TSTP Solution File: SWW964+1 by Otter---3.3

View Problem - Process Solution

%------------------------------------------------------------------------------
% File     : Otter---3.3
% Problem  : SWW964+1 : TPTP v8.1.0. Released v7.4.0.
% Transfm  : none
% Format   : tptp:raw
% Command  : otter-tptp-script %s

% Computer : n025.cluster.edu
% Model    : x86_64 x86_64
% CPU      : Intel(R) Xeon(R) CPU E5-2620 v4 2.10GHz
% Memory   : 8042.1875MB
% OS       : Linux 3.10.0-693.el7.x86_64
% CPULimit : 300s
% WCLimit  : 300s
% DateTime : Wed Jul 27 13:23:15 EDT 2022

% Result   : Timeout 299.92s 300.08s
% Output   : None 
% Verified : 
% SZS Type : -

% Comments : 
%------------------------------------------------------------------------------
%----No solution output by system
%------------------------------------------------------------------------------
%----ORIGINAL SYSTEM OUTPUT
% 0.06/0.11  % Problem  : SWW964+1 : TPTP v8.1.0. Released v7.4.0.
% 0.06/0.12  % Command  : otter-tptp-script %s
% 0.12/0.33  % Computer : n025.cluster.edu
% 0.12/0.33  % Model    : x86_64 x86_64
% 0.12/0.33  % CPU      : Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz
% 0.12/0.33  % Memory   : 8042.1875MB
% 0.12/0.33  % OS       : Linux 3.10.0-693.el7.x86_64
% 0.12/0.33  % CPULimit : 300
% 0.12/0.33  % WCLimit  : 300
% 0.12/0.33  % DateTime : Wed Jul 27 03:11:30 EDT 2022
% 0.12/0.33  % CPUTime  : 
% 2.37/2.56  ----- Otter 3.3f, August 2004 -----
% 2.37/2.56  The process was started by sandbox2 on n025.cluster.edu,
% 2.37/2.56  Wed Jul 27 03:11:30 2022
% 2.37/2.56  The command was "./otter".  The process ID is 6494.
% 2.37/2.56  
% 2.37/2.56  set(prolog_style_variables).
% 2.37/2.56  set(auto).
% 2.37/2.56     dependent: set(auto1).
% 2.37/2.56     dependent: set(process_input).
% 2.37/2.56     dependent: clear(print_kept).
% 2.37/2.56     dependent: clear(print_new_demod).
% 2.37/2.56     dependent: clear(print_back_demod).
% 2.37/2.56     dependent: clear(print_back_sub).
% 2.37/2.56     dependent: set(control_memory).
% 2.37/2.56     dependent: assign(max_mem, 12000).
% 2.37/2.56     dependent: assign(pick_given_ratio, 4).
% 2.37/2.56     dependent: assign(stats_level, 1).
% 2.37/2.56     dependent: assign(max_seconds, 10800).
% 2.37/2.56  clear(print_given).
% 2.37/2.56  
% 2.37/2.56  formula_list(usable).
% 2.37/2.56  all A (A=A).
% 2.37/2.56  constr_CONST_0x30!=constr_CONST_1.
% 2.37/2.56  constr_CONST_0x30!=constr_CONST_2.
% 2.37/2.56  constr_CONST_0x30!=constr_CONST_3.
% 2.37/2.56  constr_CONST_0x30!=constr_CONST_4.
% 2.37/2.56  constr_CONST_0x30!=name_A.
% 2.37/2.56  constr_CONST_0x30!=name_B.
% 2.37/2.56  constr_CONST_0x30!=name_I.
% 2.37/2.56  constr_CONST_0x30!=name_c.
% 2.37/2.56  constr_CONST_0x30!=name_objective.
% 2.37/2.56  constr_CONST_0x30!=name_skA.
% 2.37/2.56  constr_CONST_0x30!=name_skB.
% 2.37/2.56  constr_CONST_0x30!=name_skS.
% 2.37/2.56  constr_CONST_1!=constr_CONST_2.
% 2.37/2.56  constr_CONST_1!=constr_CONST_3.
% 2.37/2.56  constr_CONST_1!=constr_CONST_4.
% 2.37/2.56  constr_CONST_1!=name_A.
% 2.37/2.56  constr_CONST_1!=name_B.
% 2.37/2.56  constr_CONST_1!=name_I.
% 2.37/2.56  constr_CONST_1!=name_c.
% 2.37/2.56  constr_CONST_1!=name_objective.
% 2.37/2.56  constr_CONST_1!=name_skA.
% 2.37/2.56  constr_CONST_1!=name_skB.
% 2.37/2.56  constr_CONST_1!=name_skS.
% 2.37/2.56  constr_CONST_2!=constr_CONST_3.
