bt) = all_766_4_2701
% 51.44/18.35  																			| (2009) sent(all_149_4_382, b, all_281_6_602) = all_766_10_2707
% 51.44/18.35  																			| (2010)  ~ (all_766_8_2705 = 0) |  ~ (all_766_9_2706 = 0) | (all_766_0_2697 = 0 & all_766_1_2698 = 0)
% 51.44/18.35  																			| (2011) message(all_766_2_2699) = all_766_1_2698
% 51.44/18.35  																			| (2012) fresh_to_b(all_281_7_603) = all_766_8_2705
% 51.44/18.35  																			| (2013) generate_b_nonce(all_281_7_603) = all_766_7_2704
% 51.44/18.35  																			|
% 51.44/18.35  																			| Instantiating (1228) with all_770_0_2712, all_770_1_2713, all_770_2_2714 yields:
% 51.44/18.35  																			| (2014) intruder_holds(all_375_1_791) = all_770_0_2712 & party_of_protocol(a) = all_770_1_2713 & intruder_message(an_a_nonce) = all_770_2_2714 & ( ~ (all_770_1_2713 = 0) |  ~ (all_770_2_2714 = 0) | all_770_0_2712 = 0)
% 51.44/18.35  																			|
% 51.44/18.35  																			| Applying alpha-rule on (2014) yields:
% 51.44/18.35  																			| (2015) intruder_holds(all_375_1_791) = all_770_0_2712
% 51.44/18.35  																			| (2016) party_of_protocol(a) = all_770_1_2713
% 51.44/18.35  																			| (2017) intruder_message(an_a_nonce) = all_770_2_2714
% 51.44/18.35  																			| (2018)  ~ (all_770_1_2713 = 0) |  ~ (all_770_2_2714 = 0) | all_770_0_2712 = 0
% 51.44/18.35  																			|
% 51.44/18.35  																			| Instantiating (1227) with all_772_0_2715, all_772_1_2716, all_772_2_2717 yields:
% 51.44/18.35  																			| (2019) intruder_holds(all_772_2_2717) = all_772_1_2716 & b_holds(all_375_1_791) = all_772_0_2715 & key(an_a_nonce, b) = all_772_2_2717 & ( ~ (all_772_0_2715 = 0) |  ~ (all_772_1_2716 = 0))
% 51.44/18.35  																			|
% 51.44/18.35  																			| Applying alpha-rule on (2019) yields:
% 51.44/18.35  																			| (2020) intruder_holds(all_772_2_2717) = all_772_1_2716
% 51.44/18.36  																			| (2021) b_holds(all_375_1_791) = all_772_0_2715
% 51.44/18.36  																			| (2022) key(an_a_nonce, b) = all_772_2_2717
% 51.44/18.36  																			| (2023)  ~ (all_772_0_2715 = 0) |  ~ (all_772_1_2716 = 0)
% 51.44/18.36  																			|
% 51.44/18.36  																			| Instantiating (1219) with all_778_0_2722, all_778_1_2723, all_778_2_2724, all_778_3_2725 yields:
% 51.44/18.36  																			| (2024) party_of_protocol(all_11_4_36) = all_778_2_2724 & party_of_protocol(b) = all_778_1_2723 & intruder_message(all_131_6_319) = all_778_3_2725 & message(all_369_10_781) = all_778_0_2722 & ( ~ (all_778_1_2723 = 0) |  ~ (all_778_2_2724 = 0) |  ~ (all_778_3_2725 = 0) | all_778_0_2722 = 0)
% 51.44/18.36  																			|
% 51.44/18.36  																			| Applying alpha-rule on (2024) yields:
% 51.44/18.36  																			| (2025) message(all_369_10_781) = all_778_0_2722
% 51.44/18.36  																			| (2026) party_of_protocol(all_11_4_36) = all_778_2_2724
% 51.44/18.36  																			| (2027) party_of_protocol(b) = all_778_1_2723
% 51.44/18.36  																			| (2028)  ~ (all_778_1_2723 = 0) |  ~ (all_778_2_2724 = 0) |  ~ (all_778_3_2725 = 0) | all_778_0_2722 = 0
% 51.44/18.36  																			| (2029) intruder_message(all_131_6_319) = all_778_3_2725
% 51.44/18.36  																			|
% 51.44/18.36  																			| Instantiating (1996) with all_786_0_2735, all_786_1_2736, all_786_2_2737 yields:
% 51.44/18.36  																			| (2030) intruder_holds(all_510_1_2695) = all_786_0_2735 & party_of_protocol(t) = all_786_1_2736 & intruder_message(all_17_7_87) = all_786_2_2737 & ( ~ (all_786_1_2736 = 0) |  ~ (all_786_2_2737 = 0) | all_786_0_2735 = 0)
% 51.44/18.36  																			|
% 51.44/18.36  																			| Applying alpha-rule on (2030) yields:
% 51.44/18.36  																			| (2031) intruder_holds(all_510_1_2695) = all_786_0_2735
% 51.44/18.36  																			| (2032) party_of_protocol(t) = all_786_1_2736
% 51.44/18.36  																			| (2033) intruder_message(all_17_7_87) = all_786_2_2737
% 51.44/18.36  																			| (2034)  ~ (all_786_1_2736 = 0) |  ~ (all_786_2_2737 = 0) | all_786_0_2735 = 0
% 51.44/18.36  																			|
% 51.44/18.36  																			| Instantiating (1216) with all_790_0_2740, all_790_1_2741, all_790_2_2742, all_790_3_2743 yields:
% 51.44/18.36  																			| (2035) party_of_protocol(all_15_14_75) = all_790_2_2742 & party_of_protocol(b) = all_790_1_2741 & intruder_message(all_281_6_602) = all_790_3_2743 & message(all_281_5_601) = all_790_0_2740 & ( ~ (all_790_1_2741 = 0) |  ~ (all_790_2_2742 = 0) |  ~ (all_790_3_2743 = 0) | all_790_0_2740 = 0)
% 51.44/18.36  																			|
% 51.44/18.36  																			| Applying alpha-rule on (2035) yields:
% 51.44/18.36  																			| (2036) party_of_protocol(all_15_14_75) = all_790_2_2742
% 51.44/18.36  																			| (2037)  ~ (all_790_1_2741 = 0) |  ~ (all_790_2_2742 = 0) |  ~ (all_790_3_2743 = 0) | all_790_0_2740 = 0
% 51.44/18.36  																			| (2038) party_of_protocol(b) = all_790_1_2741
% 51.44/18.36  																			| (2039) intruder_message(all_281_6_602) = all_790_3_2743
% 51.44/18.36  																			| (2040) message(all_281_5_601) = all_790_0_2740
% 51.44/18.36  																			|
% 51.44/18.36  																			| Instantiating (1212) with all_794_0_2755, all_794_1_2756, all_794_2_2757 yields:
% 51.44/18.36  																			| (2041) intruder_message(all_285_6_622) = all_794_2_2757 & intruder_message(all_285_7_623) = all_794_0_2755 & intruder_message(all_63_4_187) = all_794_1_2756 & ( ~ (all_794_2_2757 = 0) | (all_794_0_2755 = 0 & all_794_1_2756 = 0))
% 51.44/18.36  																			|
% 51.44/18.36  																			| Applying alpha-rule on (2041) yields:
% 51.44/18.36  																			| (2042) intruder_message(all_285_6_622) = all_794_2_2757
% 51.44/18.36  																			| (2043) intruder_message(all_285_7_623) = all_794_0_2755
% 51.44/18.36  																			| (2044) intruder_message(all_63_4_187) = all_794_1_2756
% 51.44/18.36  																			| (2045)  ~ (all_794_2_2757 = 0) | (all_794_0_2755 = 0 & all_794_1_2756 = 0)
% 51.44/18.36  																			|
% 51.44/18.36  																			| Instantiating (1215) with all_796_0_2758, all_796_1_2759, all_796_2_2760 yields:
% 51.44/18.36  																			| (2046) intruder_message(all_375_6_796) = all_796_2_2760 & intruder_message(all_285_7_623) = all_796_0_2758 & intruder_message(all_61_4_176) = all_796_1_2759 & ( ~ (all_796_2_2760 = 0) | (all_796_0_2758 = 0 & all_796_1_2759 = 0))
% 51.44/18.36  																			|
% 51.44/18.36  																			| Applying alpha-rule on (2046) yields:
% 51.44/18.36  																			| (2047) intruder_message(all_375_6_796) = all_796_2_2760
% 51.44/18.36  																			| (2048) intruder_message(all_285_7_623) = all_796_0_2758
% 51.44/18.36  																			| (2049) intruder_message(all_61_4_176) = all_796_1_2759
% 51.44/18.36  																			| (2050)  ~ (all_796_2_2760 = 0) | (all_796_0_2758 = 0 & all_796_1_2759 = 0)
% 51.44/18.36  																			|
% 51.44/18.36  																			| Instantiating (1220) with all_798_0_2761, all_798_1_2762, all_798_2_2763, all_798_3_2764 yields:
% 51.44/18.36  																			| (2051) party_of_protocol(b) = all_798_1_2762 & party_of_protocol(b) = all_798_2_2763 & intruder_message(all_285_6_622) = all_798_3_2764 & message(all_285_5_621) = all_798_0_2761 & ( ~ (all_798_1_2762 = 0) |  ~ (all_798_2_2763 = 0) |  ~ (all_798_3_2764 = 0) | all_798_0_2761 = 0)
% 51.44/18.36  																			|
% 51.44/18.36  																			| Applying alpha-rule on (2051) yields:
% 51.44/18.36  																			| (2052)  ~ (all_798_1_2762 = 0) |  ~ (all_798_2_2763 = 0) |  ~ (all_798_3_2764 = 0) | all_798_0_2761 = 0
% 51.44/18.36  																			| (2053) party_of_protocol(b) = all_798_2_2763
% 51.44/18.36  																			| (2054) party_of_protocol(b) = all_798_1_2762
% 51.44/18.36  																			| (2055) intruder_message(all_285_6_622) = all_798_3_2764
% 51.44/18.36  																			| (2056) message(all_285_5_621) = all_798_0_2761
% 51.44/18.36  																			|
% 51.44/18.36  																			| Instantiating (1218) with all_802_0_2767, all_802_1_2768, all_802_2_2769, all_802_3_2770 yields:
% 51.44/18.36  																			| (2057) party_of_protocol(all_13_9_55) = all_802_2_2769 & party_of_protocol(b) = all_802_1_2768 & intruder_message(all_277_6_582) = all_802_3_2770 & message(all_277_5_581) = all_802_0_2767 & ( ~ (all_802_1_2768 = 0) |  ~ (all_802_2_2769 = 0) |  ~ (all_802_3_2770 = 0) | all_802_0_2767 = 0)
% 51.44/18.36  																			|
% 51.44/18.36  																			| Applying alpha-rule on (2057) yields:
% 51.44/18.36  																			| (2058) party_of_protocol(b) = all_802_1_2768
% 51.44/18.36  																			| (2059)  ~ (all_802_1_2768 = 0) |  ~ (all_802_2_2769 = 0) |  ~ (all_802_3_2770 = 0) | all_802_0_2767 = 0
% 51.44/18.36  																			| (2060) intruder_message(all_277_6_582) = all_802_3_2770
% 51.44/18.36  																			| (2061) message(all_277_5_581) = all_802_0_2767
% 51.44/18.36  																			| (2062) party_of_protocol(all_13_9_55) = all_802_2_2769
% 51.44/18.36  																			|
% 51.44/18.36  																			| Instantiating (1214) with all_806_0_2773, all_806_1_2774, all_806_2_2775 yields:
% 51.44/18.36  																			| (2063) intruder_message(all_375_6_796) = all_806_0_2773 & intruder_message(all_285_7_623) = all_806_1_2774 & intruder_message(all_61_4_176) = all_806_2_2775 & ( ~ (all_806_1_2774 = 0) |  ~ (all_806_2_2775 = 0) | all_806_0_2773 = 0)
% 51.44/18.36  																			|
% 51.44/18.36  																			| Applying alpha-rule on (2063) yields:
% 51.44/18.36  																			| (2064) intruder_message(all_375_6_796) = all_806_0_2773
% 51.44/18.36  																			| (2065) intruder_message(all_285_7_623) = all_806_1_2774
% 51.44/18.36  																			| (2066) intruder_message(all_61_4_176) = all_806_2_2775
% 51.44/18.36  																			| (2067)  ~ (all_806_1_2774 = 0) |  ~ (all_806_2_2775 = 0) | all_806_0_2773 = 0
% 51.44/18.36  																			|
% 51.44/18.36  																			| Instantiating (1211) with all_808_0_2776, all_808_1_2777, all_808_2_2778 yields:
% 51.44/18.36  																			| (2068) intruder_message(all_285_6_622) = all_808_0_2776 & intruder_message(all_285_7_623) = all_808_1_2777 & intruder_message(all_63_4_187) = all_808_2_2778 & ( ~ (all_808_1_2777 = 0) |  ~ (all_808_2_2778 = 0) | all_808_0_2776 = 0)
% 51.44/18.36  																			|
% 51.44/18.36  																			| Applying alpha-rule on (2068) yields:
% 51.44/18.36  																			| (2069) intruder_message(all_285_6_622) = all_808_0_2776
% 51.44/18.36  																			| (2070) intruder_message(all_285_7_623) = all_808_1_2777
% 51.44/18.36  																			| (2071) intruder_message(all_63_4_187) = all_808_2_2778
% 51.44/18.36  																			| (2072)  ~ (all_808_1_2777 = 0) |  ~ (all_808_2_2778 = 0) | all_808_0_2776 = 0
% 51.44/18.36  																			|
% 51.44/18.36  																			| Instantiating (1217) with all_810_0_2779, all_810_1_2780, all_810_2_2781, all_810_3_2782 yields:
% 51.44/18.36  																			| (2073) party_of_protocol(all_15_15_76) = all_810_2_2781 & party_of_protocol(b) = all_810_1_2780 & intruder_message(all_269_6_560) = all_810_3_2782 & message(all_269_5_559) = all_810_0_2779 & ( ~ (all_810_1_2780 = 0) |  ~ (all_810_2_2781 = 0) |  ~ (all_810_3_2782 = 0) | all_810_0_2779 = 0)
% 51.44/18.36  																			|
% 51.44/18.36  																			| Applying alpha-rule on (2073) yields:
% 51.44/18.36  																			| (2074) intruder_message(all_269_6_560) = all_810_3_2782
% 51.44/18.36  																			| (2075)  ~ (all_810_1_2780 = 0) |  ~ (all_810_2_2781 = 0) |  ~ (all_810_3_2782 = 0) | all_810_0_2779 = 0
% 51.44/18.36  																			| (2076) message(all_269_5_559) = all_810_0_2779
% 51.44/18.36  																			| (2077) party_of_protocol(b) = all_810_1_2780
% 51.72/18.36  																			| (2078) party_of_protocol(all_15_15_76) = all_810_2_2781
% 51.72/18.36  																			|
% 51.72/18.36  																			| Instantiating (1226) with all_812_0_2783, all_812_1_2784, all_812_2_2785 yields:
% 51.72/18.36  																			| (2079) intruder_holds(all_285_1_617) = all_812_0_2783 & party_of_protocol(b) = all_812_1_2784 & intruder_message(an_a_nonce) = all_812_2_2785 & ( ~ (all_812_1_2784 = 0) |  ~ (all_812_2_2785 = 0) | all_812_0_2783 = 0)
% 51.72/18.36  																			|
% 51.72/18.36  																			| Applying alpha-rule on (2079) yields:
% 51.72/18.36  																			| (2080) intruder_holds(all_285_1_617) = all_812_0_2783
% 51.72/18.36  																			| (2081) party_of_protocol(b) = all_812_1_2784
% 51.72/18.36  																			| (2082) intruder_message(an_a_nonce) = all_812_2_2785
% 51.72/18.36  																			| (2083)  ~ (all_812_1_2784 = 0) |  ~ (all_812_2_2785 = 0) | all_812_0_2783 = 0
% 51.72/18.36  																			|
% 51.72/18.36  																			| Instantiating (1225) with all_814_0_2786, all_814_1_2787, all_814_2_2788 yields:
% 51.72/18.36  																			| (2084) intruder_holds(all_285_1_617) = all_814_2_2788 & b_holds(all_814_1_2787) = all_814_0_2786 & key(an_a_nonce, a) = all_814_1_2787 & ( ~ (all_814_0_2786 = 0) |  ~ (all_814_2_2788 = 0))
% 51.72/18.36  																			|
% 51.72/18.36  																			| Applying alpha-rule on (2084) yields:
% 51.72/18.36  																			| (2085) intruder_holds(all_285_1_617) = all_814_2_2788
% 51.72/18.36  																			| (2086) b_holds(all_814_1_2787) = all_814_0_2786
% 51.72/18.36  																			| (2087) key(an_a_nonce, a) = all_814_1_2787
% 51.72/18.37  																			| (2088)  ~ (all_814_0_2786 = 0) |  ~ (all_814_2_2788 = 0)
% 51.72/18.37  																			|
% 51.72/18.37  																			| Instantiating (1995) with all_822_0_2805, all_822_1_2806, all_822_2_2807 yields:
% 51.72/18.37  																			| (2089) intruder_holds(all_505_1_2692) = all_822_0_2805 & party_of_protocol(a) = all_822_1_2806 & intruder_message(all_17_7_87) = all_822_2_2807 & ( ~ (all_822_1_2806 = 0) |  ~ (all_822_2_2807 = 0) | all_822_0_2805 = 0)
% 51.72/18.37  																			|
% 51.72/18.37  																			| Applying alpha-rule on (2089) yields:
% 51.72/18.37  																			| (2090) intruder_holds(all_505_1_2692) = all_822_0_2805
% 51.72/18.37  																			| (2091) party_of_protocol(a) = all_822_1_2806
% 51.72/18.37  																			| (2092) intruder_message(all_17_7_87) = all_822_2_2807
% 51.72/18.37  																			| (2093)  ~ (all_822_1_2806 = 0) |  ~ (all_822_2_2807 = 0) | all_822_0_2805 = 0
% 51.72/18.37  																			|
% 51.72/18.37  																			| Instantiating (1994) with all_824_0_2808, all_824_1_2809, all_824_2_2810 yields:
% 51.72/18.37  																			| (2094) intruder_holds(all_499_1_2689) = all_824_0_2808 & party_of_protocol(b) = all_824_1_2809 & intruder_message(all_17_7_87) = all_824_2_2810 & ( ~ (all_824_1_2809 = 0) |  ~ (all_824_2_2810 = 0) | all_824_0_2808 = 0)
% 51.72/18.37  																			|
% 51.72/18.37  																			| Applying alpha-rule on (2094) yields:
% 51.72/18.37  																			| (2095) intruder_holds(all_499_1_2689) = all_824_0_2808
% 51.72/18.37  																			| (2096) party_of_protocol(b) = all_824_1_2809
% 51.72/18.37  																			| (2097) intruder_message(all_17_7_87) = all_824_2_2810
% 51.72/18.37  																			| (2098)  ~ (all_824_1_2809 = 0) |  ~ (all_824_2_2810 = 0) | all_824_0_2808 = 0
% 51.72/18.37  																			|
% 51.72/18.37  																			| Instantiating (1223) with all_842_0_2845, all_842_1_2846 yields:
% 51.72/18.37  																			| (2099) intruder_message(all_375_6_796) = all_842_0_2845 & message(all_375_5_795) = all_842_1_2846 & ( ~ (all_842_1_2846 = 0) | all_842_0_2845 = 0)
% 51.72/18.37  																			|
% 51.72/18.37  																			| Applying alpha-rule on (2099) yields:
% 51.72/18.37  																			| (2100) intruder_message(all_375_6_796) = all_842_0_2845
% 51.72/18.37  																			| (2101) message(all_375_5_795) = all_842_1_2846
% 51.72/18.37  																			| (2102)  ~ (all_842_1_2846 = 0) | all_842_0_2845 = 0
% 51.72/18.37  																			|
% 51.72/18.37  																			| Instantiating (1222) with all_846_0_2849, all_846_1_2850, all_846_2_2851, all_846_3_2852 yields:
% 51.74/18.37  																			| (2103) party_of_protocol(b) = all_846_1_2850 & party_of_protocol(a) = all_846_2_2851 & intruder_message(all_375_6_796) = all_846_3_2852 & message(all_375_5_795) = all_846_0_2849 & ( ~ (all_846_1_2850 = 0) |  ~ (all_846_2_2851 = 0) |  ~ (all_846_3_2852 = 0) | all_846_0_2849 = 0)
% 51.74/18.37  																			|
% 51.74/18.37  																			| Applying alpha-rule on (2103) yields:
% 51.74/18.37  																			| (2104)  ~ (all_846_1_2850 = 0) |  ~ (all_846_2_2851 = 0) |  ~ (all_846_3_2852 = 0) | all_846_0_2849 = 0
% 51.74/18.37  																			| (2105) message(all_375_5_795) = all_846_0_2849
% 51.74/18.37  																			| (2106) party_of_protocol(b) = all_846_1_2850
% 51.74/18.37  																			| (2107) party_of_protocol(a) = all_846_2_2851
% 51.74/18.37  																			| (2108) intruder_message(all_375_6_796) = all_846_3_2852
% 51.74/18.37  																			|
% 51.74/18.37  																			| Instantiating (1221) with all_870_0_2910, all_870_1_2911, all_870_2_2912, all_870_3_2913 yields:
% 51.74/18.37  																			| (2109) party_of_protocol(b) = all_870_2_2912 & party_of_protocol(t) = all_870_1_2911 & intruder_message(all_369_3_774) = all_870_3_2913 & message(all_369_2_773) = all_870_0_2910 & ( ~ (all_870_1_2911 = 0) |  ~ (all_870_2_2912 = 0) |  ~ (all_870_3_2913 = 0) | all_870_0_2910 = 0)
% 51.74/18.37  																			|
% 51.74/18.37  																			| Applying alpha-rule on (2109) yields:
% 51.74/18.37  																			| (2110) message(all_369_2_773) = all_870_0_2910
% 51.74/18.37  																			| (2111)  ~ (all_870_1_2911 = 0) |  ~ (all_870_2_2912 = 0) |  ~ (all_870_3_2913 = 0) | all_870_0_2910 = 0
% 51.74/18.37  																			| (2112) party_of_protocol(b) = all_870_2_2912
% 51.74/18.37  																			| (2113) intruder_message(all_369_3_774) = all_870_3_2913
% 51.74/18.37  																			| (2114) party_of_protocol(t) = all_870_1_2911
% 51.74/18.37  																			|
% 51.74/18.37  																			| Instantiating formula (37) with all_285_1_617, all_812_0_2783, all_814_2_2788 and discharging atoms intruder_holds(all_285_1_617) = all_814_2_2788, intruder_holds(all_285_1_617) = all_812_0_2783, yields:
% 51.74/18.37  																			| (2115) all_814_2_2788 = all_812_0_2783
% 51.74/18.37  																			|
% 51.74/18.37  																			| Instantiating formula (66) with b, all_812_1_2784, all_824_1_2809 and discharging atoms party_of_protocol(b) = all_824_1_2809, party_of_protocol(b) = all_812_1_2784, yields:
% 51.74/18.37  																			| (2116) all_824_1_2809 = all_812_1_2784
% 51.74/18.37  																			|
% 51.74/18.37  																			| Instantiating formula (66) with b, all_810_1_2780, all_870_2_2912 and discharging atoms party_of_protocol(b) = all_870_2_2912, party_of_protocol(b) = all_810_1_2780, yields:
% 51.74/18.37  																			| (2117) all_870_2_2912 = all_810_1_2780
% 51.74/18.37  																			|
% 51.74/18.37  																			| Instantiating formula (66) with b, all_810_1_2780, all_846_1_2850 and discharging atoms party_of_protocol(b) = all_846_1_2850, party_of_protocol(b) = all_810_1_2780, yields:
% 51.74/18.37  																			| (2118) all_846_1_2850 = all_810_1_2780
% 51.74/18.37  																			|
% 51.74/18.37  																			| Instantiating formula (66) with b, all_802_1_2768, 0 and discharging atoms party_of_protocol(b) = all_802_1_2768, party_of_protocol(b) = 0, yields:
