TSTP Solution File: SWV017+1 by Otter---3.3

View Problem - Process Solution

%------------------------------------------------------------------------------
% File     : Otter---3.3
% Problem  : SWV017+1 : TPTP v8.1.0. Released v2.4.0.
% Transfm  : none
% Format   : tptp:raw
% Command  : otter-tptp-script %s

% Computer : n013.cluster.edu
% Model    : x86_64 x86_64
% CPU      : Intel(R) Xeon(R) CPU E5-2620 v4 2.10GHz
% Memory   : 8042.1875MB
% OS       : Linux 3.10.0-693.el7.x86_64
% CPULimit : 300s
% WCLimit  : 300s
% DateTime : Wed Jul 27 13:19:41 EDT 2022

% Result   : Timeout 299.97s 300.10s
% Output   : None 
% Verified : 
% SZS Type : -

% Comments : 
%------------------------------------------------------------------------------
%----No solution output by system
%------------------------------------------------------------------------------
%----ORIGINAL SYSTEM OUTPUT
% 0.11/0.12  % Problem  : SWV017+1 : TPTP v8.1.0. Released v2.4.0.
% 0.11/0.13  % Command  : otter-tptp-script %s
% 0.14/0.34  % Computer : n013.cluster.edu
% 0.14/0.34  % Model    : x86_64 x86_64
% 0.14/0.34  % CPU      : Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz
% 0.14/0.34  % Memory   : 8042.1875MB
% 0.14/0.34  % OS       : Linux 3.10.0-693.el7.x86_64
% 0.14/0.34  % CPULimit : 300
% 0.14/0.34  % WCLimit  : 300
% 0.14/0.34  % DateTime : Wed Jul 27 06:04:45 EDT 2022
% 0.14/0.34  % CPUTime  : 
% 2.02/2.18  ----- Otter 3.3f, August 2004 -----
% 2.02/2.18  The process was started by sandbox on n013.cluster.edu,
% 2.02/2.18  Wed Jul 27 06:04:45 2022
% 2.02/2.18  The command was "./otter".  The process ID is 10260.
% 2.02/2.18  
% 2.02/2.18  set(prolog_style_variables).
% 2.02/2.18  set(auto).
% 2.02/2.18     dependent: set(auto1).
% 2.02/2.18     dependent: set(process_input).
% 2.02/2.18     dependent: clear(print_kept).
% 2.02/2.18     dependent: clear(print_new_demod).
% 2.02/2.18     dependent: clear(print_back_demod).
% 2.02/2.18     dependent: clear(print_back_sub).
% 2.02/2.18     dependent: set(control_memory).
% 2.02/2.18     dependent: assign(max_mem, 12000).
% 2.02/2.18     dependent: assign(pick_given_ratio, 4).
% 2.02/2.18     dependent: assign(stats_level, 1).
% 2.02/2.18     dependent: assign(max_seconds, 10800).
% 2.02/2.18  clear(print_given).
% 2.02/2.18  
% 2.02/2.18  formula_list(usable).
% 2.02/2.18  a_holds(key(at,t)).
% 2.02/2.18  party_of_protocol(a).
% 2.02/2.18  message(sent(a,b,pair(a,an_a_nonce))).
% 2.02/2.18  a_stored(pair(b,an_a_nonce)).
% 2.02/2.18  all U V W X Y Z (message(sent(t,a,triple(encrypt(quadruple(Y,Z,W,V),at),X,U)))&a_stored(pair(Y,Z))->message(sent(a,Y,pair(X,encrypt(U,W))))&a_holds(key(W,Y))).
% 2.02/2.18  b_holds(key(bt,t)).
% 2.02/2.18  party_of_protocol(b).
% 2.02/2.18  fresh_to_b(an_a_nonce).
% 2.02/2.18  all U V (message(sent(U,b,pair(U,V)))&fresh_to_b(V)->message(sent(b,t,triple(b,generate_b_nonce(V),encrypt(triple(U,V,generate_expiration_time(V)),bt))))&b_stored(pair(U,V))).
% 2.02/2.18  all V X Y (message(sent(X,b,pair(encrypt(triple(X,V,generate_expiration_time(Y)),bt),encrypt(generate_b_nonce(Y),V))))&a_key(V)&b_stored(pair(X,Y))->b_holds(key(V,X))).