% 2.37/2.56  constr_CONST_2!=constr_CONST_4.
% 2.37/2.56  constr_CONST_2!=name_A.
% 2.37/2.56  constr_CONST_2!=name_B.
% 2.37/2.56  constr_CONST_2!=name_I.
% 2.37/2.56  constr_CONST_2!=name_c.
% 2.37/2.56  constr_CONST_2!=name_objective.
% 2.37/2.56  constr_CONST_2!=name_skA.
% 2.37/2.56  constr_CONST_2!=name_skB.
% 2.37/2.56  constr_CONST_2!=name_skS.
% 2.37/2.56  constr_CONST_3!=constr_CONST_4.
% 2.37/2.56  constr_CONST_3!=name_A.
% 2.37/2.56  constr_CONST_3!=name_B.
% 2.37/2.56  constr_CONST_3!=name_I.
% 2.37/2.56  constr_CONST_3!=name_c.
% 2.37/2.56  constr_CONST_3!=name_objective.
% 2.37/2.56  constr_CONST_3!=name_skA.
% 2.37/2.56  constr_CONST_3!=name_skB.
% 2.37/2.56  constr_CONST_3!=name_skS.
% 2.37/2.56  constr_CONST_4!=name_A.
% 2.37/2.56  constr_CONST_4!=name_B.
% 2.37/2.56  constr_CONST_4!=name_I.
% 2.37/2.56  constr_CONST_4!=name_c.
% 2.37/2.56  constr_CONST_4!=name_objective.
% 2.37/2.56  constr_CONST_4!=name_skA.
% 2.37/2.56  constr_CONST_4!=name_skB.
% 2.37/2.56  constr_CONST_4!=name_skS.
% 2.37/2.56  name_A!=name_B.
% 2.37/2.56  name_A!=name_I.
% 2.37/2.56  name_A!=name_c.
% 2.37/2.56  name_A!=name_objective.
% 2.37/2.56  name_A!=name_skA.
% 2.37/2.56  name_A!=name_skB.
% 2.37/2.56  name_A!=name_skS.
% 2.37/2.56  name_B!=name_I.
% 2.37/2.56  name_B!=name_c.
% 2.37/2.56  name_B!=name_objective.
% 2.37/2.56  name_B!=name_skA.
% 2.37/2.56  name_B!=name_skB.
% 2.37/2.56  name_B!=name_skS.
% 2.37/2.56  name_I!=name_c.
% 2.37/2.56  name_I!=name_objective.
% 2.37/2.56  name_I!=name_skA.
% 2.37/2.56  name_I!=name_skB.
% 2.37/2.56  name_I!=name_skS.
% 2.37/2.56  name_c!=name_objective.
% 2.37/2.56  name_c!=name_skA.
% 2.37/2.56  name_c!=name_skB.
% 2.37/2.56  name_c!=name_skS.
% 2.37/2.56  name_objective!=name_skA.
% 2.37/2.56  name_objective!=name_skB.
% 2.37/2.56  name_objective!=name_skS.
% 2.37/2.56  name_skA!=name_skB.
% 2.37/2.56  name_skA!=name_skS.
% 2.37/2.56  name_skB!=name_skS.
% 2.37/2.56  all VAR_K_48 VAR_M_47 (constr_dec(constr_enc(VAR_M_47,VAR_K_48),VAR_K_48)=VAR_M_47).
% 2.37/2.56  all VAR_K_46 VAR_M_45 (constr_getmess(constr_sign(VAR_M_45,VAR_K_46))=VAR_M_45).
% 2.37/2.56  all VAR_K_44 VAR_M_0X30 (constr_checksign(constr_sign(VAR_M_0X30,VAR_K_44),constr_pkey(VAR_K_44))=VAR_M_0X30).
% 2.37/2.56  all VAR_K_43 VAR_X1_39 VAR_X2_40X30 VAR_X3_41 VAR_X4_42 (constr_ecb_dec_4(constr_ecb_enc_4(VAR_X1_39,VAR_X2_40X30,VAR_X3_41,VAR_X4_42,constr_pkey(VAR_K_43)),VAR_K_43)=tuple_4(VAR_X1_39,VAR_X2_40X30,VAR_X3_41,VAR_X4_42)).
% 2.37/2.56  all VAR_K_38 VAR_X1_35 VAR_X2_36 VAR_X3_37 (constr_ecb_dec_3(constr_ecb_enc_3(VAR_X1_35,VAR_X2_36,VAR_X3_37,constr_pkey(VAR_K_38)),VAR_K_38)=tuple_3(VAR_X1_35,VAR_X2_36,VAR_X3_37)).
