TSTP Solution File: SWV018-1 by Prover9---1109a

View Problem - Process Solution

%------------------------------------------------------------------------------
% File     : Prover9---1109a
% Problem  : SWV018-1 : TPTP v8.1.0. Released v2.4.0.
% Transfm  : none
% Format   : tptp:raw
% Command  : tptp2X_and_run_prover9 %d %s

% Computer : n021.cluster.edu
% Model    : x86_64 x86_64
% CPU      : Intel(R) Xeon(R) CPU E5-2620 v4 2.10GHz
% Memory   : 8042.1875MB
% OS       : Linux 3.10.0-693.el7.x86_64
% CPULimit : 300s
% WCLimit  : 600s
% DateTime : Wed Jul 20 21:10:15 EDT 2022

% Result   : Timeout 300.06s 300.39s
% Output   : None 
% Verified : 
% SZS Type : -

% Comments : 
%------------------------------------------------------------------------------
%----No solution output by system
%------------------------------------------------------------------------------
%----ORIGINAL SYSTEM OUTPUT
% 0.11/0.13  % Problem  : SWV018-1 : TPTP v8.1.0. Released v2.4.0.
% 0.11/0.13  % Command  : tptp2X_and_run_prover9 %d %s
% 0.13/0.34  % Computer : n021.cluster.edu
% 0.13/0.34  % Model    : x86_64 x86_64
% 0.13/0.34  % CPU      : Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz
% 0.13/0.34  % Memory   : 8042.1875MB
% 0.13/0.34  % OS       : Linux 3.10.0-693.el7.x86_64
% 0.13/0.34  % CPULimit : 300
% 0.13/0.34  % WCLimit  : 600
% 0.13/0.34  % DateTime : Wed Jun 15 10:18:13 EDT 2022
% 0.13/0.35  % CPUTime  : 
% 0.74/1.00  ============================== Prover9 ===============================
% 0.74/1.00  Prover9 (32) version 2009-11A, November 2009.
% 0.74/1.00  Process 4614 was started by sandbox on n021.cluster.edu,
% 0.74/1.00  Wed Jun 15 10:18:14 2022
% 0.74/1.00  The command was "/export/starexec/sandbox/solver/bin/prover9 -t 300 -f /tmp/Prover9_4459_n021.cluster.edu".
% 0.74/1.00  ============================== end of head ===========================
% 0.74/1.00  
% 0.74/1.00  ============================== INPUT =================================
% 0.74/1.00  
% 0.74/1.00  % Reading from file /tmp/Prover9_4459_n021.cluster.edu
% 0.74/1.00  
% 0.74/1.00  set(prolog_style_variables).
% 0.74/1.00  set(auto2).
% 0.74/1.00      % set(auto2) -> set(auto).
% 0.74/1.00      % set(auto) -> set(auto_inference).
% 0.74/1.00      % set(auto) -> set(auto_setup).
% 0.74/1.00      % set(auto_setup) -> set(predicate_elim).
% 0.74/1.00      % set(auto_setup) -> assign(eq_defs, unfold).
% 0.74/1.00      % set(auto) -> set(auto_limits).
% 0.74/1.00      % set(auto_limits) -> assign(max_weight, "100.000").
% 0.74/1.00      % set(auto_limits) -> assign(sos_limit, 20000).
% 0.74/1.00      % set(auto) -> set(auto_denials).
% 0.74/1.00      % set(auto) -> set(auto_process).
% 0.74/1.00      % set(auto2) -> assign(new_constants, 1).
% 0.74/1.00      % set(auto2) -> assign(fold_denial_max, 3).
% 0.74/1.00      % set(auto2) -> assign(max_weight, "200.000").
% 0.74/1.00      % set(auto2) -> assign(max_hours, 1).
% 0.74/1.00      % assign(max_hours, 1) -> assign(max_seconds, 3600).
% 0.74/1.00      % set(auto2) -> assign(max_seconds, 0).
% 0.74/1.00      % set(auto2) -> assign(max_minutes, 5).
% 0.74/1.00      % assign(max_minutes, 5) -> assign(max_seconds, 300).
% 0.74/1.00      % set(auto2) -> set(sort_initial_sos).
% 0.74/1.00      % set(auto2) -> assign(sos_limit, -1).
% 0.74/1.00      % set(auto2) -> assign(lrs_ticks, 3000).
% 0.74/1.00      % set(auto2) -> assign(max_megs, 400).
% 0.74/1.00      % set(auto2) -> assign(stats, some).
% 0.74/1.00      % set(auto2) -> clear(echo_input).
% 0.74/1.00      % set(auto2) -> set(quiet).
% 0.74/1.00      % set(auto2) -> clear(print_initial_clauses).
% 0.74/1.00      % set(auto2) -> clear(print_given).
% 0.74/1.00  assign(lrs_ticks,-1).