% 51.74/18.37  																			| (2119) all_802_1_2768 = 0
% 51.74/18.37  																			|
% 51.74/18.37  																			| Instantiating formula (66) with b, all_802_1_2768, all_812_1_2784 and discharging atoms party_of_protocol(b) = all_812_1_2784, party_of_protocol(b) = all_802_1_2768, yields:
% 51.74/18.37  																			| (2120) all_812_1_2784 = all_802_1_2768
% 51.74/18.37  																			|
% 51.74/18.37  																			| Instantiating formula (66) with b, all_802_1_2768, all_810_1_2780 and discharging atoms party_of_protocol(b) = all_810_1_2780, party_of_protocol(b) = all_802_1_2768, yields:
% 51.74/18.37  																			| (2121) all_810_1_2780 = all_802_1_2768
% 51.74/18.37  																			|
% 51.74/18.37  																			| Instantiating formula (66) with b, all_798_1_2762, all_802_1_2768 and discharging atoms party_of_protocol(b) = all_802_1_2768, party_of_protocol(b) = all_798_1_2762, yields:
% 51.74/18.37  																			| (2122) all_802_1_2768 = all_798_1_2762
% 51.74/18.37  																			|
% 51.74/18.37  																			| Instantiating formula (66) with b, all_798_2_2763, all_824_1_2809 and discharging atoms party_of_protocol(b) = all_824_1_2809, party_of_protocol(b) = all_798_2_2763, yields:
% 51.74/18.37  																			| (2123) all_824_1_2809 = all_798_2_2763
% 51.74/18.37  																			|
% 51.74/18.37  																			| Instantiating formula (66) with b, all_790_1_2741, all_846_1_2850 and discharging atoms party_of_protocol(b) = all_846_1_2850, party_of_protocol(b) = all_790_1_2741, yields:
% 51.74/18.37  																			| (2124) all_846_1_2850 = all_790_1_2741
% 51.74/18.37  																			|
% 51.74/18.37  																			| Instantiating formula (66) with b, all_778_1_2723, all_870_2_2912 and discharging atoms party_of_protocol(b) = all_870_2_2912, party_of_protocol(b) = all_778_1_2723, yields:
% 51.74/18.37  																			| (2125) all_870_2_2912 = all_778_1_2723
% 51.74/18.37  																			|
% 51.74/18.37  																			| Instantiating formula (66) with a, all_846_2_2851, 0 and discharging atoms party_of_protocol(a) = all_846_2_2851, party_of_protocol(a) = 0, yields:
% 51.74/18.37  																			| (2126) all_846_2_2851 = 0
% 51.74/18.37  																			|
% 51.74/18.37  																			| Instantiating formula (66) with a, all_822_1_2806, all_846_2_2851 and discharging atoms party_of_protocol(a) = all_846_2_2851, party_of_protocol(a) = all_822_1_2806, yields:
% 51.74/18.37  																			| (2127) all_846_2_2851 = all_822_1_2806
% 51.74/18.37  																			|
% 51.74/18.37  																			| Instantiating formula (66) with a, all_770_1_2713, all_846_2_2851 and discharging atoms party_of_protocol(a) = all_846_2_2851, party_of_protocol(a) = all_770_1_2713, yields:
% 51.74/18.37  																			| (2128) all_846_2_2851 = all_770_1_2713
% 51.74/18.37  																			|
% 51.74/18.37  																			| Instantiating formula (66) with t, all_870_1_2911, 0 and discharging atoms party_of_protocol(t) = all_870_1_2911, party_of_protocol(t) = 0, yields:
% 51.74/18.37  																			| (2129) all_870_1_2911 = 0
% 51.74/18.37  																			|
% 51.74/18.37  																			| Instantiating formula (66) with t, all_786_1_2736, all_870_1_2911 and discharging atoms party_of_protocol(t) = all_870_1_2911, party_of_protocol(t) = all_786_1_2736, yields:
% 51.74/18.37  																			| (2130) all_870_1_2911 = all_786_1_2736
% 51.74/18.37  																			|
% 51.74/18.37  																			| Instantiating formula (31) with all_375_6_796, all_842_0_2845, all_846_3_2852 and discharging atoms intruder_message(all_375_6_796) = all_846_3_2852, intruder_message(all_375_6_796) = all_842_0_2845, yields:
% 51.74/18.37  																			| (2131) all_846_3_2852 = all_842_0_2845
% 51.74/18.37  																			|
% 51.74/18.37  																			| Instantiating formula (31) with all_375_6_796, all_806_0_2773, all_846_3_2852 and discharging atoms intruder_message(all_375_6_796) = all_846_3_2852, intruder_message(all_375_6_796) = all_806_0_2773, yields:
% 51.74/18.37  																			| (2132) all_846_3_2852 = all_806_0_2773
% 51.74/18.37  																			|
% 51.74/18.37  																			| Instantiating formula (31) with all_375_6_796, all_796_2_2760, all_846_3_2852 and discharging atoms intruder_message(all_375_6_796) = all_846_3_2852, intruder_message(all_375_6_796) = all_796_2_2760, yields:
% 51.74/18.37  																			| (2133) all_846_3_2852 = all_796_2_2760
% 51.74/18.37  																			|
% 51.74/18.37  																			| Instantiating formula (31) with all_285_7_623, all_806_1_2774, all_808_1_2777 and discharging atoms intruder_message(all_285_7_623) = all_808_1_2777, intruder_message(all_285_7_623) = all_806_1_2774, yields:
% 51.74/18.37  																			| (2134) all_808_1_2777 = all_806_1_2774
% 51.74/18.37  																			|
% 51.74/18.37  																			| Instantiating formula (31) with all_285_7_623, all_796_0_2758, all_808_1_2777 and discharging atoms intruder_message(all_285_7_623) = all_808_1_2777, intruder_message(all_285_7_623) = all_796_0_2758, yields:
% 51.74/18.37  																			| (2135) all_808_1_2777 = all_796_0_2758
% 51.74/18.37  																			|
% 51.74/18.37  																			| Instantiating formula (31) with all_285_7_623, all_794_0_2755, all_806_1_2774 and discharging atoms intruder_message(all_285_7_623) = all_806_1_2774, intruder_message(all_285_7_623) = all_794_0_2755, yields:
% 51.74/18.37  																			| (2136) all_806_1_2774 = all_794_0_2755
% 51.74/18.37  																			|
% 51.74/18.37  																			| Instantiating formula (31) with all_63_4_187, all_808_2_2778, 0 and discharging atoms intruder_message(all_63_4_187) = all_808_2_2778, intruder_message(all_63_4_187) = 0, yields:
% 51.74/18.37  																			| (2137) all_808_2_2778 = 0
% 51.74/18.37  																			|
% 51.74/18.37  																			| Instantiating formula (31) with all_63_4_187, all_794_1_2756, all_808_2_2778 and discharging atoms intruder_message(all_63_4_187) = all_808_2_2778, intruder_message(all_63_4_187) = all_794_1_2756, yields:
% 51.74/18.37  																			| (2138) all_808_2_2778 = all_794_1_2756
% 51.74/18.37  																			|
% 51.74/18.37  																			| Instantiating formula (31) with all_61_4_176, all_806_2_2775, 0 and discharging atoms intruder_message(all_61_4_176) = all_806_2_2775, intruder_message(all_61_4_176) = 0, yields:
% 51.74/18.37  																			| (2139) all_806_2_2775 = 0
% 51.74/18.37  																			|
% 51.74/18.37  																			| Instantiating formula (31) with all_61_4_176, all_796_1_2759, all_806_2_2775 and discharging atoms intruder_message(all_61_4_176) = all_806_2_2775, intruder_message(all_61_4_176) = all_796_1_2759, yields:
% 51.74/18.37  																			| (2140) all_806_2_2775 = all_796_1_2759
% 51.74/18.37  																			|
% 51.74/18.37  																			| Instantiating formula (31) with an_a_nonce, all_812_2_2785, 0 and discharging atoms intruder_message(an_a_nonce) = all_812_2_2785, intruder_message(an_a_nonce) = 0, yields:
% 51.74/18.37  																			| (2141) all_812_2_2785 = 0
% 51.74/18.37  																			|
% 51.74/18.37  																			| Instantiating formula (31) with an_a_nonce, all_770_2_2714, all_812_2_2785 and discharging atoms intruder_message(an_a_nonce) = all_812_2_2785, intruder_message(an_a_nonce) = all_770_2_2714, yields:
% 51.74/18.37  																			| (2142) all_812_2_2785 = all_770_2_2714
% 51.74/18.37  																			|
% 51.74/18.37  																			| Instantiating formula (26) with all_375_1_791, all_772_0_2715, all_375_0_790 and discharging atoms b_holds(all_375_1_791) = all_772_0_2715, b_holds(all_375_1_791) = all_375_0_790, yields:
% 51.74/18.37  																			| (2143) all_772_0_2715 = all_375_0_790
% 51.74/18.37  																			|
% 51.74/18.37  																			| Instantiating formula (15) with all_375_5_795, all_846_0_2849, all_375_4_794 and discharging atoms message(all_375_5_795) = all_846_0_2849, message(all_375_5_795) = all_375_4_794, yields:
% 51.74/18.37  																			| (2144) all_846_0_2849 = all_375_4_794
% 51.74/18.37  																			|
% 51.74/18.37  																			| Instantiating formula (15) with all_375_5_795, all_842_1_2846, all_846_0_2849 and discharging atoms message(all_375_5_795) = all_846_0_2849, message(all_375_5_795) = all_842_1_2846, yields:
% 51.74/18.37  																			| (2145) all_846_0_2849 = all_842_1_2846
% 51.74/18.37  																			|
% 51.74/18.37  																			| Instantiating formula (55) with an_a_nonce, b, all_772_2_2717, all_285_1_617 and discharging atoms key(an_a_nonce, b) = all_772_2_2717, key(an_a_nonce, b) = all_285_1_617, yields:
% 51.74/18.37  																			| (2146) all_772_2_2717 = all_285_1_617
% 51.74/18.37  																			|
% 51.74/18.37  																			| Instantiating formula (55) with an_a_nonce, a, all_814_1_2787, all_375_1_791 and discharging atoms key(an_a_nonce, a) = all_814_1_2787, key(an_a_nonce, a) = all_375_1_791, yields:
% 51.74/18.37  																			| (2147) all_814_1_2787 = all_375_1_791
% 51.74/18.37  																			|
% 51.74/18.37  																			| Combining equations (2130,2129) yields a new equation:
% 51.74/18.37  																			| (2148) all_786_1_2736 = 0
% 51.74/18.37  																			|
% 51.74/18.37  																			| Simplifying 2148 yields:
% 51.74/18.37  																			| (2149) all_786_1_2736 = 0
% 51.74/18.37  																			|
% 51.74/18.37  																			| Combining equations (2117,2125) yields a new equation:
% 51.74/18.37  																			| (2150) all_810_1_2780 = all_778_1_2723
% 51.74/18.37  																			|
% 51.74/18.37  																			| Simplifying 2150 yields:
% 51.74/18.37  																			| (2151) all_810_1_2780 = all_778_1_2723
% 51.74/18.37  																			|
% 51.74/18.37  																			| Combining equations (2144,2145) yields a new equation:
% 51.74/18.37  																			| (2152) all_842_1_2846 = all_375_4_794
% 51.74/18.37  																			|
% 51.74/18.37  																			| Combining equations (2118,2124) yields a new equation:
% 51.74/18.37  																			| (2153) all_810_1_2780 = all_790_1_2741
% 51.74/18.37  																			|
% 51.74/18.37  																			| Simplifying 2153 yields:
% 51.74/18.37  																			| (2154) all_810_1_2780 = all_790_1_2741
% 51.74/18.37  																			|
% 51.74/18.37  																			| Combining equations (2128,2127) yields a new equation:
% 51.74/18.37  																			| (2155) all_822_1_2806 = all_770_1_2713
% 51.74/18.37  																			|
% 51.74/18.37  																			| Combining equations (2126,2127) yields a new equation:
% 51.74/18.38  																			| (2156) all_822_1_2806 = 0
% 51.74/18.38  																			|
% 51.74/18.38  																			| Combining equations (2132,2131) yields a new equation:
% 51.74/18.38  																			| (2157) all_842_0_2845 = all_806_0_2773
% 51.74/18.38  																			|
% 51.74/18.38  																			| Combining equations (2133,2131) yields a new equation:
% 51.74/18.38  																			| (2158) all_842_0_2845 = all_796_2_2760
% 51.74/18.38  																			|
% 51.74/18.38  																			| Combining equations (2158,2157) yields a new equation:
% 51.74/18.38  																			| (2159) all_806_0_2773 = all_796_2_2760
% 51.74/18.38  																			|
% 51.74/18.38  																			| Combining equations (2116,2123) yields a new equation:
% 51.74/18.38  																			| (2160) all_812_1_2784 = all_798_2_2763
% 51.74/18.38  																			|
% 51.74/18.38  																			| Simplifying 2160 yields:
% 51.74/18.38  																			| (2161) all_812_1_2784 = all_798_2_2763
% 51.74/18.38  																			|
% 51.74/18.38  																			| Combining equations (2155,2156) yields a new equation:
% 51.74/18.38  																			| (2162) all_770_1_2713 = 0
% 51.74/18.38  																			|
% 51.74/18.38  																			| Simplifying 2162 yields:
% 51.74/18.38  																			| (2163) all_770_1_2713 = 0
% 51.74/18.38  																			|
% 51.74/18.38  																			| Combining equations (2120,2161) yields a new equation:
% 51.74/18.38  																			| (2164) all_802_1_2768 = all_798_2_2763
% 51.74/18.38  																			|
% 51.74/18.38  																			| Simplifying 2164 yields:
% 51.74/18.38  																			| (2165) all_802_1_2768 = all_798_2_2763
% 51.74/18.38  																			|
% 51.74/18.38  																			| Combining equations (2141,2142) yields a new equation:
% 51.74/18.38  																			| (2166) all_770_2_2714 = 0
% 51.74/18.38  																			|
% 51.74/18.38  																			| Combining equations (2121,2154) yields a new equation:
% 51.74/18.38  																			| (2167) all_802_1_2768 = all_790_1_2741
% 51.74/18.38  																			|
% 51.74/18.38  																			| Simplifying 2167 yields:
% 51.74/18.38  																			| (2168) all_802_1_2768 = all_790_1_2741
% 51.74/18.38  																			|
% 51.74/18.38  																			| Combining equations (2151,2154) yields a new equation:
% 51.74/18.38  																			| (2169) all_790_1_2741 = all_778_1_2723
% 51.74/18.38  																			|
% 51.74/18.38  																			| Combining equations (2134,2135) yields a new equation:
% 51.74/18.38  																			| (2170) all_806_1_2774 = all_796_0_2758
% 51.74/18.38  																			|
% 51.74/18.38  																			| Simplifying 2170 yields:
% 51.74/18.38  																			| (2171) all_806_1_2774 = all_796_0_2758
% 51.74/18.38  																			|
% 51.74/18.38  																			| Combining equations (2138,2137) yields a new equation:
% 51.74/18.38  																			| (2172) all_794_1_2756 = 0
% 51.74/18.38  																			|
% 51.74/18.38  																			| Simplifying 2172 yields:
% 51.74/18.38  																			| (2173) all_794_1_2756 = 0
% 51.74/18.38  																			|
% 51.74/18.38  																			| Combining equations (2136,2171) yields a new equation:
% 51.74/18.38  																			| (2174) all_796_0_2758 = all_794_0_2755
% 51.74/18.38  																			|
% 51.74/18.38  																			| Combining equations (2139,2140) yields a new equation:
% 51.74/18.38  																			| (2175) all_796_1_2759 = 0
% 51.74/18.38  																			|
% 51.74/18.38  																			| Combining equations (2119,2122) yields a new equation:
% 51.74/18.38  																			| (2176) all_798_1_2762 = 0
% 51.74/18.38  																			|
% 51.74/18.38  																			| Combining equations (2168,2122) yields a new equation:
% 51.74/18.38  																			| (2177) all_798_1_2762 = all_790_1_2741
% 51.74/18.38  																			|
% 51.74/18.38  																			| Combining equations (2165,2122) yields a new equation:
% 51.74/18.38  																			| (2178) all_798_1_2762 = all_798_2_2763
% 51.74/18.38  																			|
% 51.74/18.38  																			| Combining equations (2176,2178) yields a new equation:
% 51.74/18.38  																			| (2179) all_798_2_2763 = 0
% 51.74/18.38  																			|
% 51.74/18.38  																			| Combining equations (2177,2178) yields a new equation:
% 51.74/18.38  																			| (2180) all_798_2_2763 = all_790_1_2741
% 51.74/18.38  																			|
% 51.74/18.38  																			| Combining equations (2180,2179) yields a new equation:
% 51.74/18.38  																			| (2181) all_790_1_2741 = 0
% 51.74/18.38  																			|
% 51.74/18.38  																			| Simplifying 2181 yields:
% 51.74/18.38  																			| (2182) all_790_1_2741 = 0
% 51.74/18.38  																			|
% 51.74/18.38  																			| Combining equations (2182,2169) yields a new equation:
% 51.74/18.38  																			| (2183) all_778_1_2723 = 0
% 51.74/18.38  																			|
% 51.74/18.38  																			| Combining equations (2183,2169) yields a new equation:
% 51.74/18.38  																			| (2182) all_790_1_2741 = 0
% 51.74/18.38  																			|
% 51.74/18.38  																			| Combining equations (2175,2140) yields a new equation:
% 51.74/18.38  																			| (2139) all_806_2_2775 = 0
% 51.74/18.38  																			|
% 51.74/18.38  																			| Combining equations (2174,2171) yields a new equation:
% 51.74/18.38  																			| (2136) all_806_1_2774 = all_794_0_2755
% 51.74/18.38  																			|
% 51.74/18.38  																			| Combining equations (2166,2142) yields a new equation:
% 51.74/18.38  																			| (2141) all_812_2_2785 = 0
% 51.74/18.38  																			|
% 51.74/18.38  																			| Combining equations (2179,2161) yields a new equation:
% 51.74/18.38  																			| (2188) all_812_1_2784 = 0
% 51.74/18.38  																			|
% 51.74/18.38  																			| Combining equations (2159,2157) yields a new equation:
% 51.74/18.38  																			| (2158) all_842_0_2845 = all_796_2_2760
% 51.74/18.38  																			|
% 51.74/18.38  																			| Combining equations (2158,2131) yields a new equation:
% 51.74/18.38  																			| (2133) all_846_3_2852 = all_796_2_2760
% 51.74/18.38  																			|
% 51.74/18.38  																			| Combining equations (2156,2127) yields a new equation:
% 51.74/18.38  																			| (2126) all_846_2_2851 = 0
% 51.74/18.38  																			|
% 51.74/18.38  																			| Combining equations (2182,2124) yields a new equation:
% 51.74/18.38  																			| (2192) all_846_1_2850 = 0
% 51.74/18.38  																			|
% 51.74/18.38  																			| Combining equations (2152,2145) yields a new equation:
% 51.74/18.38  																			| (2144) all_846_0_2849 = all_375_4_794
% 51.74/18.38  																			|
% 51.74/18.38  																			| From (2146) and (2020) follows:
% 51.74/18.38  																			| (2194) intruder_holds(all_285_1_617) = all_772_1_2716
% 51.74/18.38  																			|
% 51.74/18.38  																			| From (2115) and (2085) follows:
% 51.74/18.38  																			| (2080) intruder_holds(all_285_1_617) = all_812_0_2783
% 51.74/18.38  																			|
% 51.74/18.38  																			| From (2183) and (2027) follows:
% 51.74/18.38  																			| (10) party_of_protocol(b) = 0
% 51.74/18.38  																			|
% 51.74/18.38  																			| From (2163) and (2016) follows:
% 51.74/18.38  																			| (43) party_of_protocol(a) = 0
% 51.74/18.38  																			|
% 51.74/18.38  																			| From (2149) and (2032) follows:
% 51.74/18.38  																			| (34) party_of_protocol(t) = 0
% 51.74/18.38  																			|
% 51.74/18.38  																			| From (2174) and (2048) follows:
% 51.74/18.38  																			| (2043) intruder_message(all_285_7_623) = all_794_0_2755
% 51.74/18.38  																			|
% 51.74/18.38  																			| From (2173) and (2044) follows:
% 51.74/18.38  																			| (1197) intruder_message(all_63_4_187) = 0
% 51.74/18.38  																			|
% 51.74/18.38  																			| From (2147) and (2086) follows:
% 51.74/18.38  																			| (2201) b_holds(all_375_1_791) = all_814_0_2786
% 51.74/18.38  																			|
% 51.74/18.38  																			| From (2143) and (2021) follows:
% 51.74/18.38  																			| (918) b_holds(all_375_1_791) = all_375_0_790
% 51.74/18.38  																			|
% 51.74/18.38  																			| From (2146) and (2022) follows:
% 51.74/18.38  																			| (716) key(an_a_nonce, b) = all_285_1_617
% 51.74/18.38  																			|
% 51.74/18.38  																			+-Applying beta-rule and splitting (2083), into two cases.