% 2.37/2.56  all VAR_K_34 VAR_X1_32 VAR_X2_33 (constr_ecb_dec_2(constr_ecb_enc_2(VAR_X1_32,VAR_X2_33,constr_pkey(VAR_K_34)),VAR_K_34)=tuple_2(VAR_X1_32,VAR_X2_33)).
% 2.37/2.56  all VAR_K_31 VAR_X1_30X30 (constr_ecb_dec_1(constr_ecb_enc_1(VAR_X1_30X30,constr_pkey(VAR_K_31)),VAR_K_31)=VAR_X1_30X30).
% 2.37/2.56  all VAR_K_29 VAR_X1_26 VAR_X2_27 VAR_X3_28 VAR_X4_0X30 (constr_ecb_enc_4(VAR_X1_26,VAR_X2_27,VAR_X3_28,VAR_X4_0X30,VAR_K_29)=tuple_4(constr_ecb_enc_1(VAR_X1_26,VAR_K_29),constr_ecb_enc_1(VAR_X2_27,VAR_K_29),constr_ecb_enc_1(VAR_X3_28,VAR_K_29),constr_ecb_enc_1(VAR_X4_0X30,VAR_K_29))).
% 2.37/2.56  all VAR_K_25 VAR_X1_23 VAR_X2_24 VAR_X3_0X30 (constr_ecb_enc_3(VAR_X1_23,VAR_X2_24,VAR_X3_0X30,VAR_K_25)=tuple_3(constr_ecb_enc_1(VAR_X1_23,VAR_K_25),constr_ecb_enc_1(VAR_X2_24,VAR_K_25),constr_ecb_enc_1(VAR_X3_0X30,VAR_K_25))).
% 2.37/2.56  all VAR_K_0X30 VAR_X1_21 VAR_X2_22 (constr_ecb_enc_2(VAR_X1_21,VAR_X2_22,VAR_K_0X30)=tuple_2(constr_ecb_enc_1(VAR_X1_21,VAR_K_0X30),constr_ecb_enc_1(VAR_X2_22,VAR_K_0X30))).
% 2.37/2.56  all VAR_X0X30_18 VAR_X1_19 VAR_X2_20X30 (constr_tuple_3_get_1_bitstring(tuple_3(VAR_X0X30_18,VAR_X1_19,VAR_X2_20X30))=VAR_X1_19).
% 2.37/2.56  all VAR_X0X30_16 VAR_X1_17 (constr_tuple_2_get_1_bitstring(tuple_2(VAR_X0X30_16,VAR_X1_17))=VAR_X1_17).
% 2.37/2.56  all VAR_X0X30_14 VAR_X1_15 (constr_tuple_2_get_0x30_bitstring(tuple_2(VAR_X0X30_14,VAR_X1_15))=VAR_X0X30_14).
% 2.37/2.56  all VAR_X0X30_11 VAR_X1_12 VAR_X2_13 (constr_tuple_3_get_2(tuple_3(VAR_X0X30_11,VAR_X1_12,VAR_X2_13))=VAR_X2_13).
% 2.37/2.56  all VAR_X0X30_9 VAR_X1_10X30 VAR_X2_0X30 (constr_tuple_3_get_0x30(tuple_3(VAR_X0X30_9,VAR_X1_10X30,VAR_X2_0X30))=VAR_X0X30_9).
% 2.37/2.56  all VAR_X0X30_7 VAR_X1_8 (constr_tuple_2_get_1(tuple_2(VAR_X0X30_7,VAR_X1_8))=VAR_X1_8).
% 2.37/2.56  all VAR_X0X30_0X30 VAR_X1_0X30 (constr_tuple_2_get_0x30(tuple_2(VAR_X0X30_0X30,VAR_X1_0X30))=VAR_X0X30_0X30).
% 2.37/2.56  all VAR_X_66 VAR_Y_67 pred_e_q_bitstring_bitstring(VAR_X_66,VAR_Y_67).
% 2.37/2.56  all VAR_V_73 (pred_attacker(VAR_V_73)->pred_attacker(constr_tuple_3_get_2(VAR_V_73))).
% 2.37/2.56  all VAR_V_75 (pred_attacker(VAR_V_75)->pred_attacker(constr_tuple_3_get_1_bitstring(VAR_V_75))).
% 2.37/2.56  all VAR_V_77 (pred_attacker(VAR_V_77)->pred_attacker(constr_tuple_3_get_0x30(VAR_V_77))).
% 2.37/2.56  all VAR_V_79 (pred_attacker(VAR_V_79)->pred_attacker(constr_tuple_2_get_1_bitstring(VAR_V_79))).
% 2.37/2.56  all VAR_V_81 (pred_attacker(VAR_V_81)->pred_attacker(constr_tuple_2_get_1(VAR_V_81))).
% 2.37/2.56  all VAR_V_83 (pred_attacker(VAR_V_83)->pred_attacker(constr_tuple_2_get_0x30_bitstring(VAR_V_83))).