% 0.74/1.00  assign(sos_limit,10000).
% 0.74/1.00  assign(order,kbo).
% 0.74/1.00  set(lex_order_vars).
% 0.74/1.00  clear(print_given).
% 0.74/1.00  
% 0.74/1.00  % formulas(sos).  % not echoed (41 formulas)
% 0.74/1.00  
% 0.74/1.00  ============================== end of input ==========================
% 0.74/1.00  
% 0.74/1.00  % From the command line: assign(max_seconds, 300).
% 0.74/1.00  
% 0.74/1.00  ============================== PROCESS NON-CLAUSAL FORMULAS ==========
% 0.74/1.00  
% 0.74/1.00  % Formulas that are not ordinary clauses:
% 0.74/1.00  
% 0.74/1.00  ============================== end of process non-clausal formulas ===
% 0.74/1.00  
% 0.74/1.00  ============================== PROCESS INITIAL CLAUSES ===============
% 0.74/1.00  
% 0.74/1.00  ============================== PREDICATE ELIMINATION =================
% 0.74/1.00  1 b_stored(pair(A,B)) | -fresh_to_b(B) | -message(sent(A,b,pair(A,B))) # label(b_creates_freash_nonces_in_time_11) # label(axiom).  [assumption].
% 0.74/1.00  2 fresh_to_b(an_a_nonce) # label(nonce_a_is_fresh_to_b_9) # label(axiom).  [assumption].
% 0.74/1.00  3 fresh_to_b(A) | -fresh_intruder_nonce(A) # label(fresh_intruder_nonces_are_fresh_to_b_42) # label(axiom).  [assumption].
% 0.74/1.00  Derived: b_stored(pair(A,an_a_nonce)) | -message(sent(A,b,pair(A,an_a_nonce))).  [resolve(1,b,2,a)].
% 0.74/1.00  Derived: b_stored(pair(A,B)) | -message(sent(A,b,pair(A,B))) | -fresh_intruder_nonce(B).  [resolve(1,b,3,a)].
% 0.74/1.00  4 message(sent(b,t,triple(b,generate_b_nonce(A),encrypt(triple(B,A,generate_expiration_time(A)),bt)))) | -fresh_to_b(A) | -message(sent(B,b,pair(B,A))) # label(b_creates_freash_nonces_in_time_10) # label(axiom).  [assumption].
% 0.74/1.00  Derived: message(sent(b,t,triple(b,generate_b_nonce(an_a_nonce),encrypt(triple(A,an_a_nonce,generate_expiration_time(an_a_nonce)),bt)))) | -message(sent(A,b,pair(A,an_a_nonce))).  [resolve(4,b,2,a)].
% 0.74/1.00  Derived: message(sent(b,t,triple(b,generate_b_nonce(A),encrypt(triple(B,A,generate_expiration_time(A)),bt)))) | -message(sent(B,b,pair(B,A))) | -fresh_intruder_nonce(A).  [resolve(4,b,3,a)].
% 0.74/1.00  5 -a_key(A) | -a_nonce(A) # label(nothing_is_a_nonce_and_a_key_38) # label(axiom).  [assumption].
% 0.74/1.00  6 a_nonce(an_a_nonce) # label(an_a_nonce_is_a_nonce_34) # label(axiom).  [assumption].
% 0.74/1.00  7 a_nonce(generate_expiration_time(A)) # label(generated_times_and_nonces_are_nonces_36) # label(axiom).  [assumption].
% 0.74/1.00  8 a_nonce(generate_b_nonce(A)) # label(generated_times_and_nonces_are_nonces_37) # label(axiom).  [assumption].
% 0.74/1.00  Derived: -a_key(an_a_nonce).  [resolve(5,b,6,a)].
% 0.74/1.00  Derived: -a_key(generate_expiration_time(A)).  [resolve(5,b,7,a)].
% 0.74/1.00  Derived: -a_key(generate_b_nonce(A)).  [resolve(5,b,8,a)].
% 0.74/1.00  9 message(sent(t,A,triple(encrypt(quadruple(B,C,generate_key(C),D),E),encrypt(triple(A,generate_key(C),D),F),V6))) | -a_nonce(C) | -message(sent(B,t,triple(B,V6,encrypt(triple(A,C,D),F)))) | -t_holds(key(E,A)) | -t_holds(key(F,B)) # label(server_t_generates_key_16) # label(axiom).  [assumption].
% 0.74/1.00  Derived: message(sent(t,A,triple(encrypt(quadruple(B,an_a_nonce,generate_key(an_a_nonce),C),D),encrypt(triple(A,generate_key(an_a_nonce),C),E),F))) | -message(sent(B,t,triple(B,F,encrypt(triple(A,an_a_nonce,C),E)))) | -t_holds(key(D,A)) | -t_holds(key(E,B)).  [resolve(9,b,6,a)].
% 0.74/1.00  Derived: message(sent(t,A,triple(encrypt(quadruple(B,generate_expiration_time(C),generate_key(generate_expiration_time(C)),D),E),encrypt(triple(A,generate_key(generate_expiration_time(C)),D),F),V6))) | -message(sent(B,t,triple(B,V6,encrypt(triple(A,generate_expiration_time(C),D),F)))) | -t_holds(key(E,A)) | -t_holds(key(F,B)).  [resolve(9,b,7,a)].