% 51.74/18.38  																			|-Branch one:
% 51.74/18.38  																			| (2204)  ~ (all_812_1_2784 = 0)
% 51.74/18.38  																			|
% 51.74/18.38  																				| Equations (2188) can reduce 2204 to:
% 51.74/18.38  																				| (551) $false
% 51.74/18.38  																				|
% 51.74/18.38  																				|-The branch is then unsatisfiable
% 51.74/18.38  																			|-Branch two:
% 51.74/18.38  																			| (2188) all_812_1_2784 = 0
% 51.74/18.38  																			| (2207)  ~ (all_812_2_2785 = 0) | all_812_0_2783 = 0
% 51.74/18.38  																			|
% 51.74/18.38  																				+-Applying beta-rule and splitting (2207), into two cases.
% 51.74/18.38  																				|-Branch one:
% 51.74/18.38  																				| (2208)  ~ (all_812_2_2785 = 0)
% 51.74/18.38  																				|
% 51.74/18.38  																					| Equations (2141) can reduce 2208 to:
% 51.74/18.38  																					| (551) $false
% 51.74/18.38  																					|
% 51.74/18.38  																					|-The branch is then unsatisfiable
% 51.74/18.38  																				|-Branch two:
% 51.74/18.38  																				| (2141) all_812_2_2785 = 0
% 51.74/18.38  																				| (2211) all_812_0_2783 = 0
% 51.74/18.38  																				|
% 51.74/18.38  																					| Combining equations (2211,2115) yields a new equation:
% 51.74/18.38  																					| (2212) all_814_2_2788 = 0
% 51.74/18.38  																					|
% 51.74/18.38  																					| From (2211) and (2080) follows:
% 51.74/18.38  																					| (1467) intruder_holds(all_285_1_617) = 0
% 51.74/18.38  																					|
% 51.74/18.38  																					+-Applying beta-rule and splitting (2088), into two cases.
% 51.74/18.38  																					|-Branch one:
% 51.74/18.38  																					| (2214)  ~ (all_814_0_2786 = 0)
% 51.74/18.38  																					|
% 51.74/18.38  																						| Instantiating formula (37) with all_285_1_617, 0, all_772_1_2716 and discharging atoms intruder_holds(all_285_1_617) = all_772_1_2716, intruder_holds(all_285_1_617) = 0, yields:
% 51.74/18.38  																						| (2215) all_772_1_2716 = 0
% 51.74/18.38  																						|
% 51.74/18.38  																						| Instantiating formula (26) with all_375_1_791, all_814_0_2786, all_375_0_790 and discharging atoms b_holds(all_375_1_791) = all_814_0_2786, b_holds(all_375_1_791) = all_375_0_790, yields:
% 51.74/18.39  																						| (2216) all_814_0_2786 = all_375_0_790
% 51.74/18.39  																						|
% 51.74/18.39  																						| Equations (2216) can reduce 2214 to:
% 51.74/18.39  																						| (1471)  ~ (all_375_0_790 = 0)
% 51.74/18.39  																						|
% 51.74/18.39  																						| From (2215) and (2194) follows:
% 51.74/18.39  																						| (1467) intruder_holds(all_285_1_617) = 0
% 51.74/18.39  																						|
% 51.74/18.39  																						+-Applying beta-rule and splitting (916), into two cases.
% 51.74/18.39  																						|-Branch one:
% 51.74/18.39  																						| (1473)  ~ (all_375_2_792 = 0)
% 51.74/18.39  																						|
% 51.74/18.39  																							| Equations (1198) can reduce 1473 to:
% 51.74/18.39  																							| (551) $false
% 51.74/18.39  																							|
% 51.74/18.39  																							|-The branch is then unsatisfiable
% 51.74/18.39  																						|-Branch two:
% 51.74/18.39  																						| (1198) all_375_2_792 = 0
% 51.74/18.39  																						| (1476)  ~ (all_375_4_794 = 0) | all_375_0_790 = 0
% 51.74/18.39  																						|
% 51.74/18.39  																							+-Applying beta-rule and splitting (1476), into two cases.
% 51.74/18.39  																							|-Branch one:
% 51.74/18.39  																							| (1477)  ~ (all_375_4_794 = 0)
% 51.74/18.39  																							|
% 51.74/18.39  																								+-Applying beta-rule and splitting (2104), into two cases.
% 51.74/18.39  																								|-Branch one:
% 51.74/18.39  																								| (2224)  ~ (all_846_1_2850 = 0)
% 51.74/18.39  																								|
% 51.74/18.39  																									| Equations (2192) can reduce 2224 to:
% 51.74/18.39  																									| (551) $false
% 51.74/18.39  																									|
% 51.74/18.39  																									|-The branch is then unsatisfiable
% 51.74/18.39  																								|-Branch two:
% 51.74/18.39  																								| (2192) all_846_1_2850 = 0
% 51.74/18.39  																								| (2227)  ~ (all_846_2_2851 = 0) |  ~ (all_846_3_2852 = 0) | all_846_0_2849 = 0
% 51.74/18.39  																								|
% 51.74/18.39  																									+-Applying beta-rule and splitting (2227), into two cases.
% 51.74/18.39  																									|-Branch one:
% 51.74/18.39  																									| (2228)  ~ (all_846_2_2851 = 0)
% 51.74/18.39  																									|
% 51.74/18.39  																										| Equations (2126) can reduce 2228 to:
% 51.74/18.39  																										| (551) $false
% 51.74/18.39  																										|
% 51.74/18.39  																										|-The branch is then unsatisfiable
% 51.74/18.39  																									|-Branch two:
% 51.74/18.39  																									| (2126) all_846_2_2851 = 0
% 51.74/18.39  																									| (2231)  ~ (all_846_3_2852 = 0) | all_846_0_2849 = 0
% 51.74/18.39  																									|
% 51.74/18.39  																										+-Applying beta-rule and splitting (2231), into two cases.
% 51.74/18.39  																										|-Branch one:
% 51.74/18.39  																										| (2232)  ~ (all_846_3_2852 = 0)
% 51.74/18.39  																										|
% 51.74/18.39  																											| Equations (2133) can reduce 2232 to:
% 51.74/18.39  																											| (2233)  ~ (all_796_2_2760 = 0)
% 51.74/18.39  																											|
% 51.74/18.39  																											+-Applying beta-rule and splitting (2067), into two cases.
% 51.74/18.39  																											|-Branch one:
% 51.74/18.39  																											| (2234)  ~ (all_806_1_2774 = 0)
% 51.74/18.39  																											|
% 51.74/18.39  																												| Equations (2136) can reduce 2234 to:
% 51.74/18.39  																												| (2235)  ~ (all_794_0_2755 = 0)
% 51.74/18.39  																												|
% 51.74/18.39  																												| Instantiating formula (63) with all_285_1_617, b, an_a_nonce, all_63_4_187 and discharging atoms intruder_holds(all_285_1_617) = 0, intruder_message(all_63_4_187) = 0, key(an_a_nonce, b) = all_285_1_617, yields:
% 51.74/18.39  																												| (2236)  ? [v0] :  ? [v1] :  ? [v2] : (party_of_protocol(b) = v0 & intruder_message(v1) = v2 & encrypt(all_63_4_187, an_a_nonce) = v1 & ( ~ (v0 = 0) | v2 = 0))
% 51.74/18.39  																												|
% 51.74/18.39  																												| Instantiating formula (63) with all_285_1_617, b, an_a_nonce, all_61_7_179 and discharging atoms intruder_holds(all_285_1_617) = 0, intruder_message(all_61_7_179) = 0, key(an_a_nonce, b) = all_285_1_617, yields:
% 51.74/18.39  																												| (1511)  ? [v0] :  ? [v1] :  ? [v2] : (party_of_protocol(b) = v0 & intruder_message(v1) = v2 & encrypt(all_61_7_179, an_a_nonce) = v1 & ( ~ (v0 = 0) | v2 = 0))
% 51.74/18.39  																												|
% 51.74/18.39  																												| Instantiating formula (63) with all_285_1_617, b, an_a_nonce, all_0_3_3 and discharging atoms intruder_holds(all_285_1_617) = 0, intruder_message(all_0_3_3) = 0, key(an_a_nonce, b) = all_285_1_617, yields:
% 51.74/18.39  																												| (2238)  ? [v0] :  ? [v1] :  ? [v2] : (party_of_protocol(b) = v0 & intruder_message(v1) = v2 & encrypt(all_0_3_3, an_a_nonce) = v1 & ( ~ (v0 = 0) | v2 = 0))
% 51.74/18.39  																												|
% 51.74/18.39  																												| Instantiating formula (45) with all_794_0_2755, all_285_7_623, all_285_1_617, b, an_a_nonce, all_61_7_179 and discharging atoms intruder_holds(all_285_1_617) = 0, intruder_message(all_285_7_623) = all_794_0_2755, encrypt(all_61_7_179, an_a_nonce) = all_285_7_623, key(an_a_nonce, b) = all_285_1_617, yields:
% 51.74/18.39  																												| (2239) all_794_0_2755 = 0 |  ? [v0] :  ? [v1] : (party_of_protocol(b) = v1 & intruder_message(all_61_7_179) = v0 & ( ~ (v1 = 0) |  ~ (v0 = 0)))
% 51.74/18.39  																												|
% 51.74/18.39  																												| Instantiating formula (7) with all_794_0_2755, all_285_7_623, b, an_a_nonce, all_61_7_179 and discharging atoms party_of_protocol(b) = 0, intruder_message(all_285_7_623) = all_794_0_2755, encrypt(all_61_7_179, an_a_nonce) = all_285_7_623, yields:
% 51.74/18.39  																												| (2240) all_794_0_2755 = 0 |  ? [v0] :  ? [v1] :  ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_61_7_179) = v0 & key(an_a_nonce, b) = v1 & ( ~ (v2 = 0) |  ~ (v0 = 0)))
% 51.74/18.39  																												|
% 51.74/18.39  																												| Instantiating formula (7) with all_794_0_2755, all_285_7_623, a, an_a_nonce, all_61_7_179 and discharging atoms party_of_protocol(a) = 0, intruder_message(all_285_7_623) = all_794_0_2755, encrypt(all_61_7_179, an_a_nonce) = all_285_7_623, yields:
% 51.74/18.39  																												| (2241) all_794_0_2755 = 0 |  ? [v0] :  ? [v1] :  ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_61_7_179) = v0 & key(an_a_nonce, a) = v1 & ( ~ (v2 = 0) |  ~ (v0 = 0)))
% 51.74/18.39  																												|
% 51.74/18.39  																												| Instantiating formula (7) with all_794_0_2755, all_285_7_623, t, an_a_nonce, all_61_7_179 and discharging atoms party_of_protocol(t) = 0, intruder_message(all_285_7_623) = all_794_0_2755, encrypt(all_61_7_179, an_a_nonce) = all_285_7_623, yields:
% 51.74/18.39  																												| (2242) all_794_0_2755 = 0 |  ? [v0] :  ? [v1] :  ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_61_7_179) = v0 & key(an_a_nonce, t) = v1 & ( ~ (v2 = 0) |  ~ (v0 = 0)))
% 51.74/18.39  																												|
% 51.74/18.39  																												| Instantiating formula (73) with all_766_2_2699, t, b, all_766_3_2700 and discharging atoms sent(b, t, all_766_3_2700) = all_766_2_2699, yields:
% 51.74/18.39  																												| (2243)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (party_of_protocol(b) = v1 & party_of_protocol(t) = v2 & intruder_message(all_766_3_2700) = v0 & message(all_766_2_2699) = v3 & ( ~ (v2 = 0) |  ~ (v1 = 0) |  ~ (v0 = 0) | v3 = 0))
% 51.74/18.39  																												|
% 51.74/18.39  																												| Instantiating (2243) with all_1390_0_3442, all_1390_1_3443, all_1390_2_3444, all_1390_3_3445 yields:
% 51.74/18.39  																												| (2244) party_of_protocol(b) = all_1390_2_3444 & party_of_protocol(t) = all_1390_1_3443 & intruder_message(all_766_3_2700) = all_1390_3_3445 & message(all_766_2_2699) = all_1390_0_3442 & ( ~ (all_1390_1_3443 = 0) |  ~ (all_1390_2_3444 = 0) |  ~ (all_1390_3_3445 = 0) | all_1390_0_3442 = 0)
% 51.74/18.39  																												|
% 51.74/18.39  																												| Applying alpha-rule on (2244) yields:
% 51.74/18.39  																												| (2245) party_of_protocol(t) = all_1390_1_3443
% 51.74/18.39  																												| (2246) party_of_protocol(b) = all_1390_2_3444
% 51.74/18.39  																												| (2247) intruder_message(all_766_3_2700) = all_1390_3_3445
% 51.74/18.39  																												| (2248)  ~ (all_1390_1_3443 = 0) |  ~ (all_1390_2_3444 = 0) |  ~ (all_1390_3_3445 = 0) | all_1390_0_3442 = 0
% 51.74/18.39  																												| (2249) message(all_766_2_2699) = all_1390_0_3442
% 51.74/18.39  																												|
% 51.74/18.39  																												| Instantiating (2238) with all_1396_0_3452, all_1396_1_3453, all_1396_2_3454 yields:
% 51.74/18.39  																												| (2250) party_of_protocol(b) = all_1396_2_3454 & intruder_message(all_1396_1_3453) = all_1396_0_3452 & encrypt(all_0_3_3, an_a_nonce) = all_1396_1_3453 & ( ~ (all_1396_2_3454 = 0) | all_1396_0_3452 = 0)
% 51.74/18.39  																												|
% 51.74/18.39  																												| Applying alpha-rule on (2250) yields:
% 51.74/18.39  																												| (2251) party_of_protocol(b) = all_1396_2_3454
% 51.74/18.39  																												| (2252) intruder_message(all_1396_1_3453) = all_1396_0_3452
% 51.74/18.39  																												| (2253) encrypt(all_0_3_3, an_a_nonce) = all_1396_1_3453
% 51.74/18.39  																												| (2254)  ~ (all_1396_2_3454 = 0) | all_1396_0_3452 = 0
% 51.74/18.39  																												|
% 51.74/18.39  																												| Instantiating (1511) with all_1454_0_3625, all_1454_1_3626, all_1454_2_3627 yields:
% 51.74/18.39  																												| (2255) party_of_protocol(b) = all_1454_2_3627 & intruder_message(all_1454_1_3626) = all_1454_0_3625 & encrypt(all_61_7_179, an_a_nonce) = all_1454_1_3626 & ( ~ (all_1454_2_3627 = 0) | all_1454_0_3625 = 0)
% 51.74/18.39  																												|
% 51.74/18.39  																												| Applying alpha-rule on (2255) yields:
% 51.74/18.39  																												| (2256) party_of_protocol(b) = all_1454_2_3627
% 51.74/18.39  																												| (2257) intruder_message(all_1454_1_3626) = all_1454_0_3625
% 51.74/18.39  																												| (2258) encrypt(all_61_7_179, an_a_nonce) = all_1454_1_3626
% 51.74/18.39  																												| (2259)  ~ (all_1454_2_3627 = 0) | all_1454_0_3625 = 0
% 51.74/18.39  																												|
% 51.74/18.39  																												| Instantiating (2236) with all_1458_0_3631, all_1458_1_3632, all_1458_2_3633 yields:
% 51.74/18.39  																												| (2260) party_of_protocol(b) = all_1458_2_3633 & intruder_message(all_1458_1_3632) = all_1458_0_3631 & encrypt(all_63_4_187, an_a_nonce) = all_1458_1_3632 & ( ~ (all_1458_2_3633 = 0) | all_1458_0_3631 = 0)
% 51.74/18.39  																												|
% 51.74/18.39  																												| Applying alpha-rule on (2260) yields:
% 51.74/18.39  																												| (2261) party_of_protocol(b) = all_1458_2_3633
% 51.74/18.39  																												| (2262) intruder_message(all_1458_1_3632) = all_1458_0_3631
% 51.74/18.39  																												| (2263) encrypt(all_63_4_187, an_a_nonce) = all_1458_1_3632
% 51.74/18.39  																												| (2264)  ~ (all_1458_2_3633 = 0) | all_1458_0_3631 = 0
% 51.74/18.39  																												|
% 51.74/18.39  																												+-Applying beta-rule and splitting (2239), into two cases.
% 51.74/18.39  																												|-Branch one:
% 51.74/18.39  																												| (2265) all_794_0_2755 = 0
% 51.74/18.39  																												|
% 51.74/18.39  																													| Equations (2265) can reduce 2235 to:
% 51.74/18.39  																													| (551) $false
% 51.74/18.39  																													|
% 51.74/18.39  																													|-The branch is then unsatisfiable
% 51.74/18.39  																												|-Branch two:
% 51.74/18.39  																												| (2235)  ~ (all_794_0_2755 = 0)
% 51.74/18.39  																												| (1707)  ? [v0] :  ? [v1] : (party_of_protocol(b) = v1 & intruder_message(all_61_7_179) = v0 & ( ~ (v1 = 0) |  ~ (v0 = 0)))
% 51.74/18.39  																												|
% 51.74/18.39  																													| Instantiating (1707) with all_1502_0_3702, all_1502_1_3703 yields:
% 51.74/18.39  																													| (2269) party_of_protocol(b) = all_1502_0_3702 & intruder_message(all_61_7_179) = all_1502_1_3703 & ( ~ (all_1502_0_3702 = 0) |  ~ (all_1502_1_3703 = 0))
% 51.74/18.39  																													|
% 51.74/18.39  																													| Applying alpha-rule on (2269) yields:
% 51.74/18.39  																													| (2270) party_of_protocol(b) = all_1502_0_3702
% 51.74/18.39  																													| (2271) intruder_message(all_61_7_179) = all_1502_1_3703
% 51.74/18.39  																													| (2272)  ~ (all_1502_0_3702 = 0) |  ~ (all_1502_1_3703 = 0)
% 51.74/18.39  																													|
% 51.74/18.39  																													+-Applying beta-rule and splitting (2241), into two cases.
% 51.74/18.39  																													|-Branch one:
% 51.74/18.39  																													| (2265) all_794_0_2755 = 0
% 51.74/18.39  																													|
% 51.74/18.40  																														| Equations (2265) can reduce 2235 to:
% 51.74/18.40  																														| (551) $false
% 51.74/18.40  																														|
% 51.74/18.40  																														|-The branch is then unsatisfiable
% 51.74/18.40  																													|-Branch two:
% 51.74/18.40  																													| (2235)  ~ (all_794_0_2755 = 0)
% 51.74/18.40  																													| (1631)  ? [v0] :  ? [v1] :  ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_61_7_179) = v0 & key(an_a_nonce, a) = v1 & ( ~ (v2 = 0) |  ~ (v0 = 0)))
% 51.74/18.40  																													|
% 51.74/18.40  																														| Instantiating (1631) with all_1508_0_3704, all_1508_1_3705, all_1508_2_3706 yields:
% 51.74/18.40  																														| (2277) intruder_holds(all_1508_1_3705) = all_1508_0_3704 & intruder_message(all_61_7_179) = all_1508_2_3706 & key(an_a_nonce, a) = all_1508_1_3705 & ( ~ (all_1508_0_3704 = 0) |  ~ (all_1508_2_3706 = 0))
% 51.74/18.40  																														|
% 51.74/18.40  																														| Applying alpha-rule on (2277) yields:
% 51.74/18.40  																														| (2278) intruder_holds(all_1508_1_3705) = all_1508_0_3704
% 51.74/18.40  																														| (2279) intruder_message(all_61_7_179) = all_1508_2_3706
% 51.74/18.40  																														| (2280) key(an_a_nonce, a) = all_1508_1_3705
% 51.74/18.40  																														| (2281)  ~ (all_1508_0_3704 = 0) |  ~ (all_1508_2_3706 = 0)
% 51.74/18.40  																														|
% 51.74/18.40  																														+-Applying beta-rule and splitting (2240), into two cases.
% 51.74/18.40  																														|-Branch one:
% 51.74/18.40  																														| (2265) all_794_0_2755 = 0
% 51.74/18.40  																														|
% 51.74/18.40  																															| Equations (2265) can reduce 2235 to:
% 51.74/18.40  																															| (551) $false
% 51.74/18.40  																															|
% 51.74/18.40  																															|-The branch is then unsatisfiable
% 51.74/18.40  																														|-Branch two:
% 51.74/18.40  																														| (2235)  ~ (all_794_0_2755 = 0)
% 51.74/18.40  																														| (1639)  ? [v0] :  ? [v1] :  ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_61_7_179) = v0 & key(an_a_nonce, b) = v1 & ( ~ (v2 = 0) |  ~ (v0 = 0)))
% 51.74/18.40  																														|
% 51.74/18.40  																															| Instantiating (1639) with all_1514_0_3707, all_1514_1_3708, all_1514_2_3709 yields:
% 51.74/18.40  																															| (2286) intruder_holds(all_1514_1_3708) = all_1514_0_3707 & intruder_message(all_61_7_179) = all_1514_2_3709 & key(an_a_nonce, b) = all_1514_1_3708 & ( ~ (all_1514_0_3707 = 0) |  ~ (all_1514_2_3709 = 0))
% 51.74/18.40  																															|
% 51.74/18.40  																															| Applying alpha-rule on (2286) yields:
% 51.74/18.40  																															| (2287) intruder_holds(all_1514_1_3708) = all_1514_0_3707
% 51.74/18.40  																															| (2288) intruder_message(all_61_7_179) = all_1514_2_3709
% 51.74/18.40  																															| (2289) key(an_a_nonce, b) = all_1514_1_3708
% 51.74/18.40  																															| (2290)  ~ (all_1514_0_3707 = 0) |  ~ (all_1514_2_3709 = 0)
% 51.74/18.40  																															|
% 51.74/18.40  																															+-Applying beta-rule and splitting (2242), into two cases.