% 2.02/2.18  t_holds(key(at,a)).
% 2.02/2.18  t_holds(key(bt,b)).
% 2.02/2.18  party_of_protocol(t).
% 2.02/2.18  all U V W X Y Z X1 (message(sent(U,t,triple(U,V,encrypt(triple(W,X,Y),Z))))&t_holds(key(Z,U))&t_holds(key(X1,W))&a_nonce(X)->message(sent(t,W,triple(encrypt(quadruple(U,X,generate_key(X),Y),X1),encrypt(triple(W,generate_key(X),Y),Z),V)))).
% 2.02/2.18  all U V W (message(sent(U,V,W))->intruder_message(W)).
% 2.02/2.18  all U V (intruder_message(pair(U,V))->intruder_message(U)&intruder_message(V)).
% 2.02/2.18  all U V W (intruder_message(triple(U,V,W))->intruder_message(U)&intruder_message(V)&intruder_message(W)).
% 2.02/2.18  all U V W X (intruder_message(quadruple(U,V,W,X))->intruder_message(U)&intruder_message(V)&intruder_message(W)&intruder_message(X)).
% 2.02/2.18  all U V (intruder_message(U)&intruder_message(V)->intruder_message(pair(U,V))).
% 2.02/2.18  all U V W (intruder_message(U)&intruder_message(V)&intruder_message(W)->intruder_message(triple(U,V,W))).
% 2.02/2.18  all U V W X (intruder_message(U)&intruder_message(V)&intruder_message(W)&intruder_message(X)->intruder_message(quadruple(U,V,W,X))).
% 2.02/2.18  all U V W (intruder_message(encrypt(U,V))&intruder_holds(key(V,W))&party_of_protocol(W)->intruder_message(V)).
% 2.02/2.18  all U V W (intruder_message(U)&party_of_protocol(V)&party_of_protocol(W)->message(sent(V,W,U))).
% 2.02/2.18  all V W (intruder_message(V)&party_of_protocol(W)->intruder_holds(key(V,W))).
% 2.02/2.18  all U V W (intruder_message(U)&intruder_holds(key(V,W))&party_of_protocol(W)->intruder_message(encrypt(U,V))).
% 2.02/2.18  a_nonce(an_a_nonce).
% 2.02/2.18  all U (-a_nonce(generate_key(U))).
% 2.02/2.18  all U (a_nonce(generate_expiration_time(U))&a_nonce(generate_b_nonce(U))).
% 2.02/2.18  all U (-(a_key(U)&a_nonce(U))).
% 2.02/2.18  all U a_key(generate_key(U)).
% 2.02/2.18  fresh_intruder_nonce(an_intruder_nonce).
% 2.02/2.18  all U (fresh_intruder_nonce(U)->fresh_intruder_nonce(generate_intruder_nonce(U))).
% 2.02/2.18  all U (fresh_intruder_nonce(U)->fresh_to_b(U)&intruder_message(U)).
% 2.02/2.18  end_of_list.
% 2.02/2.18  
% 2.02/2.18  -------> usable clausifies to:
% 2.02/2.18  
% 2.02/2.18  list(usable).
% 2.02/2.18  0 [] a_holds(key(at,t)).
% 2.02/2.18  0 [] party_of_protocol(a).
% 2.02/2.18  0 [] message(sent(a,b,pair(a,an_a_nonce))).
% 2.02/2.18  0 [] a_stored(pair(b,an_a_nonce)).
% 2.02/2.18  0 [] -message(sent(t,a,triple(encrypt(quadruple(Y,Z,W,V),at),X,U)))| -a_stored(pair(Y,Z))|message(sent(a,Y,pair(X,encrypt(U,W)))).
% 2.02/2.18  0 [] -message(sent(t,a,triple(encrypt(quadruple(Y,Z,W,V),at),X,U)))| -a_stored(pair(Y,Z))|a_holds(key(W,Y)).
% 2.02/2.18  0 [] b_holds(key(bt,t)).
% 2.02/2.18  0 [] party_of_protocol(b).
% 2.02/2.18  0 [] fresh_to_b(an_a_nonce).