% 0.74/1.00  Derived: message(sent(t,A,triple(encrypt(quadruple(B,generate_b_nonce(C),generate_key(generate_b_nonce(C)),D),E),encrypt(triple(A,generate_key(generate_b_nonce(C)),D),F),V6))) | -message(sent(B,t,triple(B,V6,encrypt(triple(A,generate_b_nonce(C),D),F)))) | -t_holds(key(E,A)) | -t_holds(key(F,B)).  [resolve(9,b,8,a)].
% 0.74/1.00  10 b_holds(key(A,B)) | -a_key(A) | -b_stored(pair(B,C)) | -message(sent(B,b,pair(encrypt(triple(B,A,generate_expiration_time(C)),bt),encrypt(generate_b_nonce(C),A)))) # label(b_accepts_secure_session_key_12) # label(axiom).  [assumption].
% 0.74/1.00  11 a_key(generate_key(A)) # label(generated_keys_are_keys_39) # label(axiom).  [assumption].
% 0.74/1.00  Derived: b_holds(key(generate_key(A),B)) | -b_stored(pair(B,C)) | -message(sent(B,b,pair(encrypt(triple(B,generate_key(A),generate_expiration_time(C)),bt),encrypt(generate_b_nonce(C),generate_key(A))))).  [resolve(10,b,11,a)].
% 0.74/1.00  12 -a_key(an_a_nonce).  [resolve(5,b,6,a)].
% 0.74/1.00  13 -a_key(generate_expiration_time(A)).  [resolve(5,b,7,a)].
% 0.74/1.00  14 -a_key(generate_b_nonce(A)).  [resolve(5,b,8,a)].
% 0.74/1.00  15 message(sent(a,A,pair(B,encrypt(C,D)))) | -a_stored(pair(A,E)) | -message(sent(t,a,triple(encrypt(quadruple(A,E,D,F),at),B,C))) # label(a_forwards_secure_5) # label(axiom).  [assumption].
% 0.74/1.00  16 a_stored(pair(b,an_a_nonce)) # label(a_stored_message_i_4) # label(axiom).  [assumption].
% 0.74/1.00  Derived: message(sent(a,b,pair(A,encrypt(B,C)))) | -message(sent(t,a,triple(encrypt(quadruple(b,an_a_nonce,C,D),at),A,B))).  [resolve(15,b,16,a)].
% 0.74/1.00  17 -b_holds(key(A,B)) | -intruder_holds(key(A,C)) # label(co1_44) # label(negated_conjecture).  [assumption].
% 0.74/1.00  18 b_holds(key(bt,t)) # label(b_hold_key_bt_for_t_7) # label(axiom).  [assumption].
% 0.74/1.00  Derived: -intruder_holds(key(bt,A)).  [resolve(17,a,18,a)].
% 0.74/1.00  19 b_holds(key(generate_key(A),B)) | -b_stored(pair(B,C)) | -message(sent(B,b,pair(encrypt(triple(B,generate_key(A),generate_expiration_time(C)),bt),encrypt(generate_b_nonce(C),generate_key(A))))).  [resolve(10,b,11,a)].
% 0.74/1.00  Derived: -b_stored(pair(A,B)) | -message(sent(A,b,pair(encrypt(triple(A,generate_key(C),generate_expiration_time(B)),bt),encrypt(generate_b_nonce(B),generate_key(C))))) | -intruder_holds(key(generate_key(C),D)).  [resolve(19,a,17,a)].
% 0.74/1.00  20 intruder_message(A) | -intruder_holds(key(A,B)) | -intruder_message(encrypt(C,A)) | -party_of_protocol(B) # label(intruder_interception_30) # label(axiom).  [assumption].
% 0.74/1.00  21 intruder_holds(key(A,B)) | -intruder_message(A) | -party_of_protocol(B) # label(intruder_holds_key_32) # label(axiom).  [assumption].
% 0.74/1.00  22 intruder_message(encrypt(A,B)) | -intruder_holds(key(B,C)) | -intruder_message(A) | -party_of_protocol(C) # label(intruder_key_encrypts_33) # label(axiom).  [assumption].
% 0.74/1.00  Derived: intruder_message(encrypt(A,B)) | -intruder_message(A) | -party_of_protocol(C) | -intruder_message(B) | -party_of_protocol(C).  [resolve(22,b,21,a)].
% 0.74/1.00  23 -intruder_holds(key(bt,A)).  [resolve(17,a,18,a)].
% 0.74/1.00  Derived: -intruder_message(bt) | -party_of_protocol(A).  [resolve(23,a,21,a)].
% 0.74/1.00  24 -b_stored(pair(A,B)) | -message(sent(A,b,pair(encrypt(triple(A,generate_key(C),generate_expiration_time(B)),bt),encrypt(generate_b_nonce(B),generate_key(C))))) | -intruder_holds(key(g
% 0.74/1.00  WARNING: denials share constants (see output).
% 0.74/1.00  
% 300.06/300.39  Cputime limit exceeded (core dumped)
%------------------------------------------------------------------------------