% 51.74/18.40  																															|-Branch one:
% 51.74/18.40  																															| (2265) all_794_0_2755 = 0
% 51.74/18.40  																															|
% 51.74/18.40  																																| Equations (2265) can reduce 2235 to:
% 51.74/18.40  																																| (551) $false
% 51.74/18.40  																																|
% 51.74/18.40  																																|-The branch is then unsatisfiable
% 51.74/18.40  																															|-Branch two:
% 51.74/18.40  																															| (2235)  ~ (all_794_0_2755 = 0)
% 51.74/18.40  																															| (1635)  ? [v0] :  ? [v1] :  ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_61_7_179) = v0 & key(an_a_nonce, t) = v1 & ( ~ (v2 = 0) |  ~ (v0 = 0)))
% 51.74/18.40  																															|
% 51.74/18.40  																																| Instantiating (1635) with all_1520_0_3710, all_1520_1_3711, all_1520_2_3712 yields:
% 51.74/18.40  																																| (2295) intruder_holds(all_1520_1_3711) = all_1520_0_3710 & intruder_message(all_61_7_179) = all_1520_2_3712 & key(an_a_nonce, t) = all_1520_1_3711 & ( ~ (all_1520_0_3710 = 0) |  ~ (all_1520_2_3712 = 0))
% 51.74/18.40  																																|
% 51.74/18.40  																																| Applying alpha-rule on (2295) yields:
% 51.74/18.40  																																| (2296) intruder_holds(all_1520_1_3711) = all_1520_0_3710
% 51.74/18.40  																																| (2297) intruder_message(all_61_7_179) = all_1520_2_3712
% 51.74/18.40  																																| (2298) key(an_a_nonce, t) = all_1520_1_3711
% 51.74/18.40  																																| (2299)  ~ (all_1520_0_3710 = 0) |  ~ (all_1520_2_3712 = 0)
% 51.74/18.40  																																|
% 51.74/18.40  																																| Instantiating formula (66) with b, all_1458_2_3633, all_1502_0_3702 and discharging atoms party_of_protocol(b) = all_1502_0_3702, party_of_protocol(b) = all_1458_2_3633, yields:
% 51.74/18.40  																																| (2300) all_1502_0_3702 = all_1458_2_3633
% 51.74/18.40  																																|
% 51.74/18.40  																																| Instantiating formula (66) with b, all_1454_2_3627, all_1458_2_3633 and discharging atoms party_of_protocol(b) = all_1458_2_3633, party_of_protocol(b) = all_1454_2_3627, yields:
% 51.74/18.40  																																| (2301) all_1458_2_3633 = all_1454_2_3627
% 51.74/18.40  																																|
% 51.74/18.40  																																| Instantiating formula (66) with b, all_1396_2_3454, 0 and discharging atoms party_of_protocol(b) = all_1396_2_3454, party_of_protocol(b) = 0, yields:
% 51.74/18.40  																																| (2302) all_1396_2_3454 = 0
% 51.74/18.40  																																|
% 51.74/18.40  																																| Instantiating formula (66) with b, all_1396_2_3454, all_1458_2_3633 and discharging atoms party_of_protocol(b) = all_1458_2_3633, party_of_protocol(b) = all_1396_2_3454, yields:
% 51.74/18.40  																																| (2303) all_1458_2_3633 = all_1396_2_3454
% 51.74/18.40  																																|
% 51.74/18.40  																																| Instantiating formula (66) with b, all_1390_2_3444, all_1502_0_3702 and discharging atoms party_of_protocol(b) = all_1502_0_3702, party_of_protocol(b) = all_1390_2_3444, yields:
% 51.74/18.40  																																| (2304) all_1502_0_3702 = all_1390_2_3444
% 51.74/18.40  																																|
% 51.74/18.40  																																| Instantiating formula (31) with all_61_7_179, all_1514_2_3709, 0 and discharging atoms intruder_message(all_61_7_179) = all_1514_2_3709, intruder_message(all_61_7_179) = 0, yields:
% 51.74/18.40  																																| (2305) all_1514_2_3709 = 0
% 51.74/18.40  																																|
% 51.74/18.40  																																| Instantiating formula (31) with all_61_7_179, all_1508_2_3706, all_1520_2_3712 and discharging atoms intruder_message(all_61_7_179) = all_1520_2_3712, intruder_message(all_61_7_179) = all_1508_2_3706, yields:
% 51.74/18.40  																																| (2306) all_1520_2_3712 = all_1508_2_3706
% 51.74/18.40  																																|
% 51.74/18.40  																																| Instantiating formula (31) with all_61_7_179, all_1508_2_3706, all_1514_2_3709 and discharging atoms intruder_message(all_61_7_179) = all_1514_2_3709, intruder_message(all_61_7_179) = all_1508_2_3706, yields:
% 51.74/18.40  																																| (2307) all_1514_2_3709 = all_1508_2_3706
% 51.74/18.40  																																|
% 51.74/18.40  																																| Instantiating formula (31) with all_61_7_179, all_1502_1_3703, all_1520_2_3712 and discharging atoms intruder_message(all_61_7_179) = all_1520_2_3712, intruder_message(all_61_7_179) = all_1502_1_3703, yields:
% 51.74/18.40  																																| (2308) all_1520_2_3712 = all_1502_1_3703
% 51.74/18.40  																																|
% 51.74/18.40  																																| Combining equations (2306,2308) yields a new equation:
% 51.74/18.40  																																| (2309) all_1508_2_3706 = all_1502_1_3703
% 51.74/18.40  																																|
% 51.74/18.40  																																| Simplifying 2309 yields:
% 51.74/18.40  																																| (2310) all_1508_2_3706 = all_1502_1_3703
% 51.74/18.40  																																|
% 51.84/18.40  																																| Combining equations (2307,2305) yields a new equation:
% 51.84/18.40  																																| (2311) all_1508_2_3706 = 0
% 51.84/18.40  																																|
% 51.84/18.40  																																| Simplifying 2311 yields:
% 51.84/18.40  																																| (2312) all_1508_2_3706 = 0
% 51.84/18.40  																																|
% 51.84/18.40  																																| Combining equations (2312,2310) yields a new equation:
% 51.84/18.40  																																| (2313) all_1502_1_3703 = 0
% 51.84/18.40  																																|
% 51.84/18.40  																																| Combining equations (2300,2304) yields a new equation:
% 51.84/18.40  																																| (2314) all_1458_2_3633 = all_1390_2_3444
% 51.84/18.40  																																|
% 51.84/18.40  																																| Simplifying 2314 yields:
% 51.84/18.40  																																| (2315) all_1458_2_3633 = all_1390_2_3444
% 51.84/18.40  																																|
% 51.84/18.40  																																| Combining equations (2303,2301) yields a new equation:
% 51.84/18.40  																																| (2316) all_1454_2_3627 = all_1396_2_3454
% 51.84/18.40  																																|
% 51.84/18.40  																																| Combining equations (2315,2301) yields a new equation:
% 51.84/18.40  																																| (2317) all_1454_2_3627 = all_1390_2_3444
% 51.84/18.40  																																|
% 51.84/18.40  																																| Combining equations (2316,2317) yields a new equation:
% 51.84/18.40  																																| (2318) all_1396_2_3454 = all_1390_2_3444
% 51.84/18.40  																																|
% 51.84/18.40  																																| Simplifying 2318 yields:
% 51.84/18.40  																																| (2319) all_1396_2_3454 = all_1390_2_3444
% 51.84/18.40  																																|
% 51.84/18.40  																																| Combining equations (2302,2319) yields a new equation:
% 51.84/18.40  																																| (2320) all_1390_2_3444 = 0
% 51.84/18.40  																																|
% 51.84/18.40  																																| Combining equations (2320,2304) yields a new equation:
% 51.84/18.40  																																| (2321) all_1502_0_3702 = 0
% 51.84/18.40  																																|
% 51.84/18.40  																																+-Applying beta-rule and splitting (2272), into two cases.
% 51.84/18.40  																																|-Branch one:
% 51.84/18.40  																																| (2322)  ~ (all_1502_0_3702 = 0)
% 51.84/18.40  																																|
% 51.84/18.40  																																	| Equations (2321) can reduce 2322 to:
% 51.84/18.40  																																	| (551) $false
% 51.84/18.40  																																	|
% 51.84/18.40  																																	|-The branch is then unsatisfiable
% 51.84/18.40  																																|-Branch two:
% 51.84/18.40  																																| (2321) all_1502_0_3702 = 0
% 51.84/18.40  																																| (2325)  ~ (all_1502_1_3703 = 0)
% 51.84/18.40  																																|
% 51.84/18.40  																																	| Equations (2313) can reduce 2325 to:
% 51.84/18.40  																																	| (551) $false
% 51.84/18.40  																																	|
% 51.84/18.40  																																	|-The branch is then unsatisfiable
% 51.84/18.40  																											|-Branch two:
% 51.84/18.40  																											| (2327) all_806_1_2774 = 0
% 51.84/18.40  																											| (2328)  ~ (all_806_2_2775 = 0) | all_806_0_2773 = 0
% 51.84/18.40  																											|
% 51.84/18.40  																												+-Applying beta-rule and splitting (2328), into two cases.
% 51.84/18.40  																												|-Branch one:
% 51.84/18.40  																												| (2329)  ~ (all_806_2_2775 = 0)
% 51.84/18.40  																												|
% 51.84/18.40  																													| Equations (2139) can reduce 2329 to:
% 51.84/18.40  																													| (551) $false
% 51.84/18.40  																													|
% 51.84/18.40  																													|-The branch is then unsatisfiable
% 51.84/18.40  																												|-Branch two:
% 51.84/18.40  																												| (2139) all_806_2_2775 = 0
% 51.84/18.40  																												| (2332) all_806_0_2773 = 0
% 51.84/18.40  																												|
% 51.84/18.40  																													| Combining equations (2159,2332) yields a new equation:
% 51.84/18.40  																													| (2333) all_796_2_2760 = 0
% 51.84/18.40  																													|
% 51.84/18.40  																													| Simplifying 2333 yields:
% 51.84/18.40  																													| (2334) all_796_2_2760 = 0
% 51.84/18.40  																													|
% 51.84/18.40  																													| Equations (2334) can reduce 2233 to:
% 51.84/18.40  																													| (551) $false
% 51.84/18.40  																													|
% 51.84/18.40  																													|-The branch is then unsatisfiable
% 51.84/18.40  																										|-Branch two:
% 51.84/18.40  																										| (2336) all_846_3_2852 = 0
% 51.84/18.40  																										| (2337) all_846_0_2849 = 0
% 51.84/18.40  																										|
% 51.84/18.40  																											| Combining equations (2337,2144) yields a new equation:
% 51.84/18.40  																											| (1948) all_375_4_794 = 0
% 51.84/18.40  																											|
% 51.84/18.41  																											| Equations (1948) can reduce 1477 to:
% 51.84/18.41  																											| (551) $false
% 51.84/18.41  																											|
% 51.84/18.41  																											|-The branch is then unsatisfiable
% 51.84/18.41  																							|-Branch two:
% 51.84/18.41  																							| (1948) all_375_4_794 = 0
% 51.84/18.41  																							| (1951) all_375_0_790 = 0
% 51.84/18.41  																							|
% 51.84/18.41  																								| Equations (1951) can reduce 1471 to:
% 51.84/18.41  																								| (551) $false
% 51.84/18.41  																								|
% 51.84/18.41  																								|-The branch is then unsatisfiable
% 51.84/18.41  																					|-Branch two:
% 51.84/18.41  																					| (2343) all_814_0_2786 = 0
% 51.84/18.41  																					| (2344)  ~ (all_814_2_2788 = 0)
% 51.84/18.41  																					|
% 51.84/18.41  																						| Equations (2212) can reduce 2344 to:
% 51.84/18.41  																						| (551) $false
% 51.84/18.41  																						|
% 51.84/18.41  																						|-The branch is then unsatisfiable
% 51.84/18.41  															|-Branch two:
% 51.84/18.41  															| (2346)  ~ (all_19_4_93 = 0)
% 51.84/18.41  															| (2347)  ? [v0] :  ? [v1] :  ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_19_8_97) = v0 & key(all_19_7_96, a) = v1 & ( ~ (v2 = 0) |  ~ (v0 = 0)))
% 51.84/18.41  															|
% 51.84/18.41  																| Instantiating (2347) with all_493_0_3715, all_493_1_3716, all_493_2_3717 yields:
% 51.84/18.41  																| (2348) intruder_holds(all_493_1_3716) = all_493_0_3715 & intruder_message(all_19_8_97) = all_493_2_3717 & key(all_19_7_96, a) = all_493_1_3716 & ( ~ (all_493_0_3715 = 0) |  ~ (all_493_2_3717 = 0))
% 51.84/18.41  																|
% 51.84/18.41  																| Applying alpha-rule on (2348) yields:
% 51.84/18.41  																| (2349) intruder_holds(all_493_1_3716) = all_493_0_3715
% 51.84/18.41  																| (2350) intruder_message(all_19_8_97) = all_493_2_3717
% 51.84/18.41  																| (2351) key(all_19_7_96, a) = all_493_1_3716
% 51.84/18.41  																| (2352)  ~ (all_493_0_3715 = 0) |  ~ (all_493_2_3717 = 0)
% 51.84/18.41  																|
% 51.84/18.41  																+-Applying beta-rule and splitting (166), into two cases.
% 51.84/18.41  																|-Branch one:
% 51.84/18.41  																| (1202) all_19_4_93 = 0
% 51.84/18.41  																|
% 51.84/18.41  																	| Equations (1202) can reduce 2346 to:
% 51.84/18.41  																	| (551) $false
% 51.84/18.41  																	|
% 51.84/18.41  																	|-The branch is then unsatisfiable
% 51.84/18.41  																|-Branch two:
% 51.84/18.41  																| (2346)  ~ (all_19_4_93 = 0)
% 51.84/18.41  																| (2356)  ? [v0] :  ? [v1] :  ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_19_8_97) = v0 & key(all_19_7_96, t) = v1 & ( ~ (v2 = 0) |  ~ (v0 = 0)))
% 51.84/18.41  																|
% 51.84/18.41  																	| Instantiating (2356) with all_499_0_3718, all_499_1_3719, all_499_2_3720 yields:
% 51.84/18.41  																	| (2357) intruder_holds(all_499_1_3719) = all_499_0_3718 & intruder_message(all_19_8_97) = all_499_2_3720 & key(all_19_7_96, t) = all_499_1_3719 & ( ~ (all_499_0_3718 = 0) |  ~ (all_499_2_3720 = 0))
% 51.84/18.41  																	|
% 51.84/18.41  																	| Applying alpha-rule on (2357) yields:
% 51.84/18.41  																	| (2358) intruder_holds(all_499_1_3719) = all_499_0_3718
% 51.84/18.41  																	| (2359) intruder_message(all_19_8_97) = all_499_2_3720
% 51.84/18.41  																	| (2360) key(all_19_7_96, t) = all_499_1_3719
% 51.84/18.41  																	| (2361)  ~ (all_499_0_3718 = 0) |  ~ (all_499_2_3720 = 0)
% 51.84/18.41  																	|
% 51.84/18.41  																	+-Applying beta-rule and splitting (164), into two cases.
% 51.84/18.41  																	|-Branch one:
% 51.84/18.41  																	| (1202) all_19_4_93 = 0
% 51.84/18.41  																	|
% 51.84/18.41  																		| Equations (1202) can reduce 2346 to:
% 51.84/18.41  																		| (551) $false
% 51.84/18.41  																		|
% 51.84/18.41  																		|-The branch is then unsatisfiable
% 51.84/18.41  																	|-Branch two:
% 51.84/18.41  																	| (2346)  ~ (all_19_4_93 = 0)
% 51.84/18.41  																	| (2365)  ? [v0] :  ? [v1] :  ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_19_8_97) = v0 & key(all_19_7_96, b) = v1 & ( ~ (v2 = 0) |  ~ (v0 = 0)))
% 51.84/18.41  																	|
% 51.84/18.41  																		| Instantiating (2365) with all_504_0_3721, all_504_1_3722, all_504_2_3723 yields:
% 51.84/18.41  																		| (2366) intruder_holds(all_504_1_3722) = all_504_0_3721 & intruder_message(all_19_8_97) = all_504_2_3723 & key(all_19_7_96, b) = all_504_1_3722 & ( ~ (all_504_0_3721 = 0) |  ~ (all_504_2_3723 = 0))
% 51.84/18.41  																		|
% 51.84/18.41  																		| Applying alpha-rule on (2366) yields:
% 51.84/18.41  																		| (2367) intruder_holds(all_504_1_3722) = all_504_0_3721
% 51.84/18.41  																		| (2368) intruder_message(all_19_8_97) = all_504_2_3723
% 51.84/18.41  																		| (2369) key(all_19_7_96, b) = all_504_1_3722
% 51.84/18.41  																		| (2370)  ~ (all_504_0_3721 = 0) |  ~ (all_504_2_3723 = 0)
% 51.84/18.41  																		|
% 51.84/18.41  																		| Instantiating formula (70) with all_285_6_622, all_285_7_623, all_63_4_187 and discharging atoms pair(all_63_4_187, all_285_7_623) = all_285_6_622, yields:
% 51.84/18.41  																		| (1210)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] :  ? [v4] :  ? [v5] :  ? [v6] :  ? [v7] :  ? [v8] :  ? [v9] :  ? [v10] : (fresh_to_b(all_285_7_623) = v2 & generate_b_nonce(all_285_7_623) = v3 & generate_expiration_time(all_285_7_623) = v4 & b_stored(all_285_6_622) = v10 & triple(all_63_4_187, all_285_7_623, v4) = v5 & triple(b, v3, v6) = v7 & encrypt(v5, bt) = v6 & sent(all_63_4_187, b, all_285_6_622) = v0 & sent(b, t, v7) = v8 & message(v8) = v9 & message(v0) = v1 & ( ~ (v2 = 0) |  ~ (v1 = 0) | (v10 = 0 & v9 = 0)))
% 51.84/18.41  																		|
% 51.84/18.41  																		| Instantiating formula (12) with all_285_6_622, all_285_7_623, all_63_4_187 and discharging atoms pair(all_63_4_187, all_285_7_623) = all_285_6_622, yields:
% 51.84/18.41  																		| (1211)  ? [v0] :  ? [v1] :  ? [v2] : (intruder_message(all_285_6_622) = v2 & intruder_message(all_285_7_623) = v1 & intruder_message(all_63_4_187) = v0 & ( ~ (v1 = 0) |  ~ (v0 = 0) | v2 = 0))
% 51.84/18.41  																		|
% 51.84/18.41  																		| Instantiating formula (56) with all_285_6_622, all_285_7_623, all_63_4_187 and discharging atoms pair(all_63_4_187, all_285_7_623) = all_285_6_622, yields:
% 51.84/18.41  																		| (1212)  ? [v0] :  ? [v1] :  ? [v2] : (intruder_message(all_285_6_622) = v0 & intruder_message(all_285_7_623) = v2 & intruder_message(all_63_4_187) = v1 & ( ~ (v0 = 0) | (v2 = 0 & v1 = 0)))
% 51.84/18.41  																		|
% 51.84/18.41  																		| Instantiating formula (70) with all_375_6_796, all_285_7_623, all_61_4_176 and discharging atoms pair(all_61_4_176, all_285_7_623) = all_375_6_796, yields:
% 51.84/18.41  																		| (1213)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] :  ? [v4] :  ? [v5] :  ? [v6] :  ? [v7] :  ? [v8] :  ? [v9] :  ? [v10] : (fresh_to_b(all_285_7_623) = v2 & generate_b_nonce(all_285_7_623) = v3 & generate_expiration_time(all_285_7_623) = v4 & b_stored(all_375_6_796) = v10 & triple(all_61_4_176, all_285_7_623, v4) = v5 & triple(b, v3, v6) = v7 & encrypt(v5, bt) = v6 & sent(all_61_4_176, b, all_375_6_796) = v0 & sent(b, t, v7) = v8 & message(v8) = v9 & message(v0) = v1 & ( ~ (v2 = 0) |  ~ (v1 = 0) | (v10 = 0 & v9 = 0)))
% 51.84/18.41  																		|
% 51.84/18.41  																		| Instantiating formula (12) with all_375_6_796, all_285_7_623, all_61_4_176 and discharging atoms pair(all_61_4_176, all_285_7_623) = all_375_6_796, yields:
% 51.84/18.41  																		| (1214)  ? [v0] :  ? [v1] :  ? [v2] : (intruder_message(all_375_6_796) = v2 & intruder_message(all_285_7_623) = v1 & intruder_message(all_61_4_176) = v0 & ( ~ (v1 = 0) |  ~ (v0 = 0) | v2 = 0))
% 51.84/18.41  																		|
% 51.84/18.41  																		| Instantiating formula (56) with all_375_6_796, all_285_7_623, all_61_4_176 and discharging atoms pair(all_61_4_176, all_285_7_623) = all_375_6_796, yields:
% 51.84/18.41  																		| (1215)  ? [v0] :  ? [v1] :  ? [v2] : (intruder_message(all_375_6_796) = v0 & intruder_message(all_285_7_623) = v2 & intruder_message(all_61_4_176) = v1 & ( ~ (v0 = 0) | (v2 = 0 & v1 = 0)))
% 51.84/18.41  																		|
% 51.84/18.41  																		| Instantiating formula (73) with all_281_5_601, b, all_15_14_75, all_281_6_602 and discharging atoms sent(all_15_14_75, b, all_281_6_602) = all_281_5_601, yields:
% 51.84/18.41  																		| (1216)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (party_of_protocol(all_15_14_75) = v1 & party_of_protocol(b) = v2 & intruder_message(all_281_6_602) = v0 & message(all_281_5_601) = v3 & ( ~ (v2 = 0) |  ~ (v1 = 0) |  ~ (v0 = 0) | v3 = 0))
% 51.84/18.41  																		|
% 51.84/18.41  																		| Instantiating formula (73) with all_269_5_559, b, all_15_15_76, all_269_6_560 and discharging atoms sent(all_15_15_76, b, all_269_6_560) = all_269_5_559, yields:
% 51.84/18.41  																		| (1217)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (party_of_protocol(all_15_15_76) = v1 & party_of_protocol(b) = v2 & intruder_message(all_269_6_560) = v0 & message(all_269_5_559) = v3 & ( ~ (v2 = 0) |  ~ (v1 = 0) |  ~ (v0 = 0) | v3 = 0))
% 51.84/18.41  																		|
% 51.84/18.41  																		| Instantiating formula (73) with all_277_5_581, b, all_13_9_55, all_277_6_582 and discharging atoms sent(all_13_9_55, b, all_277_6_582) = all_277_5_581, yields:
% 51.84/18.41  																		| (1218)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (party_of_protocol(all_13_9_55) = v1 & party_of_protocol(b) = v2 & intruder_message(all_277_6_582) = v0 & message(all_277_5_581) = v3 & ( ~ (v2 = 0) |  ~ (v1 = 0) |  ~ (v0 = 0) | v3 = 0))
% 51.84/18.41  																		|
% 51.84/18.41  																		| Instantiating formula (73) with all_369_10_781, b, all_11_4_36, all_131_6_319 and discharging atoms sent(all_11_4_36, b, all_131_6_319) = all_369_10_781, yields:
% 51.84/18.41  																		| (1219)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (party_of_protocol(all_11_4_36) = v1 & party_of_protocol(b) = v2 & intruder_message(all_131_6_319) = v0 & message(all_369_10_781) = v3 & ( ~ (v2 = 0) |  ~ (v1 = 0) |  ~ (v0 = 0) | v3 = 0))
% 51.84/18.41  																		|
% 51.84/18.41  																		| Instantiating formula (73) with all_285_5_621, b, b, all_285_6_622 and discharging atoms sent(b, b, all_285_6_622) = all_285_5_621, yields:
% 51.84/18.41  																		| (1220)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (party_of_protocol(b) = v2 & party_of_protocol(b) = v1 & intruder_message(all_285_6_622) = v0 & message(all_285_5_621) = v3 & ( ~ (v2 = 0) |  ~ (v1 = 0) |  ~ (v0 = 0) | v3 = 0))
% 51.84/18.41  																		|
% 51.84/18.41  																		| Instantiating formula (73) with all_369_2_773, t, b, all_369_3_774 and discharging atoms sent(b, t, all_369_3_774) = all_369_2_773, yields:
% 51.84/18.41  																		| (1221)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (party_of_protocol(b) = v1 & party_of_protocol(t) = v2 & intruder_message(all_369_3_774) = v0 & message(all_369_2_773) = v3 & ( ~ (v2 = 0) |  ~ (v1 = 0) |  ~ (v0 = 0) | v3 = 0))
% 51.84/18.41  																		|
% 51.84/18.41  																		| Instantiating formula (73) with all_375_5_795, b, a, all_375_6_796 and discharging atoms sent(a, b, all_375_6_796) = all_375_5_795, yields:
% 51.84/18.41  																		| (1222)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (party_of_protocol(b) = v2 & party_of_protocol(a) = v1 & intruder_message(all_375_6_796) = v0 & message(all_375_5_795) = v3 & ( ~ (v2 = 0) |  ~ (v1 = 0) |  ~ (v0 = 0) | v3 = 0))
% 51.84/18.41  																		|
% 51.84/18.41  																		| Instantiating formula (4) with all_375_5_795, all_375_6_796, b, a and discharging atoms sent(a, b, all_375_6_796) = all_375_5_795, yields:
% 51.84/18.41  																		| (1223)  ? [v0] :  ? [v1] : (intruder_message(all_375_6_796) = v1 & message(all_375_5_795) = v0 & ( ~ (v0 = 0) | v1 = 0))
% 51.84/18.41  																		|
% 51.84/18.41  																		| Instantiating formula (57) with all_504_1_3722, b, all_19_7_96 and discharging atoms key(all_19_7_96, b) = all_504_1_3722, yields:
% 51.84/18.41  																		| (2385)  ? [v0] :  ? [v1] :  ? [v2] : (intruder_holds(all_504_1_3722) = v2 & party_of_protocol(b) = v1 & intruder_message(all_19_7_96) = v0 & ( ~ (v1 = 0) |  ~ (v0 = 0) | v2 = 0))
% 51.84/18.41  																		|
% 51.84/18.41  																		| Instantiating formula (57) with all_493_1_3716, a, all_19_7_96 and discharging atoms key(all_19_7_96, a) = all_493_1_3716, yields:
% 51.84/18.41  																		| (2386)  ? [v0] :  ? [v1] :  ? [v2] : (intruder_holds(all_493_1_3716) = v2 & party_of_protocol(a) = v1 & intruder_message(all_19_7_96) = v0 & ( ~ (v1 = 0) |  ~ (v0 = 0) | v2 = 0))
% 51.84/18.41  																		|
% 51.84/18.41  																		| Instantiating formula (57) with all_499_1_3719, t, all_19_7_96 and discharging atoms key(all_19_7_96, t) = all_499_1_3719, yields:
% 51.84/18.41  																		| (2387)  ? [v0] :  ? [v1] :  ? [v2] : (intruder_holds(all_499_1_3719) = v2 & party_of_protocol(t) = v1 & intruder_message(all_19_7_96) = v0 & ( ~ (v1 = 0) |  ~ (v0 = 0) | v2 = 0))
% 51.84/18.41  																		|
% 51.84/18.41  																		| Instantiating formula (39) with all_285_1_617, an_a_nonce and discharging atoms key(an_a_nonce, b) = all_285_1_617, yields:
% 51.84/18.41  																		| (1225)  ? [v0] :  ? [v1] :  ? [v2] : (intruder_holds(all_285_1_617) = v0 & b_holds(v1) = v2 & key(an_a_nonce, a) = v1 & ( ~ (v2 = 0) |  ~ (v0 = 0)))
% 51.84/18.42  																		|
% 51.84/18.42  																		| Instantiating formula (57) with all_285_1_617, b, an_a_nonce and discharging atoms key(an_a_nonce, b) = all_285_1_617, yields:
% 51.84/18.42  																		| (1226)  ? [v0] :  ? [v1] :  ? [v2] : (intruder_holds(all_285_1_617) = v2 & party_of_protocol(b) = v1 & intruder_message(an_a_nonce) = v0 & ( ~ (v1 = 0) |  ~ (v0 = 0) | v2 = 0))
% 51.84/18.42  																		|
% 51.84/18.42  																		| Instantiating formula (62) with all_375_1_791, an_a_nonce and discharging atoms key(an_a_nonce, a) = all_375_1_791, yields:
% 51.84/18.42  																		| (1227)  ? [v0] :  ? [v1] :  ? [v2] : (intruder_holds(v0) = v1 & b_holds(all_375_1_791) = v2 & key(an_a_nonce, b) = v0 & ( ~ (v2 = 0) |  ~ (v1 = 0)))
% 51.84/18.42  																		|
% 51.84/18.42  																		| Instantiating formula (57) with all_375_1_791, a, an_a_nonce and discharging atoms key(an_a_nonce, a) = all_375_1_791, yields:
% 51.84/18.42  																		| (1228)  ? [v0] :  ? [v1] :  ? [v2] : (intruder_holds(all_375_1_791) = v2 & party_of_protocol(a) = v1 & intruder_message(an_a_nonce) = v0 & ( ~ (v1 = 0) |  ~ (v0 = 0) | v2 = 0))
% 51.84/18.42  																		|
% 51.84/18.42  																		| Instantiating (1228) with all_764_0_3739, all_764_1_3740, all_764_2_3741 yields:
% 51.84/18.42  																		| (2392) intruder_holds(all_375_1_791) = all_764_0_3739 & party_of_protocol(a) = all_764_1_3740 & intruder_message(an_a_nonce) = all_764_2_3741 & ( ~ (all_764_1_3740 = 0) |  ~ (all_764_2_3741 = 0) | all_764_0_3739 = 0)
% 51.84/18.42  																		|
% 51.84/18.42  																		| Applying alpha-rule on (2392) yields:
% 51.84/18.42  																		| (2393) intruder_holds(all_375_1_791) = all_764_0_3739
% 51.84/18.42  																		| (2394) party_of_protocol(a) = all_764_1_3740
% 51.84/18.42  																		| (2395) intruder_message(an_a_nonce) = all_764_2_3741
% 51.84/18.42  																		| (2396)  ~ (all_764_1_3740 = 0) |  ~ (all_764_2_3741 = 0) | all_764_0_3739 = 0
% 51.84/18.42  																		|
% 51.84/18.42  																		| Instantiating (1227) with all_766_0_3742, all_766_1_3743, all_766_2_3744 yields:
% 51.84/18.42  																		| (2397) intruder_holds(all_766_2_3744) = all_766_1_3743 & b_holds(all_375_1_791) = all_766_0_3742 & key(an_a_nonce, b) = all_766_2_3744 & ( ~ (all_766_0_3742 = 0) |  ~ (all_766_1_3743 = 0))
% 51.84/18.42  																		|
% 51.84/18.42  																		| Applying alpha-rule on (2397) yields:
% 51.84/18.42  																		| (2398) intruder_holds(all_766_2_3744) = all_766_1_3743
% 51.84/18.42  																		| (2399) b_holds(all_375_1_791) = all_766_0_3742
% 51.84/18.42  																		| (2400) key(an_a_nonce, b) = all_766_2_3744
% 51.84/18.42  																		| (2401)  ~ (all_766_0_3742 = 0) |  ~ (all_766_1_3743 = 0)
% 51.84/18.42  																		|
% 51.84/18.42  																		| Instantiating (1219) with all_772_0_3749, all_772_1_3750, all_772_2_3751, all_772_3_3752 yields:
% 51.84/18.42  																		| (2402) party_of_protocol(all_11_4_36) = all_772_2_3751 & party_of_protocol(b) = all_772_1_3750 & intruder_message(all_131_6_319) = all_772_3_3752 & message(all_369_10_781) = all_772_0_3749 & ( ~ (all_772_1_3750 = 0) |  ~ (all_772_2_3751 = 0) |  ~ (all_772_3_3752 = 0) | all_772_0_3749 = 0)
% 51.84/18.42  																		|
% 51.84/18.42  																		| Applying alpha-rule on (2402) yields:
% 51.84/18.42  																		| (2403) message(all_369_10_781) = all_772_0_3749
% 51.84/18.42  																		| (2404) party_of_protocol(b) = all_772_1_3750
% 51.84/18.42  																		| (2405) intruder_message(all_131_6_319) = all_772_3_3752
% 51.84/18.42  																		| (2406)  ~ (all_772_1_3750 = 0) |  ~ (all_772_2_3751 = 0) |  ~ (all_772_3_3752 = 0) | all_772_0_3749 = 0
% 51.84/18.42  																		| (2407) party_of_protocol(all_11_4_36) = all_772_2_3751
% 51.84/18.42  																		|
% 51.84/18.42  																		| Instantiating (2387) with all_780_0_3762, all_780_1_3763, all_780_2_3764 yields:
% 51.84/18.42  																		| (2408) intruder_holds(all_499_1_3719) = all_780_0_3762 & party_of_protocol(t) = all_780_1_3763 & intruder_message(all_19_7_96) = all_780_2_3764 & ( ~ (all_780_1_3763 = 0) |  ~ (all_780_2_3764 = 0) | all_780_0_3762 = 0)
% 51.84/18.42  																		|
% 51.84/18.42  																		| Applying alpha-rule on (2408) yields:
% 51.84/18.42  																		| (2409) intruder_holds(all_499_1_3719) = all_780_0_3762
% 51.84/18.42  																		| (2410) party_of_protocol(t) = all_780_1_3763
% 51.84/18.42  																		| (2411) intruder_message(all_19_7_96) = all_780_2_3764
% 51.84/18.42  																		| (2412)  ~ (all_780_1_3763 = 0) |  ~ (all_780_2_3764 = 0) | all_780_0_3762 = 0
% 51.84/18.42  																		|
% 51.84/18.42  																		| Instantiating (1216) with all_784_0_3767, all_784_1_3768, all_784_2_3769, all_784_3_3770 yields:
% 51.84/18.42  																		| (2413) party_of_protocol(all_15_14_75) = all_784_2_3769 & party_of_protocol(b) = all_784_1_3768 & intruder_message(all_281_6_602) = all_784_3_3770 & message(all_281_5_601) = all_784_0_3767 & ( ~ (all_784_1_3768 = 0) |  ~ (all_784_2_3769 = 0) |  ~ (all_784_3_3770 = 0) | all_784_0_3767 = 0)
% 51.84/18.42  																		|
% 51.84/18.42  																		| Applying alpha-rule on (2413) yields:
% 51.84/18.42  																		| (2414) party_of_protocol(b) = all_784_1_3768
% 51.84/18.42  																		| (2415) intruder_message(all_281_6_602) = all_784_3_3770
% 51.84/18.42  																		| (2416) party_of_protocol(all_15_14_75) = all_784_2_3769
% 51.84/18.42  																		| (2417)  ~ (all_784_1_3768 = 0) |  ~ (all_784_2_3769 = 0) |  ~ (all_784_3_3770 = 0) | all_784_0_3767 = 0
% 51.84/18.42  																		| (2418) message(all_281_5_601) = all_784_0_3767
% 51.84/18.42  																		|
% 51.84/18.42  																		| Instantiating (1213) with all_786_0_3771, all_786_1_3772, all_786_2_3773, all_786_3_3774, all_786_4_3775, all_786_5_3776, all_786_6_3777, all_786_7_3778, all_786_8_3779, all_786_9_3780, all_786_10_3781 yields:
% 51.84/18.42  																		| (2419) fresh_to_b(all_285_7_623) = all_786_8_3779 & generate_b_nonce(all_285_7_623) = all_786_7_3778 & generate_expiration_time(all_285_7_623) = all_786_6_3777 & b_stored(all_375_6_796) = all_786_0_3771 & triple(all_61_4_176, all_285_7_623, all_786_6_3777) = all_786_5_3776 & triple(b, all_786_7_3778, all_786_4_3775) = all_786_3_3774 & encrypt(all_786_5_3776, bt) = all_786_4_3775 & sent(all_61_4_176, b, all_375_6_796) = all_786_10_3781 & sent(b, t, all_786_3_3774) = all_786_2_3773 & message(all_786_2_3773) = all_786_1_3772 & message(all_786_10_3781) = all_786_9_3780 & ( ~ (all_786_8_3779 = 0) |  ~ (all_786_9_3780 = 0) | (all_786_0_3771 = 0 & all_786_1_3772 = 0))
% 51.84/18.42  																		|
% 51.84/18.42  																		| Applying alpha-rule on (2419) yields:
% 51.84/18.42  																		| (2420) message(all_786_2_3773) = all_786_1_3772
% 51.84/18.42  																		| (2421) b_stored(all_375_6_796) = all_786_0_3771
% 51.84/18.42  																		| (2422) generate_b_nonce(all_285_7_623) = all_786_7_3778
% 51.84/18.42  																		| (2423) encrypt(all_786_5_3776, bt) = all_786_4_3775
% 51.84/18.42  																		| (2424) generate_expiration_time(all_285_7_623) = all_786_6_3777
% 51.84/18.42  																		| (2425) fresh_to_b(all_285_7_623) = all_786_8_3779
% 51.84/18.42  																		| (2426)  ~ (all_786_8_3779 = 0) |  ~ (all_786_9_3780 = 0) | (all_786_0_3771 = 0 & all_786_1_3772 = 0)
% 51.84/18.42  																		| (2427) triple(b, all_786_7_3778, all_786_4_3775) = all_786_3_3774
% 51.84/18.42  																		| (2428) message(all_786_10_3781) = all_786_9_3780
% 51.84/18.42  																		| (2429) sent(b, t, all_786_3_3774) = all_786_2_3773
% 51.84/18.42  																		| (2430) triple(all_61_4_176, all_285_7_623, all_786_6_3777) = all_786_5_3776
% 51.84/18.42  																		| (2431) sent(all_61_4_176, b, all_375_6_796) = all_786_10_3781
% 51.84/18.42  																		|
% 51.84/18.42  																		| Instantiating (1212) with all_788_0_3782, all_788_1_3783, all_788_2_3784 yields:
% 51.84/18.42  																		| (2432) intruder_message(all_285_6_622) = all_788_2_3784 & intruder_message(all_285_7_623) = all_788_0_3782 & intruder_message(all_63_4_187) = all_788_1_3783 & ( ~ (all_788_2_3784 = 0) | (all_788_0_3782 = 0 & all_788_1_3783 = 0))
% 51.84/18.42  																		|
% 51.84/18.42  																		| Applying alpha-rule on (2432) yields:
% 51.84/18.42  																		| (2433) intruder_message(all_285_6_622) = all_788_2_3784
% 51.84/18.42  																		| (2434) intruder_message(all_285_7_623) = all_788_0_3782
% 51.84/18.42  																		| (2435) intruder_message(all_63_4_187) = all_788_1_3783
% 51.84/18.42  																		| (2436)  ~ (all_788_2_3784 = 0) | (all_788_0_3782 = 0 & all_788_1_3783 = 0)
% 51.84/18.42  																		|
% 51.84/18.42  																		| Instantiating (1215) with all_790_0_3785, all_790_1_3786, all_790_2_3787 yields:
% 51.84/18.42  																		| (2437) intruder_message(all_375_6_796) = all_790_2_3787 & intruder_message(all_285_7_623) = all_790_0_3785 & intruder_message(all_61_4_176) = all_790_1_3786 & ( ~ (all_790_2_3787 = 0) | (all_790_0_3785 = 0 & all_790_1_3786 = 0))
% 51.84/18.42  																		|
% 51.84/18.42  																		| Applying alpha-rule on (2437) yields:
% 51.84/18.42  																		| (2438) intruder_message(all_375_6_796) = all_790_2_3787
% 51.84/18.42  																		| (2439) intruder_message(all_285_7_623) = all_790_0_3785
% 51.84/18.42  																		| (2440) intruder_message(all_61_4_176) = all_790_1_3786
% 51.84/18.42  																		| (2441)  ~ (all_790_2_3787 = 0) | (all_790_0_3785 = 0 & all_790_1_3786 = 0)
% 51.84/18.42  																		|
% 51.84/18.42  																		| Instantiating (1220) with all_792_0_3788, all_792_1_3789, all_792_2_3790, all_792_3_3791 yields:
% 51.84/18.42  																		| (2442) party_of_protocol(b) = all_792_1_3789 & party_of_protocol(b) = all_792_2_3790 & intruder_message(all_285_6_622) = all_792_3_3791 & message(all_285_5_621) = all_792_0_3788 & ( ~ (all_792_1_3789 = 0) |  ~ (all_792_2_3790 = 0) |  ~ (all_792_3_3791 = 0) | all_792_0_3788 = 0)
% 51.84/18.42  																		|
% 51.84/18.42  																		| Applying alpha-rule on (2442) yields:
% 51.84/18.42  																		| (2443) message(all_285_5_621) = all_792_0_3788
% 51.84/18.42  																		| (2444)  ~ (all_792_1_3789 = 0) |  ~ (all_792_2_3790 = 0) |  ~ (all_792_3_3791 = 0) | all_792_0_3788 = 0
% 51.84/18.42  																		| (2445) party_of_protocol(b) = all_792_1_3789
% 51.84/18.42  																		| (2446) intruder_message(all_285_6_622) = all_792_3_3791
% 51.84/18.42  																		| (2447) party_of_protocol(b) = all_792_2_3790
% 51.84/18.42  																		|
% 51.84/18.42  																		| Instantiating (1218) with all_796_0_3794, all_796_1_3795, all_796_2_3796, all_796_3_3797 yields:
% 51.84/18.42  																		| (2448) party_of_protocol(all_13_9_55) = all_796_2_3796 & party_of_protocol(b) = all_796_1_3795 & intruder_message(all_277_6_582) = all_796_3_3797 & message(all_277_5_581) = all_796_0_3794 & ( ~ (all_796_1_3795 = 0) |  ~ (all_796_2_3796 = 0) |  ~ (all_796_3_3797 = 0) | all_796_0_3794 = 0)
% 51.84/18.42  																		|
% 51.84/18.42  																		| Applying alpha-rule on (2448) yields:
% 51.84/18.42  																		| (2449)  ~ (all_796_1_3795 = 0) |  ~ (all_796_2_3796 = 0) |  ~ (all_796_3_3797 = 0) | all_796_0_3794 = 0
% 51.84/18.42  																		| (2450) party_of_protocol(all_13_9_55) = all_796_2_3796
% 51.84/18.42  																		| (2451) intruder_message(all_277_6_582) = all_796_3_3797
% 51.84/18.42  																		| (2452) party_of_protocol(b) = all_796_1_3795
% 51.84/18.42  																		| (2453) message(all_277_5_581) = all_796_0_3794
% 51.84/18.42  																		|