% 2.02/2.18  0 [] -message(sent(U,b,pair(U,V)))| -fresh_to_b(V)|message(sent(b,t,triple(b,generate_b_nonce(V),encrypt(triple(U,V,generate_expiration_time(V)),bt)))).
% 2.02/2.18  0 [] -message(sent(U,b,pair(U,V)))| -fresh_to_b(V)|b_stored(pair(U,V)).
% 2.02/2.18  0 [] -message(sent(X,b,pair(encrypt(triple(X,V,generate_expiration_time(Y)),bt),encrypt(generate_b_nonce(Y),V))))| -a_key(V)| -b_stored(pair(X,Y))|b_holds(key(V,X)).
% 2.02/2.18  0 [] t_holds(key(at,a)).
% 2.02/2.18  0 [] t_holds(key(bt,b)).
% 2.02/2.18  0 [] party_of_protocol(t).
% 2.02/2.18  0 [] -message(sent(U,t,triple(U,V,encrypt(triple(W,X,Y),Z))))| -t_holds(key(Z,U))| -t_holds(key(X1,W))| -a_nonce(X)|message(sent(t,W,triple(encrypt(quadruple(U,X,generate_key(X),Y),X1),encrypt(triple(W,generate_key(X),Y),Z),V))).
% 2.02/2.18  0 [] -message(sent(U,V,W))|intruder_message(W).
% 2.02/2.18  0 [] -intruder_message(pair(U,V))|intruder_message(U).
% 2.02/2.18  0 [] -intruder_message(pair(U,V))|intruder_message(V).
% 2.02/2.18  0 [] -intruder_message(triple(U,V,W))|intruder_message(U).
% 2.02/2.18  0 [] -intruder_message(triple(U,V,W))|intruder_message(V).
% 2.02/2.18  0 [] -intruder_message(triple(U,V,W))|intruder_message(W).
% 2.02/2.18  0 [] -intruder_message(quadruple(U,V,W,X))|intruder_message(U).
% 2.02/2.18  0 [] -intruder_message(quadruple(U,V,W,X))|intruder_message(V).
% 2.02/2.18  0 [] -intruder_message(quadruple(U,V,W,X))|intruder_message(W).
% 2.02/2.18  0 [] -intruder_message(quadruple(U,V,W,X))|intruder_message(X).
% 2.02/2.18  0 [] -intruder_message(U)| -intruder_message(V)|intruder_message(pair(U,V)).
% 2.02/2.18  0 [] -intruder_message(U)| -intruder_message(V)| -intruder_message(W)|intruder_message(triple(U,V,W)).
% 2.02/2.18  0 [] -intruder_message(U)| -intruder_message(V)| -intruder_message(W)| -intruder_message(X)|intruder_message(quadruple(U,V,W,X)).
% 2.02/2.18  0 [] -intruder_message(encrypt(U,V))| -intruder_holds(key(V,W))| -party_of_protocol(W)|intruder_message(V).
% 2.02/2.18  0 [] -intruder_message(U)| -party_of_protocol(V)| -party_of_protocol(W)|message(sent(V,W,U)).
% 2.02/2.18  0 [] -intruder_message(V)| -party_of_protocol(W)|intruder_holds(key(V,W)).
% 2.02/2.18  0 [] -intruder_message(U)| -intruder_holds(key(V,W))| -party_of_protocol(W)|intruder_message(encrypt(U,V)).
% 2.02/2.18  0 [] a_nonce(an_a_nonce).
% 2.02/2.18  0 [] -a_nonce(generate_key(U)).
% 2.02/2.18  0 [] a_nonce(generate_expiration_time(U)).
% 2.02/2.18  0 [] a_nonce(generate_b_nonce(U)).
% 2.02/2.18  0 [] -a_key(U)| -a_nonce(U).
% 2.02/2.18  0 [] a_key(generate_key(U)).
% 2.02/2.18  0 [] fresh_intruder_nonce(an_intruder_nonce).
% 2.02/2.18  0 [] -fresh_intruder_nonce(U)|fresh_intruder_nonce(generate_intruder_nonce(U)).
% 2.02/2.18  0 [] -fresh_intruder_nonce(U)|fresh_to_b(U).