% 51.84/18.42  																		| Instantiating (1214) with all_800_0_3800, all_800_1_3801, all_800_2_3802 yields:
% 51.84/18.42  																		| (2454) intruder_message(all_375_6_796) = all_800_0_3800 & intruder_message(all_285_7_623) = all_800_1_3801 & intruder_message(all_61_4_176) = all_800_2_3802 & ( ~ (all_800_1_3801 = 0) |  ~ (all_800_2_3802 = 0) | all_800_0_3800 = 0)
% 51.84/18.43  																		|
% 51.84/18.43  																		| Applying alpha-rule on (2454) yields:
% 51.84/18.43  																		| (2455) intruder_message(all_375_6_796) = all_800_0_3800
% 51.84/18.43  																		| (2456) intruder_message(all_285_7_623) = all_800_1_3801
% 51.84/18.43  																		| (2457) intruder_message(all_61_4_176) = all_800_2_3802
% 51.84/18.43  																		| (2458)  ~ (all_800_1_3801 = 0) |  ~ (all_800_2_3802 = 0) | all_800_0_3800 = 0
% 51.84/18.43  																		|
% 51.84/18.43  																		| Instantiating (1211) with all_802_0_3803, all_802_1_3804, all_802_2_3805 yields:
% 51.84/18.43  																		| (2459) intruder_message(all_285_6_622) = all_802_0_3803 & intruder_message(all_285_7_623) = all_802_1_3804 & intruder_message(all_63_4_187) = all_802_2_3805 & ( ~ (all_802_1_3804 = 0) |  ~ (all_802_2_3805 = 0) | all_802_0_3803 = 0)
% 51.84/18.43  																		|
% 51.84/18.43  																		| Applying alpha-rule on (2459) yields:
% 51.84/18.43  																		| (2460) intruder_message(all_285_6_622) = all_802_0_3803
% 51.84/18.43  																		| (2461) intruder_message(all_285_7_623) = all_802_1_3804
% 51.84/18.43  																		| (2462) intruder_message(all_63_4_187) = all_802_2_3805
% 51.84/18.43  																		| (2463)  ~ (all_802_1_3804 = 0) |  ~ (all_802_2_3805 = 0) | all_802_0_3803 = 0
% 51.84/18.43  																		|
% 51.84/18.43  																		| Instantiating (1217) with all_804_0_3806, all_804_1_3807, all_804_2_3808, all_804_3_3809 yields:
% 51.84/18.43  																		| (2464) party_of_protocol(all_15_15_76) = all_804_2_3808 & party_of_protocol(b) = all_804_1_3807 & intruder_message(all_269_6_560) = all_804_3_3809 & message(all_269_5_559) = all_804_0_3806 & ( ~ (all_804_1_3807 = 0) |  ~ (all_804_2_3808 = 0) |  ~ (all_804_3_3809 = 0) | all_804_0_3806 = 0)
% 51.84/18.43  																		|
% 51.84/18.43  																		| Applying alpha-rule on (2464) yields:
% 51.84/18.43  																		| (2465) party_of_protocol(b) = all_804_1_3807
% 51.84/18.43  																		| (2466) message(all_269_5_559) = all_804_0_3806
% 51.84/18.43  																		| (2467)  ~ (all_804_1_3807 = 0) |  ~ (all_804_2_3808 = 0) |  ~ (all_804_3_3809 = 0) | all_804_0_3806 = 0
% 51.84/18.43  																		| (2468) party_of_protocol(all_15_15_76) = all_804_2_3808
% 51.84/18.43  																		| (2469) intruder_message(all_269_6_560) = all_804_3_3809
% 51.84/18.43  																		|
% 51.84/18.43  																		| Instantiating (1226) with all_806_0_3810, all_806_1_3811, all_806_2_3812 yields:
% 51.84/18.43  																		| (2470) intruder_holds(all_285_1_617) = all_806_0_3810 & party_of_protocol(b) = all_806_1_3811 & intruder_message(an_a_nonce) = all_806_2_3812 & ( ~ (all_806_1_3811 = 0) |  ~ (all_806_2_3812 = 0) | all_806_0_3810 = 0)
% 51.84/18.43  																		|
% 51.84/18.43  																		| Applying alpha-rule on (2470) yields:
% 51.84/18.43  																		| (2471) intruder_holds(all_285_1_617) = all_806_0_3810
% 51.84/18.43  																		| (2472) party_of_protocol(b) = all_806_1_3811
% 51.84/18.43  																		| (2473) intruder_message(an_a_nonce) = all_806_2_3812
% 51.84/18.43  																		| (2474)  ~ (all_806_1_3811 = 0) |  ~ (all_806_2_3812 = 0) | all_806_0_3810 = 0
% 51.84/18.43  																		|
% 51.84/18.43  																		| Instantiating (1225) with all_808_0_3813, all_808_1_3814, all_808_2_3815 yields:
% 51.84/18.43  																		| (2475) intruder_holds(all_285_1_617) = all_808_2_3815 & b_holds(all_808_1_3814) = all_808_0_3813 & key(an_a_nonce, a) = all_808_1_3814 & ( ~ (all_808_0_3813 = 0) |  ~ (all_808_2_3815 = 0))
% 51.84/18.43  																		|
% 51.84/18.43  																		| Applying alpha-rule on (2475) yields:
% 51.84/18.43  																		| (2476) intruder_holds(all_285_1_617) = all_808_2_3815
% 51.84/18.43  																		| (2477) b_holds(all_808_1_3814) = all_808_0_3813
% 51.84/18.43  																		| (2478) key(an_a_nonce, a) = all_808_1_3814
% 51.84/18.43  																		| (2479)  ~ (all_808_0_3813 = 0) |  ~ (all_808_2_3815 = 0)
% 51.84/18.43  																		|
% 51.84/18.43  																		| Instantiating (2386) with all_816_0_3832, all_816_1_3833, all_816_2_3834 yields:
% 51.84/18.43  																		| (2480) intruder_holds(all_493_1_3716) = all_816_0_3832 & party_of_protocol(a) = all_816_1_3833 & intruder_message(all_19_7_96) = all_816_2_3834 & ( ~ (all_816_1_3833 = 0) |  ~ (all_816_2_3834 = 0) | all_816_0_3832 = 0)
% 51.84/18.43  																		|
% 51.84/18.43  																		| Applying alpha-rule on (2480) yields:
% 51.84/18.43  																		| (2481) intruder_holds(all_493_1_3716) = all_816_0_3832
% 51.84/18.43  																		| (2482) party_of_protocol(a) = all_816_1_3833
% 51.84/18.43  																		| (2483) intruder_message(all_19_7_96) = all_816_2_3834
% 51.84/18.43  																		| (2484)  ~ (all_816_1_3833 = 0) |  ~ (all_816_2_3834 = 0) | all_816_0_3832 = 0
% 51.84/18.43  																		|
% 51.84/18.43  																		| Instantiating (2385) with all_818_0_3835, all_818_1_3836, all_818_2_3837 yields:
% 51.84/18.43  																		| (2485) intruder_holds(all_504_1_3722) = all_818_0_3835 & party_of_protocol(b) = all_818_1_3836 & intruder_message(all_19_7_96) = all_818_2_3837 & ( ~ (all_818_1_3836 = 0) |  ~ (all_818_2_3837 = 0) | all_818_0_3835 = 0)
% 51.84/18.43  																		|
% 51.84/18.43  																		| Applying alpha-rule on (2485) yields:
% 51.84/18.43  																		| (2486) intruder_holds(all_504_1_3722) = all_818_0_3835
% 51.84/18.43  																		| (2487) party_of_protocol(b) = all_818_1_3836
% 51.84/18.43  																		| (2488) intruder_message(all_19_7_96) = all_818_2_3837
% 51.84/18.43  																		| (2489)  ~ (all_818_1_3836 = 0) |  ~ (all_818_2_3837 = 0) | all_818_0_3835 = 0
% 51.84/18.43  																		|
% 51.84/18.43  																		| Instantiating (1210) with all_834_0_3861, all_834_1_3862, all_834_2_3863, all_834_3_3864, all_834_4_3865, all_834_5_3866, all_834_6_3867, all_834_7_3868, all_834_8_3869, all_834_9_3870, all_834_10_3871 yields:
% 51.84/18.43  																		| (2490) fresh_to_b(all_285_7_623) = all_834_8_3869 & generate_b_nonce(all_285_7_623) = all_834_7_3868 & generate_expiration_time(all_285_7_623) = all_834_6_3867 & b_stored(all_285_6_622) = all_834_0_3861 & triple(all_63_4_187, all_285_7_623, all_834_6_3867) = all_834_5_3866 & triple(b, all_834_7_3868, all_834_4_3865) = all_834_3_3864 & encrypt(all_834_5_3866, bt) = all_834_4_3865 & sent(all_63_4_187, b, all_285_6_622) = all_834_10_3871 & sent(b, t, all_834_3_3864) = all_834_2_3863 & message(all_834_2_3863) = all_834_1_3862 & message(all_834_10_3871) = all_834_9_3870 & ( ~ (all_834_8_3869 = 0) |  ~ (all_834_9_3870 = 0) | (all_834_0_3861 = 0 & all_834_1_3862 = 0))
% 51.84/18.43  																		|
% 51.84/18.43  																		| Applying alpha-rule on (2490) yields:
% 51.84/18.43  																		| (2491) sent(b, t, all_834_3_3864) = all_834_2_3863
% 51.84/18.43  																		| (2492) triple(all_63_4_187, all_285_7_623, all_834_6_3867) = all_834_5_3866
% 51.84/18.43  																		| (2493) b_stored(all_285_6_622) = all_834_0_3861
% 51.84/18.43  																		| (2494) generate_expiration_time(all_285_7_623) = all_834_6_3867
% 51.84/18.43  																		| (2495) message(all_834_10_3871) = all_834_9_3870
% 51.84/18.43  																		| (2496)  ~ (all_834_8_3869 = 0) |  ~ (all_834_9_3870 = 0) | (all_834_0_3861 = 0 & all_834_1_3862 = 0)
% 51.84/18.43  																		| (2497) message(all_834_2_3863) = all_834_1_3862
% 51.84/18.43  																		| (2498) encrypt(all_834_5_3866, bt) = all_834_4_3865
% 51.84/18.43  																		| (2499) triple(b, all_834_7_3868, all_834_4_3865) = all_834_3_3864
% 51.84/18.43  																		| (2500) fresh_to_b(all_285_7_623) = all_834_8_3869
% 51.84/18.43  																		| (2501) sent(all_63_4_187, b, all_285_6_622) = all_834_10_3871
% 51.84/18.43  																		| (2502) generate_b_nonce(all_285_7_623) = all_834_7_3868
% 51.84/18.43  																		|
% 51.84/18.43  																		| Instantiating (1223) with all_836_0_3872, all_836_1_3873 yields:
% 51.84/18.43  																		| (2503) intruder_message(all_375_6_796) = all_836_0_3872 & message(all_375_5_795) = all_836_1_3873 & ( ~ (all_836_1_3873 = 0) | all_836_0_3872 = 0)
% 51.84/18.43  																		|
% 51.84/18.43  																		| Applying alpha-rule on (2503) yields:
% 51.84/18.43  																		| (2504) intruder_message(all_375_6_796) = all_836_0_3872
% 51.84/18.43  																		| (2505) message(all_375_5_795) = all_836_1_3873
% 51.84/18.43  																		| (2506)  ~ (all_836_1_3873 = 0) | all_836_0_3872 = 0
% 51.84/18.43  																		|
% 51.84/18.43  																		| Instantiating (1222) with all_840_0_3876, all_840_1_3877, all_840_2_3878, all_840_3_3879 yields:
% 51.84/18.43  																		| (2507) party_of_protocol(b) = all_840_1_3877 & party_of_protocol(a) = all_840_2_3878 & intruder_message(all_375_6_796) = all_840_3_3879 & message(all_375_5_795) = all_840_0_3876 & ( ~ (all_840_1_3877 = 0) |  ~ (all_840_2_3878 = 0) |  ~ (all_840_3_3879 = 0) | all_840_0_3876 = 0)
% 51.84/18.43  																		|
% 51.84/18.43  																		| Applying alpha-rule on (2507) yields:
% 51.84/18.43  																		| (2508) message(all_375_5_795) = all_840_0_3876
% 51.84/18.43  																		| (2509) party_of_protocol(a) = all_840_2_3878
% 51.84/18.43  																		| (2510)  ~ (all_840_1_3877 = 0) |  ~ (all_840_2_3878 = 0) |  ~ (all_840_3_3879 = 0) | all_840_0_3876 = 0
% 51.84/18.43  																		| (2511) intruder_message(all_375_6_796) = all_840_3_3879
% 51.84/18.43  																		| (2512) party_of_protocol(b) = all_840_1_3877
% 51.84/18.43  																		|
% 51.84/18.43  																		| Instantiating (1221) with all_864_0_3937, all_864_1_3938, all_864_2_3939, all_864_3_3940 yields:
% 51.84/18.43  																		| (2513) party_of_protocol(b) = all_864_2_3939 & party_of_protocol(t) = all_864_1_3938 & intruder_message(all_369_3_774) = all_864_3_3940 & message(all_369_2_773) = all_864_0_3937 & ( ~ (all_864_1_3938 = 0) |  ~ (all_864_2_3939 = 0) |  ~ (all_864_3_3940 = 0) | all_864_0_3937 = 0)
% 51.84/18.43  																		|
% 51.84/18.43  																		| Applying alpha-rule on (2513) yields:
% 51.84/18.43  																		| (2514) party_of_protocol(b) = all_864_2_3939
% 51.84/18.43  																		| (2515)  ~ (all_864_1_3938 = 0) |  ~ (all_864_2_3939 = 0) |  ~ (all_864_3_3940 = 0) | all_864_0_3937 = 0
% 51.84/18.43  																		| (2516) intruder_message(all_369_3_774) = all_864_3_3940
% 51.84/18.43  																		| (2517) message(all_369_2_773) = all_864_0_3937
% 51.84/18.43  																		| (2518) party_of_protocol(t) = all_864_1_3938
% 51.84/18.43  																		|
% 51.84/18.43  																		| Instantiating formula (37) with all_285_1_617, all_806_0_3810, all_808_2_3815 and discharging atoms intruder_holds(all_285_1_617) = all_808_2_3815, intruder_holds(all_285_1_617) = all_806_0_3810, yields:
% 51.84/18.43  																		| (2519) all_808_2_3815 = all_806_0_3810
% 51.84/18.43  																		|
% 51.84/18.43  																		| Instantiating formula (66) with b, all_864_2_3939, 0 and discharging atoms party_of_protocol(b) = all_864_2_3939, party_of_protocol(b) = 0, yields:
% 51.84/18.43  																		| (2520) all_864_2_3939 = 0
% 51.84/18.43  																		|
% 51.84/18.43  																		| Instantiating formula (66) with b, all_818_1_3836, all_864_2_3939 and discharging atoms party_of_protocol(b) = all_864_2_3939, party_of_protocol(b) = all_818_1_3836, yields:
% 51.84/18.43  																		| (2521) all_864_2_3939 = all_818_1_3836
% 51.84/18.43  																		|
% 51.84/18.43  																		| Instantiating formula (66) with b, all_818_1_3836, all_840_1_3877 and discharging atoms party_of_protocol(b) = all_840_1_3877, party_of_protocol(b) = all_818_1_3836, yields:
% 51.84/18.43  																		| (2522) all_840_1_3877 = all_818_1_3836
% 51.84/18.43  																		|
% 51.84/18.43  																		| Instantiating formula (66) with b, all_806_1_3811, all_818_1_3836 and discharging atoms party_of_protocol(b) = all_818_1_3836, party_of_protocol(b) = all_806_1_3811, yields:
% 51.84/18.43  																		| (2523) all_818_1_3836 = all_806_1_3811
% 51.84/18.43  																		|
% 51.84/18.43  																		| Instantiating formula (66) with b, all_804_1_3807, all_840_1_3877 and discharging atoms party_of_protocol(b) = all_840_1_3877, party_of_protocol(b) = all_804_1_3807, yields:
% 51.84/18.44  																		| (2524) all_840_1_3877 = all_804_1_3807
% 51.84/18.44  																		|
% 51.84/18.44  																		| Instantiating formula (66) with b, all_796_1_3795, all_818_1_3836 and discharging atoms party_of_protocol(b) = all_818_1_3836, party_of_protocol(b) = all_796_1_3795, yields:
% 51.84/18.44  																		| (2525) all_818_1_3836 = all_796_1_3795
% 51.84/18.44  																		|
% 51.84/18.44  																		| Instantiating formula (66) with b, all_792_1_3789, all_796_1_3795 and discharging atoms party_of_protocol(b) = all_796_1_3795, party_of_protocol(b) = all_792_1_3789, yields:
% 51.84/18.44  																		| (2526) all_796_1_3795 = all_792_1_3789
% 51.84/18.44  																		|
% 51.84/18.44  																		| Instantiating formula (66) with b, all_792_2_3790, all_792_1_3789 and discharging atoms party_of_protocol(b) = all_792_1_3789, party_of_protocol(b) = all_792_2_3790, yields:
% 51.84/18.44  																		| (2527) all_792_1_3789 = all_792_2_3790
% 51.84/18.44  																		|
% 51.84/18.44  																		| Instantiating formula (66) with b, all_784_1_3768, all_792_2_3790 and discharging atoms party_of_protocol(b) = all_792_2_3790, party_of_protocol(b) = all_784_1_3768, yields:
% 51.84/18.44  																		| (2528) all_792_2_3790 = all_784_1_3768
% 51.84/18.44  																		|
% 51.84/18.44  																		| Instantiating formula (66) with b, all_772_1_3750, all_784_1_3768 and discharging atoms party_of_protocol(b) = all_784_1_3768, party_of_protocol(b) = all_772_1_3750, yields:
% 51.84/18.44  																		| (2529) all_784_1_3768 = all_772_1_3750
% 51.84/18.44  																		|
% 51.84/18.44  																		| Instantiating formula (66) with a, all_840_2_3878, 0 and discharging atoms party_of_protocol(a) = all_840_2_3878, party_of_protocol(a) = 0, yields:
% 51.84/18.44  																		| (2530) all_840_2_3878 = 0
% 51.84/18.44  																		|
% 51.84/18.44  																		| Instantiating formula (66) with a, all_816_1_3833, all_840_2_3878 and discharging atoms party_of_protocol(a) = all_840_2_3878, party_of_protocol(a) = all_816_1_3833, yields:
% 51.84/18.44  																		| (2531) all_840_2_3878 = all_816_1_3833
% 51.84/18.44  																		|
% 51.84/18.44  																		| Instantiating formula (66) with a, all_764_1_3740, all_840_2_3878 and discharging atoms party_of_protocol(a) = all_840_2_3878, party_of_protocol(a) = all_764_1_3740, yields:
% 51.84/18.44  																		| (2532) all_840_2_3878 = all_764_1_3740
% 51.84/18.44  																		|
% 51.84/18.44  																		| Instantiating formula (66) with t, all_864_1_3938, 0 and discharging atoms party_of_protocol(t) = all_864_1_3938, party_of_protocol(t) = 0, yields:
% 51.84/18.44  																		| (2533) all_864_1_3938 = 0
% 51.84/18.44  																		|
% 51.84/18.44  																		| Instantiating formula (66) with t, all_780_1_3763, all_864_1_3938 and discharging atoms party_of_protocol(t) = all_864_1_3938, party_of_protocol(t) = all_780_1_3763, yields:
% 51.84/18.44  																		| (2534) all_864_1_3938 = all_780_1_3763
% 51.84/18.44  																		|
% 51.84/18.44  																		| Instantiating formula (31) with all_375_6_796, all_836_0_3872, all_840_3_3879 and discharging atoms intruder_message(all_375_6_796) = all_840_3_3879, intruder_message(all_375_6_796) = all_836_0_3872, yields:
% 51.84/18.44  																		| (2535) all_840_3_3879 = all_836_0_3872
% 51.84/18.44  																		|
% 51.84/18.44  																		| Instantiating formula (31) with all_375_6_796, all_800_0_3800, all_840_3_3879 and discharging atoms intruder_message(all_375_6_796) = all_840_3_3879, intruder_message(all_375_6_796) = all_800_0_3800, yields:
% 51.84/18.44  																		| (2536) all_840_3_3879 = all_800_0_3800
% 51.84/18.44  																		|
% 51.84/18.44  																		| Instantiating formula (31) with all_375_6_796, all_790_2_3787, all_840_3_3879 and discharging atoms intruder_message(all_375_6_796) = all_840_3_3879, intruder_message(all_375_6_796) = all_790_2_3787, yields:
% 51.84/18.44  																		| (2537) all_840_3_3879 = all_790_2_3787
% 51.84/18.44  																		|
% 51.84/18.44  																		| Instantiating formula (31) with all_285_7_623, all_800_1_3801, all_802_1_3804 and discharging atoms intruder_message(all_285_7_623) = all_802_1_3804, intruder_message(all_285_7_623) = all_800_1_3801, yields:
% 51.84/18.44  																		| (2538) all_802_1_3804 = all_800_1_3801
% 51.84/18.44  																		|
% 51.84/18.44  																		| Instantiating formula (31) with all_285_7_623, all_790_0_3785, all_800_1_3801 and discharging atoms intruder_message(all_285_7_623) = all_800_1_3801, intruder_message(all_285_7_623) = all_790_0_3785, yields:
% 51.84/18.44  																		| (2539) all_800_1_3801 = all_790_0_3785
% 51.84/18.44  																		|
% 51.84/18.44  																		| Instantiating formula (31) with all_285_7_623, all_788_0_3782, all_802_1_3804 and discharging atoms intruder_message(all_285_7_623) = all_802_1_3804, intruder_message(all_285_7_623) = all_788_0_3782, yields:
% 51.84/18.44  																		| (2540) all_802_1_3804 = all_788_0_3782
% 51.84/18.44  																		|
% 51.84/18.44  																		| Instantiating formula (31) with all_61_4_176, all_800_2_3802, 0 and discharging atoms intruder_message(all_61_4_176) = all_800_2_3802, intruder_message(all_61_4_176) = 0, yields:
% 51.84/18.44  																		| (2541) all_800_2_3802 = 0
% 51.84/18.44  																		|
% 51.84/18.44  																		| Instantiating formula (31) with an_a_nonce, all_806_2_3812, 0 and discharging atoms intruder_message(an_a_nonce) = all_806_2_3812, intruder_message(an_a_nonce) = 0, yields:
% 51.84/18.44  																		| (2542) all_806_2_3812 = 0
% 51.84/18.44  																		|
% 51.84/18.44  																		| Instantiating formula (31) with an_a_nonce, all_764_2_3741, all_806_2_3812 and discharging atoms intruder_message(an_a_nonce) = all_806_2_3812, intruder_message(an_a_nonce) = all_764_2_3741, yields:
% 51.84/18.44  																		| (2543) all_806_2_3812 = all_764_2_3741
% 51.84/18.44  																		|
% 51.84/18.44  																		| Instantiating formula (26) with all_375_1_791, all_766_0_3742, all_375_0_790 and discharging atoms b_holds(all_375_1_791) = all_766_0_3742, b_holds(all_375_1_791) = all_375_0_790, yields:
% 51.84/18.44  																		| (2544) all_766_0_3742 = all_375_0_790
% 51.84/18.44  																		|
% 51.84/18.44  																		| Instantiating formula (18) with all_285_7_623, all_786_6_3777, all_834_6_3867 and discharging atoms generate_expiration_time(all_285_7_623) = all_834_6_3867, generate_expiration_time(all_285_7_623) = all_786_6_3777, yields:
% 51.84/18.44  																		| (2545) all_834_6_3867 = all_786_6_3777
% 51.84/18.44  																		|
% 51.84/18.44  																		| Instantiating formula (15) with all_375_5_795, all_840_0_3876, all_375_4_794 and discharging atoms message(all_375_5_795) = all_840_0_3876, message(all_375_5_795) = all_375_4_794, yields:
% 51.84/18.44  																		| (2546) all_840_0_3876 = all_375_4_794
% 51.84/18.44  																		|
% 51.84/18.44  																		| Instantiating formula (55) with an_a_nonce, b, all_766_2_3744, all_285_1_617 and discharging atoms key(an_a_nonce, b) = all_766_2_3744, key(an_a_nonce, b) = all_285_1_617, yields:
% 51.84/18.44  																		| (2547) all_766_2_3744 = all_285_1_617
% 51.84/18.44  																		|
% 51.84/18.44  																		| Instantiating formula (55) with an_a_nonce, a, all_808_1_3814, all_375_1_791 and discharging atoms key(an_a_nonce, a) = all_808_1_3814, key(an_a_nonce, a) = all_375_1_791, yields:
% 51.84/18.44  																		| (2548) all_808_1_3814 = all_375_1_791
% 51.84/18.44  																		|
% 51.84/18.44  																		| Combining equations (2533,2534) yields a new equation:
% 51.84/18.44  																		| (2549) all_780_1_3763 = 0
% 51.84/18.44  																		|
% 51.84/18.44  																		| Combining equations (2521,2520) yields a new equation:
% 51.84/18.44  																		| (2550) all_818_1_3836 = 0
% 51.84/18.44  																		|
% 51.84/18.44  																		| Simplifying 2550 yields:
% 51.84/18.44  																		| (2551) all_818_1_3836 = 0
% 51.84/18.44  																		|
% 51.84/18.44  																		| Combining equations (2522,2524) yields a new equation:
% 51.84/18.44  																		| (2552) all_818_1_3836 = all_804_1_3807
% 51.84/18.44  																		|
% 51.84/18.44  																		| Simplifying 2552 yields:
% 51.84/18.44  																		| (2553) all_818_1_3836 = all_804_1_3807
% 51.84/18.44  																		|
% 51.84/18.44  																		| Combining equations (2530,2531) yields a new equation:
% 51.84/18.44  																		| (2554) all_816_1_3833 = 0
% 51.84/18.44  																		|
% 51.84/18.44  																		| Combining equations (2532,2531) yields a new equation:
% 51.84/18.44  																		| (2555) all_816_1_3833 = all_764_1_3740
% 51.84/18.44  																		|
% 51.84/18.44  																		| Combining equations (2536,2535) yields a new equation:
% 51.84/18.44  																		| (2556) all_836_0_3872 = all_800_0_3800
% 51.84/18.44  																		|
% 51.84/18.44  																		| Combining equations (2537,2535) yields a new equation:
% 51.84/18.44  																		| (2557) all_836_0_3872 = all_790_2_3787
% 51.84/18.44  																		|
% 51.84/18.44  																		| Combining equations (2557,2556) yields a new equation:
% 51.84/18.44  																		| (2558) all_800_0_3800 = all_790_2_3787
% 51.84/18.44  																		|
% 51.84/18.44  																		| Combining equations (2553,2523) yields a new equation:
% 51.84/18.44  																		| (2559) all_806_1_3811 = all_804_1_3807
% 51.84/18.44  																		|
% 51.84/18.44  																		| Combining equations (2551,2523) yields a new equation:
% 51.84/18.44  																		| (2560) all_806_1_3811 = 0
% 51.84/18.44  																		|
% 51.84/18.44  																		| Combining equations (2525,2523) yields a new equation:
% 51.84/18.44  																		| (2561) all_806_1_3811 = all_796_1_3795
% 51.84/18.44  																		|
% 51.84/18.44  																		| Combining equations (2554,2555) yields a new equation:
% 51.84/18.44  																		| (2562) all_764_1_3740 = 0
% 51.84/18.44  																		|
% 51.84/18.44  																		| Combining equations (2560,2559) yields a new equation:
% 51.84/18.44  																		| (2563) all_804_1_3807 = 0
% 51.84/18.44  																		|
% 51.84/18.44  																		| Combining equations (2561,2559) yields a new equation:
% 51.84/18.44  																		| (2564) all_804_1_3807 = all_796_1_3795
% 51.84/18.44  																		|
% 51.84/18.44  																		| Combining equations (2542,2543) yields a new equation:
% 51.84/18.44  																		| (2565) all_764_2_3741 = 0
% 51.84/18.44  																		|
% 51.84/18.44  																		| Combining equations (2564,2563) yields a new equation:
% 51.84/18.44  																		| (2566) all_796_1_3795 = 0
% 51.84/18.44  																		|
% 51.84/18.44  																		| Simplifying 2566 yields:
% 51.84/18.44  																		| (2567) all_796_1_3795 = 0
% 51.84/18.44  																		|
% 51.84/18.44  																		| Combining equations (2538,2540) yields a new equation:
% 51.84/18.44  																		| (2568) all_800_1_3801 = all_788_0_3782
% 51.84/18.44  																		|
% 51.84/18.44  																		| Simplifying 2568 yields:
% 51.84/18.44  																		| (2569) all_800_1_3801 = all_788_0_3782
% 51.84/18.44  																		|
% 51.84/18.44  																		| Combining equations (2539,2569) yields a new equation:
% 51.84/18.44  																		| (2570) all_790_0_3785 = all_788_0_3782
% 51.84/18.44  																		|
% 51.84/18.44  																		| Simplifying 2570 yields:
% 51.84/18.44  																		| (2571) all_790_0_3785 = all_788_0_3782
% 51.84/18.44  																		|
% 51.84/18.44  																		| Combining equations (2526,2567) yields a new equation:
% 51.84/18.44  																		| (2572) all_792_1_3789 = 0
% 51.84/18.44  																		|
% 51.84/18.44  																		| Simplifying 2572 yields:
% 51.84/18.44  																		| (2573) all_792_1_3789 = 0
% 51.84/18.44  																		|
% 51.84/18.44  																		| Combining equations (2527,2573) yields a new equation:
% 51.84/18.44  																		| (2574) all_792_2_3790 = 0
% 51.84/18.44  																		|
% 51.84/18.44  																		| Simplifying 2574 yields:
% 51.84/18.44  																		| (2575) all_792_2_3790 = 0
% 51.84/18.44  																		|
% 51.84/18.44  																		| Combining equations (2528,2575) yields a new equation:
% 51.84/18.44  																		| (2576) all_784_1_3768 = 0
% 51.84/18.44  																		|
% 51.84/18.44  																		| Simplifying 2576 yields:
% 51.84/18.44  																		| (2577) all_784_1_3768 = 0
% 51.84/18.44  																		|
% 51.84/18.44  																		| Combining equations (2529,2577) yields a new equation:
% 51.84/18.44  																		| (2578) all_772_1_3750 = 0
% 51.84/18.44  																		|
% 51.84/18.44  																		| Simplifying 2578 yields:
% 51.84/18.44  																		| (2579) all_772_1_3750 = 0
% 51.84/18.44  																		|
% 51.84/18.44  																		| Combining equations (2565,2543) yields a new equation:
% 51.84/18.44  																		| (2542) all_806_2_3812 = 0
% 51.84/18.44  																		|
% 51.84/18.44  																		| Combining equations (2563,2559) yields a new equation:
% 51.84/18.44  																		| (2560) all_806_1_3811 = 0
% 51.84/18.44  																		|
% 51.84/18.44  																		| Combining equations (2562,2555) yields a new equation:
% 51.84/18.44  																		| (2554) all_816_1_3833 = 0
% 51.84/18.44  																		|
% 51.84/18.45  																		| Combining equations (2558,2556) yields a new equation:
% 51.84/18.45  																		| (2557) all_836_0_3872 = all_790_2_3787
% 51.84/18.45  																		|
% 51.84/18.45  																		| Combining equations (2557,2535) yields a new equation:
% 51.84/18.45  																		| (2537) all_840_3_3879 = all_790_2_3787
% 51.84/18.45  																		|
% 51.84/18.45  																		| Combining equations (2554,2531) yields a new equation:
% 51.84/18.45  																		| (2530) all_840_2_3878 = 0
% 51.84/18.45  																		|
% 51.84/18.45  																		| Combining equations (2563,2524) yields a new equation:
% 51.84/18.45  																		| (2586) all_840_1_3877 = 0
% 51.84/18.45  																		|
% 51.84/18.45  																		| From (2547) and (2398) follows:
% 51.84/18.45  																		| (2587) intruder_holds(all_285_1_617) = all_766_1_3743
% 51.84/18.45  																		|
% 51.84/18.45  																		| From (2519) and (2476) follows:
% 51.84/18.45  																		| (2471) intruder_holds(all_285_1_617) = all_806_0_3810
% 51.84/18.45  																		|
% 51.84/18.45  																		| From (2579) and (2404) follows:
% 51.84/18.45  																		| (10) party_of_protocol(b) = 0
% 51.84/18.45  																		|
% 51.84/18.45  																		| From (2562) and (2394) follows:
% 51.84/18.45  																		| (43) party_of_protocol(a) = 0
% 51.84/18.45  																		|
% 51.84/18.45  																		| From (2549) and (2410) follows:
% 51.84/18.45  																		| (34) party_of_protocol(t) = 0
% 51.84/18.45  																		|
% 51.84/18.45  																		| From (2571) and (2439) follows:
% 51.84/18.45  																		| (2434) intruder_message(all_285_7_623) = all_788_0_3782
% 51.84/18.45  																		|
% 51.84/18.45  																		| From (2548) and (2477) follows:
% 51.84/18.45  																		| (2593) b_holds(all_375_1_791) = all_808_0_3813
% 51.84/18.45  																		|
% 51.84/18.45  																		| From (2544) and (2399) follows:
% 51.84/18.45  																		| (918) b_holds(all_375_1_791) = all_375_0_790
% 51.84/18.45  																		|
% 51.84/18.45  																		| From (2545) and (2492) follows:
% 51.84/18.45  																		| (2595) triple(all_63_4_187, all_285_7_623, all_786_6_3777) = all_834_5_3866
% 51.84/18.45  																		|
% 51.84/18.45  																		| From (2547) and (2400) follows:
% 51.84/18.45  																		| (716) key(an_a_nonce, b) = all_285_1_617
% 51.84/18.45  																		|
% 51.84/18.45  																		| From (2548) and (2478) follows:
% 51.84/18.45  																		| (917) key(an_a_nonce, a) = all_375_1_791
% 51.84/18.45  																		|
% 51.84/18.45  																		+-Applying beta-rule and splitting (2474), into two cases.
% 51.84/18.45  																		|-Branch one:
% 51.84/18.45  																		| (2598)  ~ (all_806_1_3811 = 0)
% 51.84/18.45  																		|
% 51.84/18.45  																			| Equations (2560) can reduce 2598 to:
% 51.84/18.45  																			| (551) $false
% 51.84/18.45  																			|
% 51.84/18.45  																			|-The branch is then unsatisfiable
% 51.84/18.45  																		|-Branch two:
% 51.84/18.45  																		| (2560) all_806_1_3811 = 0
% 51.84/18.45  																		| (2601)  ~ (all_806_2_3812 = 0) | all_806_0_3810 = 0
% 51.84/18.45  																		|
% 51.84/18.45  																			+-Applying beta-rule and splitting (2601), into two cases.
% 51.84/18.45  																			|-Branch one:
% 51.84/18.45  																			| (2602)  ~ (all_806_2_3812 = 0)
% 51.84/18.45  																			|
% 51.84/18.45  																				| Equations (2542) can reduce 2602 to:
% 51.84/18.45  																				| (551) $false
% 51.84/18.45  																				|
% 51.84/18.45  																				|-The branch is then unsatisfiable
% 51.84/18.45  																			|-Branch two:
% 51.84/18.45  																			| (2542) all_806_2_3812 = 0
% 51.84/18.45  																			| (2605) all_806_0_3810 = 0
% 51.84/18.45  																			|
% 51.95/18.45  																				| Combining equations (2605,2519) yields a new equation:
% 51.95/18.45  																				| (2606) all_808_2_3815 = 0
% 51.95/18.45  																				|
% 51.95/18.45  																				| From (2605) and (2471) follows:
% 51.95/18.45  																				| (1467) intruder_holds(all_285_1_617) = 0
% 51.95/18.45  																				|
% 51.95/18.45  																				+-Applying beta-rule and splitting (2479), into two cases.
% 51.95/18.45  																				|-Branch one:
% 51.95/18.45  																				| (2608)  ~ (all_808_0_3813 = 0)
% 51.95/18.45  																				|
% 51.95/18.45  																					+-Applying beta-rule and splitting (2396), into two cases.
% 51.95/18.45  																					|-Branch one:
% 51.95/18.45  																					| (2609)  ~ (all_764_1_3740 = 0)
% 51.95/18.45  																					|
% 51.95/18.45  																						| Equations (2562) can reduce 2609 to:
% 51.95/18.45  																						| (551) $false
% 51.95/18.45  																						|
% 51.95/18.45  																						|-The branch is then unsatisfiable
% 51.95/18.45  																					|-Branch two:
% 51.95/18.45  																					| (2562) all_764_1_3740 = 0
% 51.95/18.45  																					| (2612)  ~ (all_764_2_3741 = 0) | all_764_0_3739 = 0
% 51.95/18.45  																					|
% 51.95/18.45  																						+-Applying beta-rule and splitting (2612), into two cases.
% 51.95/18.45  																						|-Branch one:
% 51.95/18.45  																						| (2613)  ~ (all_764_2_3741 = 0)
% 51.95/18.45  																						|
% 51.95/18.45  																							| Equations (2565) can reduce 2613 to:
% 51.95/18.45  																							| (551) $false
% 51.95/18.45  																							|
% 51.95/18.45  																							|-The branch is then unsatisfiable
% 51.95/18.45  																						|-Branch two:
% 51.95/18.45  																						| (2565) all_764_2_3741 = 0
% 51.95/18.45  																						| (2616) all_764_0_3739 = 0
% 51.95/18.45  																						|
% 51.95/18.45  																							| From (2616) and (2393) follows:
% 51.95/18.45  																							| (1461) intruder_holds(all_375_1_791) = 0
% 51.95/18.45  																							|
% 51.95/18.45  																							| Instantiating formula (37) with all_285_1_617, 0, all_766_1_3743 and discharging atoms intruder_holds(all_285_1_617) = all_766_1_3743, intruder_holds(all_285_1_617) = 0, yields:
% 51.95/18.45  																							| (2618) all_766_1_3743 = 0
% 51.95/18.45  																							|
% 51.95/18.45  																							| Instantiating formula (26) with all_375_1_791, all_808_0_3813, all_375_0_790 and discharging atoms b_holds(all_375_1_791) = all_808_0_3813, b_holds(all_375_1_791) = all_375_0_790, yields:
% 51.95/18.45  																							| (2619) all_808_0_3813 = all_375_0_790
% 51.95/18.45  																							|
% 51.95/18.45  																							| Equations (2619) can reduce 2608 to:
% 51.95/18.45  																							| (1471)  ~ (all_375_0_790 = 0)
% 51.95/18.45  																							|
% 51.95/18.45  																							| From (2618) and (2587) follows:
% 51.95/18.45  																							| (1467) intruder_holds(all_285_1_617) = 0
% 51.95/18.45  																							|
% 51.95/18.45  																							+-Applying beta-rule and splitting (916), into two cases.
% 51.95/18.45  																							|-Branch one:
% 51.95/18.45  																							| (1473)  ~ (all_375_2_792 = 0)
% 51.95/18.45  																							|
% 51.95/18.45  																								| Equations (1198) can reduce 1473 to:
% 51.95/18.45  																								| (551) $false
% 51.95/18.45  																								|
% 51.95/18.45  																								|-The branch is then unsatisfiable
% 51.95/18.45  																							|-Branch two:
% 51.95/18.45  																							| (1198) all_375_2_792 = 0
% 51.95/18.45  																							| (1476)  ~ (all_375_4_794 = 0) | all_375_0_790 = 0
% 51.95/18.45  																							|
% 51.95/18.45  																								+-Applying beta-rule and splitting (1476), into two cases.
% 51.95/18.45  																								|-Branch one:
% 51.95/18.45  																								| (1477)  ~ (all_375_4_794 = 0)
% 51.95/18.45  																								|
% 51.95/18.45  																									+-Applying beta-rule and splitting (2510), into two cases.
% 51.95/18.45  																									|-Branch one:
% 51.95/18.45  																									| (2627)  ~ (all_840_1_3877 = 0)
% 51.95/18.45  																									|
% 51.95/18.45  																										| Equations (2586) can reduce 2627 to:
% 51.95/18.45  																										| (551) $false
% 51.95/18.45  																										|
% 51.95/18.45  																										|-The branch is then unsatisfiable
% 51.95/18.45  																									|-Branch two:
% 51.95/18.45  																									| (2586) all_840_1_3877 = 0
% 51.95/18.45  																									| (2630)  ~ (all_840_2_3878 = 0) |  ~ (all_840_3_3879 = 0) | all_840_0_3876 = 0
% 51.95/18.45  																									|
% 51.95/18.45  																										+-Applying beta-rule and splitting (2630), into two cases.
% 51.95/18.45  																										|-Branch one:
% 51.95/18.45  																										| (2631)  ~ (all_840_2_3878 = 0)
% 51.95/18.45  																										|
% 51.95/18.45  																											| Equations (2530) can reduce 2631 to:
% 51.95/18.45  																											| (551) $false
% 51.95/18.45  																											|
% 51.95/18.45  																											|-The branch is then unsatisfiable
% 51.95/18.45  																										|-Branch two:
% 51.95/18.45  																										| (2530) all_840_2_3878 = 0
% 51.95/18.45  																										| (2634)  ~ (all_840_3_3879 = 0) | all_840_0_3876 = 0
% 51.95/18.45  																										|
% 51.95/18.45  																											+-Applying beta-rule and splitting (2634), into two cases.
% 51.95/18.45  																											|-Branch one:
% 51.95/18.45  																											| (2635)  ~ (all_840_3_3879 = 0)
% 51.95/18.45  																											|
% 51.95/18.45  																												| Equations (2537) can reduce 2635 to:
% 51.95/18.45  																												| (2636)  ~ (all_790_2_3787 = 0)
% 51.95/18.45  																												|
% 51.95/18.45  																												+-Applying beta-rule and splitting (2458), into two cases.