% 2.02/2.18  0 [] -fresh_intruder_nonce(U)|intruder_message(U).
% 2.02/2.18  end_of_list.
% 2.02/2.18  
% 2.02/2.18  SCAN INPUT: prop=0, horn=1, equality=0, symmetry=0, max_lits=5.
% 2.02/2.18  
% 2.02/2.18  This is a Horn set without equality.  The strategy will
% 2.02/2.18  be hyperresolution, with satellites in sos and nuclei
% 2.02/2.18  in usable.
% 2.02/2.18  
% 2.02/2.18     dependent: set(hyper_res).
% 2.02/2.18     dependent: clear(order_hyper).
% 2.02/2.18  
% 2.02/2.18  ------------> process usable:
% 2.02/2.18  ** KEPT (pick-wt=27): 1 [] -message(sent(t,a,triple(encrypt(quadruple(A,B,C,D),at),E,F)))| -a_stored(pair(A,B))|message(sent(a,A,pair(E,encrypt(F,C)))).
% 2.02/2.18  ** KEPT (pick-wt=22): 2 [] -message(sent(t,a,triple(encrypt(quadruple(A,B,C,D),at),E,F)))| -a_stored(pair(A,B))|a_holds(key(C,A)).
% 2.02/2.18  ** KEPT (pick-wt=24): 3 [] -message(sent(A,b,pair(A,B)))| -fresh_to_b(B)|message(sent(b,t,triple(b,generate_b_nonce(B),encrypt(triple(A,B,generate_expiration_time(B)),bt)))).
% 2.02/2.18  ** KEPT (pick-wt=13): 4 [] -message(sent(A,b,pair(A,B)))| -fresh_to_b(B)|b_stored(pair(A,B)).
% 2.02/2.18  ** KEPT (pick-wt=26): 5 [] -message(sent(A,b,pair(encrypt(triple(A,B,generate_expiration_time(C)),bt),encrypt(generate_b_nonce(C),B))))| -a_key(B)| -b_stored(pair(A,C))|b_holds(key(B,A)).
% 2.02/2.18  ** KEPT (pick-wt=44): 6 [] -message(sent(A,t,triple(A,B,encrypt(triple(C,D,E),F))))| -t_holds(key(F,A))| -t_holds(key(G,C))| -a_nonce(D)|message(sent(t,C,triple(encrypt(quadruple(A,D,generate_key(D),E),G),encrypt(triple(C,generate_key(D),E),F),B))).
% 2.02/2.18  ** KEPT (pick-wt=7): 7 [] -message(sent(A,B,C))|intruder_message(C).
% 2.02/2.18  ** KEPT (pick-wt=6): 8 [] -intruder_message(pair(A,B))|intruder_message(A).
% 2.02/2.18  ** KEPT (pick-wt=6): 9 [] -intruder_message(pair(A,B))|intruder_message(B).
% 2.02/2.18  ** KEPT (pick-wt=7): 10 [] -intruder_message(triple(A,B,C))|intruder_message(A).
% 2.02/2.18  ** KEPT (pick-wt=7): 11 [] -intruder_message(triple(A,B,C))|intruder_message(B).
% 2.02/2.18  ** KEPT (pick-wt=7): 12 [] -intruder_message(triple(A,B,C))|intruder_message(C).
% 2.02/2.18  ** KEPT (pick-wt=8): 13 [] -intruder_message(quadruple(A,B,C,D))|intruder_message(A).
% 2.02/2.18  ** KEPT (pick-wt=8): 14 [] -intruder_message(quadruple(A,B,C,D))|intruder_message(B).
% 2.02/2.18  ** KEPT (pick-wt=8): 15 [] -intruder_message(quadruple(A,B,C,D))|intruder_message(C).
% 2.02/2.18  ** KEPT (pick-wt=8): 16 [] -intruder_message(quadruple(A,B,C,D))|intruder_message(D).
% 2.02/2.18  ** KEPT (pick-wt=8): 17 [] -intruder_message(A)| -intruder_message(B)Alarm clock 
% 299.97/300.10  Otter interrupted
% 299.97/300.10  PROOF NOT FOUND
%------------------------------------------------------------------------------