% 51.95/18.45  																												|-Branch one:
% 51.95/18.45  																												| (2637)  ~ (all_800_1_3801 = 0)
% 51.95/18.45  																												|
% 51.95/18.45  																													| Equations (2569) can reduce 2637 to:
% 51.95/18.45  																													| (2638)  ~ (all_788_0_3782 = 0)
% 51.95/18.45  																													|
% 51.95/18.45  																													| Instantiating formula (63) with all_375_1_791, a, an_a_nonce, all_61_3_175 and discharging atoms intruder_holds(all_375_1_791) = 0, intruder_message(all_61_3_175) = 0, key(an_a_nonce, a) = all_375_1_791, yields:
% 51.95/18.45  																													| (1501)  ? [v0] :  ? [v1] :  ? [v2] : (party_of_protocol(a) = v0 & intruder_message(v1) = v2 & encrypt(all_61_3_175, an_a_nonce) = v1 & ( ~ (v0 = 0) | v2 = 0))
% 51.95/18.45  																													|
% 51.95/18.45  																													| Instantiating formula (63) with all_375_1_791, a, an_a_nonce, all_61_7_179 and discharging atoms intruder_holds(all_375_1_791) = 0, intruder_message(all_61_7_179) = 0, key(an_a_nonce, a) = all_375_1_791, yields:
% 51.95/18.45  																													| (1503)  ? [v0] :  ? [v1] :  ? [v2] : (party_of_protocol(a) = v0 & intruder_message(v1) = v2 & encrypt(all_61_7_179, an_a_nonce) = v1 & ( ~ (v0 = 0) | v2 = 0))
% 51.95/18.45  																													|
% 51.95/18.45  																													| Instantiating formula (45) with all_788_0_3782, all_285_7_623, all_375_1_791, a, an_a_nonce, all_61_7_179 and discharging atoms intruder_holds(all_375_1_791) = 0, intruder_message(all_285_7_623) = all_788_0_3782, encrypt(all_61_7_179, an_a_nonce) = all_285_7_623, key(an_a_nonce, a) = all_375_1_791, yields:
% 51.95/18.45  																													| (2641) all_788_0_3782 = 0 |  ? [v0] :  ? [v1] : (party_of_protocol(a) = v1 & intruder_message(all_61_7_179) = v0 & ( ~ (v1 = 0) |  ~ (v0 = 0)))
% 51.95/18.45  																													|
% 51.95/18.45  																													| Instantiating formula (45) with all_788_0_3782, all_285_7_623, all_285_1_617, b, an_a_nonce, all_61_7_179 and discharging atoms intruder_holds(all_285_1_617) = 0, intruder_message(all_285_7_623) = all_788_0_3782, encrypt(all_61_7_179, an_a_nonce) = all_285_7_623, key(an_a_nonce, b) = all_285_1_617, yields:
% 51.95/18.46  																													| (2642) all_788_0_3782 = 0 |  ? [v0] :  ? [v1] : (party_of_protocol(b) = v1 & intruder_message(all_61_7_179) = v0 & ( ~ (v1 = 0) |  ~ (v0 = 0)))
% 51.95/18.46  																													|
% 51.95/18.46  																													| Instantiating formula (7) with all_788_0_3782, all_285_7_623, b, an_a_nonce, all_61_7_179 and discharging atoms party_of_protocol(b) = 0, intruder_message(all_285_7_623) = all_788_0_3782, encrypt(all_61_7_179, an_a_nonce) = all_285_7_623, yields:
% 51.95/18.46  																													| (2643) all_788_0_3782 = 0 |  ? [v0] :  ? [v1] :  ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_61_7_179) = v0 & key(an_a_nonce, b) = v1 & ( ~ (v2 = 0) |  ~ (v0 = 0)))
% 51.95/18.46  																													|
% 51.95/18.46  																													| Instantiating formula (7) with all_788_0_3782, all_285_7_623, a, an_a_nonce, all_61_7_179 and discharging atoms party_of_protocol(a) = 0, intruder_message(all_285_7_623) = all_788_0_3782, encrypt(all_61_7_179, an_a_nonce) = all_285_7_623, yields:
% 51.95/18.46  																													| (2644) all_788_0_3782 = 0 |  ? [v0] :  ? [v1] :  ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_61_7_179) = v0 & key(an_a_nonce, a) = v1 & ( ~ (v2 = 0) |  ~ (v0 = 0)))
% 51.95/18.46  																													|
% 51.95/18.46  																													| Instantiating formula (7) with all_788_0_3782, all_285_7_623, t, an_a_nonce, all_61_7_179 and discharging atoms party_of_protocol(t) = 0, intruder_message(all_285_7_623) = all_788_0_3782, encrypt(all_61_7_179, an_a_nonce) = all_285_7_623, yields:
% 51.95/18.46  																													| (2645) all_788_0_3782 = 0 |  ? [v0] :  ? [v1] :  ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_61_7_179) = v0 & key(an_a_nonce, t) = v1 & ( ~ (v2 = 0) |  ~ (v0 = 0)))
% 51.95/18.46  																													|
% 51.95/18.46  																													| Instantiating formula (40) with all_834_5_3866, all_786_6_3777, all_285_7_623, all_63_4_187 and discharging atoms triple(all_63_4_187, all_285_7_623, all_786_6_3777) = all_834_5_3866, yields:
% 51.95/18.46  																													| (2646)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (intruder_message(all_834_5_3866) = v3 & intruder_message(all_786_6_3777) = v2 & intruder_message(all_285_7_623) = v1 & intruder_message(all_63_4_187) = v0 & ( ~ (v2 = 0) |  ~ (v1 = 0) |  ~ (v0 = 0) | v3 = 0))
% 51.95/18.46  																													|
% 51.95/18.46  																													| Instantiating formula (68) with all_834_5_3866, all_786_6_3777, all_285_7_623, all_63_4_187 and discharging atoms triple(all_63_4_187, all_285_7_623, all_786_6_3777) = all_834_5_3866, yields:
% 51.95/18.46  																													| (2647)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (intruder_message(all_834_5_3866) = v0 & intruder_message(all_786_6_3777) = v3 & intruder_message(all_285_7_623) = v2 & intruder_message(all_63_4_187) = v1 & ( ~ (v0 = 0) | (v3 = 0 & v2 = 0 & v1 = 0)))
% 51.95/18.46  																													|
% 51.95/18.46  																													| Instantiating formula (40) with all_786_5_3776, all_786_6_3777, all_285_7_623, all_61_4_176 and discharging atoms triple(all_61_4_176, all_285_7_623, all_786_6_3777) = all_786_5_3776, yields:
% 51.95/18.46  																													| (2648)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (intruder_message(all_786_5_3776) = v3 & intruder_message(all_786_6_3777) = v2 & intruder_message(all_285_7_623) = v1 & intruder_message(all_61_4_176) = v0 & ( ~ (v2 = 0) |  ~ (v1 = 0) |  ~ (v0 = 0) | v3 = 0))
% 51.95/18.46  																													|
% 51.95/18.46  																													| Instantiating formula (68) with all_786_5_3776, all_786_6_3777, all_285_7_623, all_61_4_176 and discharging atoms triple(all_61_4_176, all_285_7_623, all_786_6_3777) = all_786_5_3776, yields:
% 51.95/18.46  																													| (2649)  ? [v0] :  ? [v1] :  ? [v2] :  ? [v3] : (intruder_message(all_786_5_3776) = v0 & intruder_message(all_786_6_3777) = v3 & intruder_message(all_285_7_623) = v2 & intruder_message(all_61_4_176) = v1 & ( ~ (v0 = 0) | (v3 = 0 & v2 = 0 & v1 = 0)))
% 51.95/18.46  																													|
% 51.95/18.46  																													| Instantiating (2647) with all_1371_0_4084, all_1371_1_4085, all_1371_2_4086, all_1371_3_4087 yields:
% 51.95/18.46  																													| (2650) intruder_message(all_834_5_3866) = all_1371_3_4087 & intruder_message(all_786_6_3777) = all_1371_0_4084 & intruder_message(all_285_7_623) = all_1371_1_4085 & intruder_message(all_63_4_187) = all_1371_2_4086 & ( ~ (all_1371_3_4087 = 0) | (all_1371_0_4084 = 0 & all_1371_1_4085 = 0 & all_1371_2_4086 = 0))
% 51.95/18.46  																													|
% 51.95/18.46  																													| Applying alpha-rule on (2650) yields:
% 51.95/18.46  																													| (2651)  ~ (all_1371_3_4087 = 0) | (all_1371_0_4084 = 0 & all_1371_1_4085 = 0 & all_1371_2_4086 = 0)
% 51.95/18.46  																													| (2652) intruder_message(all_786_6_3777) = all_1371_0_4084
% 51.95/18.46  																													| (2653) intruder_message(all_834_5_3866) = all_1371_3_4087
% 51.95/18.46  																													| (2654) intruder_message(all_63_4_187) = all_1371_2_4086
% 51.95/18.46  																													| (2655) intruder_message(all_285_7_623) = all_1371_1_4085
% 51.95/18.46  																													|
% 51.95/18.46  																													| Instantiating (2646) with all_1375_0_4098, all_1375_1_4099, all_1375_2_4100, all_1375_3_4101 yields:
% 51.95/18.46  																													| (2656) intruder_message(all_834_5_3866) = all_1375_0_4098 & intruder_message(all_786_6_3777) = all_1375_1_4099 & intruder_message(all_285_7_623) = all_1375_2_4100 & intruder_message(all_63_4_187) = all_1375_3_4101 & ( ~ (all_1375_1_4099 = 0) |  ~ (all_1375_2_4100 = 0) |  ~ (all_1375_3_4101 = 0) | all_1375_0_4098 = 0)
% 51.95/18.46  																													|
% 51.95/18.46  																													| Applying alpha-rule on (2656) yields:
% 51.95/18.46  																													| (2657)  ~ (all_1375_1_4099 = 0) |  ~ (all_1375_2_4100 = 0) |  ~ (all_1375_3_4101 = 0) | all_1375_0_4098 = 0
% 51.95/18.46  																													| (2658) intruder_message(all_63_4_187) = all_1375_3_4101
% 51.95/18.46  																													| (2659) intruder_message(all_285_7_623) = all_1375_2_4100
% 51.95/18.46  																													| (2660) intruder_message(all_786_6_3777) = all_1375_1_4099
% 51.95/18.46  																													| (2661) intruder_message(all_834_5_3866) = all_1375_0_4098
% 51.95/18.46  																													|
% 51.95/18.46  																													| Instantiating (2649) with all_1425_0_4216, all_1425_1_4217, all_1425_2_4218, all_1425_3_4219 yields:
% 51.95/18.46  																													| (2662) intruder_message(all_786_5_3776) = all_1425_3_4219 & intruder_message(all_786_6_3777) = all_1425_0_4216 & intruder_message(all_285_7_623) = all_1425_1_4217 & intruder_message(all_61_4_176) = all_1425_2_4218 & ( ~ (all_1425_3_4219 = 0) | (all_1425_0_4216 = 0 & all_1425_1_4217 = 0 & all_1425_2_4218 = 0))
% 51.95/18.46  																													|
% 51.95/18.46  																													| Applying alpha-rule on (2662) yields:
% 51.95/18.46  																													| (2663) intruder_message(all_285_7_623) = all_1425_1_4217
% 51.95/18.46  																													| (2664) intruder_message(all_61_4_176) = all_1425_2_4218
% 51.95/18.46  																													| (2665) intruder_message(all_786_5_3776) = all_1425_3_4219
% 51.95/18.46  																													| (2666)  ~ (all_1425_3_4219 = 0) | (all_1425_0_4216 = 0 & all_1425_1_4217 = 0 & all_1425_2_4218 = 0)
% 51.95/18.46  																													| (2667) intruder_message(all_786_6_3777) = all_1425_0_4216
% 51.95/18.46  																													|
% 51.95/18.46  																													| Instantiating (2648) with all_1427_0_4220, all_1427_1_4221, all_1427_2_4222, all_1427_3_4223 yields:
% 51.95/18.46  																													| (2668) intruder_message(all_786_5_3776) = all_1427_0_4220 & intruder_message(all_786_6_3777) = all_1427_1_4221 & intruder_message(all_285_7_623) = all_1427_2_4222 & intruder_message(all_61_4_176) = all_1427_3_4223 & ( ~ (all_1427_1_4221 = 0) |  ~ (all_1427_2_4222 = 0) |  ~ (all_1427_3_4223 = 0) | all_1427_0_4220 = 0)
% 51.95/18.46  																													|
% 51.95/18.46  																													| Applying alpha-rule on (2668) yields:
% 51.95/18.46  																													| (2669)  ~ (all_1427_1_4221 = 0) |  ~ (all_1427_2_4222 = 0) |  ~ (all_1427_3_4223 = 0) | all_1427_0_4220 = 0
% 51.95/18.46  																													| (2670) intruder_message(all_786_5_3776) = all_1427_0_4220
% 51.95/18.46  																													| (2671) intruder_message(all_786_6_3777) = all_1427_1_4221
% 51.95/18.46  																													| (2672) intruder_message(all_61_4_176) = all_1427_3_4223
% 51.95/18.46  																													| (2673) intruder_message(all_285_7_623) = all_1427_2_4222
% 51.95/18.46  																													|
% 51.95/18.46  																													| Instantiating (1503) with all_1475_0_4321, all_1475_1_4322, all_1475_2_4323 yields:
% 51.95/18.46  																													| (2674) party_of_protocol(a) = all_1475_2_4323 & intruder_message(all_1475_1_4322) = all_1475_0_4321 & encrypt(all_61_7_179, an_a_nonce) = all_1475_1_4322 & ( ~ (all_1475_2_4323 = 0) | all_1475_0_4321 = 0)
% 51.95/18.46  																													|
% 51.95/18.46  																													| Applying alpha-rule on (2674) yields:
% 51.95/18.46  																													| (2675) party_of_protocol(a) = all_1475_2_4323
% 51.95/18.46  																													| (2676) intruder_message(all_1475_1_4322) = all_1475_0_4321
% 51.95/18.46  																													| (2677) encrypt(all_61_7_179, an_a_nonce) = all_1475_1_4322
% 51.95/18.46  																													| (2678)  ~ (all_1475_2_4323 = 0) | all_1475_0_4321 = 0
% 51.95/18.46  																													|
% 51.95/18.46  																													| Instantiating (1501) with all_1489_0_4342, all_1489_1_4343, all_1489_2_4344 yields:
% 51.95/18.46  																													| (2679) party_of_protocol(a) = all_1489_2_4344 & intruder_message(all_1489_1_4343) = all_1489_0_4342 & encrypt(all_61_3_175, an_a_nonce) = all_1489_1_4343 & ( ~ (all_1489_2_4344 = 0) | all_1489_0_4342 = 0)
% 51.95/18.46  																													|
% 51.95/18.46  																													| Applying alpha-rule on (2679) yields:
% 51.95/18.46  																													| (2680) party_of_protocol(a) = all_1489_2_4344
% 51.95/18.46  																													| (2681) intruder_message(all_1489_1_4343) = all_1489_0_4342
% 51.95/18.46  																													| (2682) encrypt(all_61_3_175, an_a_nonce) = all_1489_1_4343
% 51.95/18.46  																													| (2683)  ~ (all_1489_2_4344 = 0) | all_1489_0_4342 = 0
% 51.95/18.46  																													|
% 51.95/18.46  																													+-Applying beta-rule and splitting (2644), into two cases.
% 51.95/18.46  																													|-Branch one:
% 51.95/18.46  																													| (2684) all_788_0_3782 = 0
% 51.95/18.46  																													|
% 51.95/18.46  																														| Equations (2684) can reduce 2638 to:
% 51.95/18.46  																														| (551) $false
% 51.95/18.46  																														|
% 51.95/18.46  																														|-The branch is then unsatisfiable
% 51.95/18.46  																													|-Branch two:
% 51.95/18.46  																													| (2638)  ~ (all_788_0_3782 = 0)
% 51.95/18.46  																													| (1631)  ? [v0] :  ? [v1] :  ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_61_7_179) = v0 & key(an_a_nonce, a) = v1 & ( ~ (v2 = 0) |  ~ (v0 = 0)))
% 51.95/18.46  																													|
% 51.95/18.46  																														+-Applying beta-rule and splitting (2643), into two cases.
% 51.95/18.46  																														|-Branch one:
% 51.95/18.46  																														| (2684) all_788_0_3782 = 0
% 51.95/18.46  																														|
% 51.95/18.46  																															| Equations (2684) can reduce 2638 to:
% 51.95/18.46  																															| (551) $false
% 51.95/18.46  																															|
% 51.95/18.46  																															|-The branch is then unsatisfiable
% 51.95/18.46  																														|-Branch two:
% 51.95/18.46  																														| (2638)  ~ (all_788_0_3782 = 0)
% 51.95/18.46  																														| (1639)  ? [v0] :  ? [v1] :  ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_61_7_179) = v0 & key(an_a_nonce, b) = v1 & ( ~ (v2 = 0) |  ~ (v0 = 0)))
% 51.95/18.46  																														|
% 51.95/18.46  																															+-Applying beta-rule and splitting (2645), into two cases.
% 51.95/18.46  																															|-Branch one:
% 51.95/18.46  																															| (2684) all_788_0_3782 = 0
% 51.95/18.46  																															|
% 51.95/18.46  																																| Equations (2684) can reduce 2638 to:
% 51.95/18.46  																																| (551) $false
% 51.95/18.46  																																|
% 51.95/18.46  																																|-The branch is then unsatisfiable
% 51.95/18.46  																															|-Branch two:
% 51.95/18.46  																															| (2638)  ~ (all_788_0_3782 = 0)
% 51.95/18.46  																															| (1635)  ? [v0] :  ? [v1] :  ? [v2] : (intruder_holds(v1) = v2 & intruder_message(all_61_7_179) = v0 & key(an_a_nonce, t) = v1 & ( ~ (v2 = 0) |  ~ (v0 = 0)))
% 51.95/18.46  																															|
% 51.95/18.46  																																| Instantiating formula (66) with a, all_1489_2_4344, 0 and discharging atoms party_of_protocol(a) = all_1489_2_4344, party_of_protocol(a) = 0, yields:
% 51.95/18.47  																																| (2696) all_1489_2_4344 = 0
% 51.95/18.47  																																|
% 51.95/18.47  																																| Instantiating formula (66) with a, all_1475_2_4323, all_1489_2_4344 and discharging atoms party_of_protocol(a) = all_1489_2_4344, party_of_protocol(a) = all_1475_2_4323, yields:
% 51.95/18.47  																																| (2697) all_1489_2_4344 = all_1475_2_4323
% 51.95/18.47  																																|
% 51.95/18.47  																																| Instantiating formula (31) with all_285_7_623, all_1427_2_4222, all_788_0_3782 and discharging atoms intruder_message(all_285_7_623) = all_1427_2_4222, intruder_message(all_285_7_623) = all_788_0_3782, yields:
% 51.95/18.47  																																| (2698) all_1427_2_4222 = all_788_0_3782
% 51.95/18.47  																																|
% 51.95/18.47  																																| Instantiating formula (31) with all_285_7_623, all_1375_2_4100, all_1427_2_4222 and discharging atoms intruder_message(all_285_7_623) = all_1427_2_4222, intruder_message(all_285_7_623) = all_1375_2_4100, yields:
% 51.95/18.47  																																| (2699) all_1427_2_4222 = all_1375_2_4100
% 51.95/18.47  																																|
% 51.95/18.47  																																| Instantiating formula (31) with all_285_7_623, all_1375_2_4100, all_1425_1_4217 and discharging atoms intruder_message(all_285_7_623) = all_1425_1_4217, intruder_message(all_285_7_623) = all_1375_2_4100, yields:
% 51.95/18.47  																																| (2700) all_1425_1_4217 = all_1375_2_4100
% 51.95/18.47  																																|
% 51.95/18.47  																																| Instantiating formula (31) with all_285_7_623, all_1371_1_4085, all_1425_1_4217 and discharging atoms intruder_message(all_285_7_623) = all_1425_1_4217, intruder_message(all_285_7_623) = all_1371_1_4085, yields:
% 51.95/18.47  																																| (2701) all_1425_1_4217 = all_1371_1_4085
% 51.95/18.47  																																|
% 51.95/18.47  																																| Instantiating formula (8) with all_61_7_179, an_a_nonce, all_1475_1_4322, all_285_7_623 and discharging atoms encrypt(all_61_7_179, an_a_nonce) = all_1475_1_4322, encrypt(all_61_7_179, an_a_nonce) = all_285_7_623, yields:
% 51.95/18.47  																																| (2702) all_1475_1_4322 = all_285_7_623
% 51.95/18.47  																																|
% 51.95/18.47  																																| Combining equations (2697,2696) yields a new equation:
% 51.95/18.47  																																| (2703) all_1475_2_4323 = 0
% 51.95/18.47  																																|
% 51.95/18.47  																																| Simplifying 2703 yields:
% 51.95/18.47  																																| (2704) all_1475_2_4323 = 0
% 51.95/18.47  																																|
% 51.95/18.47  																																| Combining equations (2699,2698) yields a new equation:
% 51.95/18.47  																																| (2705) all_1375_2_4100 = all_788_0_3782
% 51.95/18.47  																																|
% 51.95/18.47  																																| Simplifying 2705 yields:
% 51.95/18.47  																																| (2706) all_1375_2_4100 = all_788_0_3782
% 51.95/18.47  																																|
% 51.95/18.47  																																| Combining equations (2700,2701) yields a new equation:
% 51.95/18.47  																																| (2707) all_1375_2_4100 = all_1371_1_4085
% 51.95/18.47  																																|
% 51.95/18.47  																																| Simplifying 2707 yields:
% 51.95/18.47  																																| (2708) all_1375_2_4100 = all_1371_1_4085
% 51.95/18.47  																																|
% 51.95/18.47  																																| Combining equations (2708,2706) yields a new equation:
% 51.95/18.47  																																| (2709) all_1371_1_4085 = all_788_0_3782
% 51.95/18.47  																																|
% 51.95/18.47  																																| Simplifying 2709 yields:
% 51.95/18.47  																																| (2710) all_1371_1_4085 = all_788_0_3782
% 51.95/18.47  																																|
% 51.95/18.47  																																| From (2702) and (2676) follows:
% 51.95/18.47  																																| (2711) intruder_message(all_285_7_623) = all_1475_0_4321
% 51.95/18.47  																																|
% 51.95/18.47  																																| From (2710) and (2655) follows:
% 51.95/18.47  																																| (2434) intruder_message(all_285_7_623) = all_788_0_3782
% 51.95/18.47  																																|
% 51.95/18.47  																																+-Applying beta-rule and splitting (2641), into two cases.
% 51.95/18.47  																																|-Branch one:
% 51.95/18.47  																																| (2684) all_788_0_3782 = 0
% 51.95/18.47  																																|
% 51.95/18.47  																																	| Equations (2684) can reduce 2638 to:
% 51.95/18.47  																																	| (551) $false
% 51.95/18.47  																																	|
% 51.95/18.47  																																	|-The branch is then unsatisfiable
% 51.95/18.47  																																|-Branch two:
% 51.95/18.47  																																| (2638)  ~ (all_788_0_3782 = 0)
% 51.95/18.47  																																| (1703)  ? [v0] :  ? [v1] : (party_of_protocol(a) = v1 & intruder_message(all_61_7_179) = v0 & ( ~ (v1 = 0) |  ~ (v0 = 0)))
% 51.95/18.47  																																|
% 51.95/18.47  																																	+-Applying beta-rule and splitting (2678), into two cases.
% 51.95/18.47  																																	|-Branch one:
% 51.95/18.47  																																	| (2717)  ~ (all_1475_2_4323 = 0)
% 51.95/18.47  																																	|
% 51.95/18.47  																																		| Equations (2704) can reduce 2717 to:
% 51.95/18.47  																																		| (551) $false
% 51.95/18.47  																																		|
% 51.95/18.47  																																		|-The branch is then unsatisfiable
% 51.95/18.47  																																	|-Branch two:
% 51.95/18.47  																																	| (2704) all_1475_2_4323 = 0
% 51.95/18.47  																																	| (2720) all_1475_0_4321 = 0
% 51.95/18.47  																																	|
% 51.95/18.47  																																		| From (2720) and (2711) follows:
% 51.95/18.47  																																		| (1712) intruder_message(all_285_7_623) = 0
% 51.95/18.47  																																		|
% 51.95/18.47  																																		+-Applying beta-rule and splitting (2642), into two cases.
% 51.95/18.47  																																		|-Branch one:
% 51.95/18.47  																																		| (2684) all_788_0_3782 = 0
% 51.95/18.47  																																		|
% 51.95/18.47  																																			| Equations (2684) can reduce 2638 to:
% 51.95/18.47  																																			| (551) $false
% 51.95/18.47  																																			|
% 51.95/18.47  																																			|-The branch is then unsatisfiable
% 51.95/18.47  																																		|-Branch two:
% 51.95/18.47  																																		| (2638)  ~ (all_788_0_3782 = 0)
% 51.95/18.47  																																		| (1707)  ? [v0] :  ? [v1] : (party_of_protocol(b) = v1 & intruder_message(all_61_7_179) = v0 & ( ~ (v1 = 0) |  ~ (v0 = 0)))
% 51.95/18.47  																																		|
% 51.95/18.47  																																			| Instantiating formula (31) with all_285_7_623, 0, all_788_0_3782 and discharging atoms intruder_message(all_285_7_623) = all_788_0_3782, intruder_message(all_285_7_623) = 0, yields:
% 51.95/18.47  																																			| (2684) all_788_0_3782 = 0
% 51.95/18.47  																																			|
% 51.95/18.47  																																			| Equations (2684) can reduce 2638 to:
% 51.95/18.47  																																			| (551) $false
% 51.95/18.47  																																			|
% 51.95/18.47  																																			|-The branch is then unsatisfiable
% 51.95/18.47  																												|-Branch two:
% 51.95/18.47  																												| (2728) all_800_1_3801 = 0
% 51.95/18.47  																												| (2729)  ~ (all_800_2_3802 = 0) | all_800_0_3800 = 0
% 51.95/18.47  																												|
% 51.95/18.47  																													+-Applying beta-rule and splitting (2729), into two cases.
% 51.95/18.47  																													|-Branch one:
% 51.95/18.47  																													| (2730)  ~ (all_800_2_3802 = 0)
% 51.95/18.47  																													|
% 51.95/18.47  																														| Equations (2541) can reduce 2730 to:
% 51.95/18.47  																														| (551) $false
% 51.95/18.47  																														|
% 51.95/18.47  																														|-The branch is then unsatisfiable
% 51.95/18.47  																													|-Branch two:
% 51.95/18.47  																													| (2541) all_800_2_3802 = 0
% 51.95/18.47  																													| (2733) all_800_0_3800 = 0
% 51.95/18.47  																													|
% 51.95/18.47  																														| Combining equations (2558,2733) yields a new equation:
% 51.95/18.47  																														| (2734) all_790_2_3787 = 0
% 51.95/18.47  																														|
% 51.95/18.47  																														| Simplifying 2734 yields:
% 51.95/18.47  																														| (2735) all_790_2_3787 = 0
% 51.95/18.47  																														|
% 51.95/18.47  																														| Equations (2735) can reduce 2636 to:
% 51.95/18.47  																														| (551) $false
% 51.95/18.47  																														|
% 51.95/18.47  																														|-The branch is then unsatisfiable
% 51.95/18.47  																											|-Branch two:
% 51.95/18.47  																											| (2737) all_840_3_3879 = 0
% 51.95/18.47  																											| (2738) all_840_0_3876 = 0
% 51.95/18.47  																											|
% 51.95/18.47  																												| Combining equations (2738,2546) yields a new equation:
% 51.95/18.47  																												| (1948) all_375_4_794 = 0
% 51.95/18.47  																												|
% 51.95/18.47  																												| Equations (1948) can reduce 1477 to:
% 51.95/18.47  																												| (551) $false
% 51.95/18.47  																												|
% 51.95/18.47  																												|-The branch is then unsatisfiable
% 51.95/18.47  																								|-Branch two:
% 51.95/18.47  																								| (1948) all_375_4_794 = 0
% 51.95/18.47  																								| (1951) all_375_0_790 = 0
% 51.95/18.47  																								|
% 51.95/18.47  																									| Equations (1951) can reduce 1471 to:
% 51.95/18.47  																									| (551) $false
% 51.95/18.47  																									|
% 51.95/18.47  																									|-The branch is then unsatisfiable
% 51.95/18.47  																				|-Branch two:
% 51.95/18.47  																				| (2744) all_808_0_3813 = 0
% 51.95/18.47  																				| (2745)  ~ (all_808_2_3815 = 0)
% 51.95/18.47  																				|
% 51.95/18.47  																					| Equations (2606) can reduce 2745 to:
% 51.95/18.47  																					| (551) $false
% 51.95/18.47  																					|
% 51.95/18.47  																					|-The branch is then unsatisfiable
% 51.95/18.48  % SZS output end Proof for theBenchmark
% 51.95/18.48  
% 51.95/18.48  17878ms
%------------------------------------------------------------------------------