% 2.37/2.56  all VAR_V_85 (pred_attacker(VAR_V_85)->pred_attacker(constr_tuple_2_get_0x30(VAR_V_85))).
% 2.37/2.56  pred_attacker(tuple_true).
% 2.37/2.56  all VAR_V_88 VAR_V_89 (pred_attacker(VAR_V_88)&pred_attacker(VAR_V_89)->pred_attacker(constr_sign(VAR_V_88,VAR_V_89))).
% 2.37/2.56  all VAR_V_91 (pred_attacker(VAR_V_91)->pred_attacker(constr_pkey(VAR_V_91))).
% 2.37/2.56  all VAR_V_93 (pred_attacker(VAR_V_93)->pred_attacker(tuple_out_3(VAR_V_93))).
% 2.37/2.56  all VAR_V_96 (pred_attacker(tuple_out_3(VAR_V_96))->pred_attacker(VAR_V_96)).
% 2.37/2.56  all VAR_V_99 (pred_attacker(VAR_V_99)->pred_attacker(tuple_out_2(VAR_V_99))).
% 2.37/2.56  all VAR_V_10X302 (pred_attacker(tuple_out_2(VAR_V_10X302))->pred_attacker(VAR_V_10X302)).
% 2.37/2.56  all VAR_V_10X305 (pred_attacker(VAR_V_10X305)->pred_attacker(tuple_out_1(VAR_V_10X305))).
% 2.37/2.56  all VAR_V_10X308 (pred_attacker(tuple_out_1(VAR_V_10X308))->pred_attacker(VAR_V_10X308)).
% 2.37/2.56  all VAR_V_112 (pred_attacker(VAR_V_112)->pred_attacker(tuple_key_retrieval_server_out_2(VAR_V_112))).
% 2.37/2.56  all VAR_V_115 (pred_attacker(tuple_key_retrieval_server_out_2(VAR_V_115))->pred_attacker(VAR_V_115)).
% 2.37/2.56  all VAR_V_119 VAR_V_120X30 (pred_attacker(VAR_V_119)&pred_attacker(VAR_V_120X30)->pred_attacker(tuple_key_retrieval_server_in_1(VAR_V_119,VAR_V_120X30))).
% 2.37/2.56  all VAR_V_127 VAR_V_128 (pred_attacker(tuple_key_retrieval_server_in_1(VAR_V_127,VAR_V_128))->pred_attacker(VAR_V_127)).
% 2.37/2.56  all VAR_V_130X30 VAR_V_131 (pred_attacker(tuple_key_retrieval_server_in_1(VAR_V_130X30,VAR_V_131))->pred_attacker(VAR_V_131)).
% 2.37/2.56  all VAR_V_135 VAR_V_136 (pred_attacker(VAR_V_135)&pred_attacker(VAR_V_136)->pred_attacker(tuple_key_register_server_in_1(VAR_V_135,VAR_V_136))).
% 2.37/2.56  all VAR_V_143 VAR_V_144 (pred_attacker(tuple_key_register_server_in_1(VAR_V_143,VAR_V_144))->pred_attacker(VAR_V_143)).
% 2.37/2.56  all VAR_V_146 VAR_V_147 (pred_attacker(tuple_key_register_server_in_1(VAR_V_146,VAR_V_147))->pred_attacker(VAR_V_147)).
% 2.37/2.56  all VAR_V_150X30 (pred_attacker(VAR_V_150X30)->pred_attacker(constr_getmess(VAR_V_150X30))).
% 2.37/2.56  pred_attacker(tuple_false).
% 2.37/2.56  all VAR_V_153 VAR_V_154 (pred_attacker(VAR_V_153)&pred_attacker(VAR_V_154)->pred_attacker(constr_enc(VAR_V_153,VAR_V_154))).
% 2.37/2.56  all VAR_V_160X30 VAR_V_161 VAR_V_162 VAR_V_163 VAR_V_164 (pred_attacker(VAR_V_160X30)&pred_attacker(VAR_V_161)&pred_attacker(VAR_V_162)&pred_attacker(VAR_V_163)&pred_attacker(VAR_V_164)->pred_attacker(constr_ecb_enc_4(VAR_V_160X30,VAR_V_161,VAR_V_162,VAR_V_163,VAR_V_164))).
% 2.37/2.56  all VAR_V_169 VAR_V_170X30 VAR_V_171 VAR_V_172 (pred_attacker(VAR_V_169)&pred_attacker(VAR_V_170X30)&pred_attacker(VAR_V_171)&pred_attacker(VAR_V_172)->pred_attacker(constr_ecb_enc_3(VAR_V_169,VAR_V_170X30,VAR_V_171,VAR_V_172))).
% 2.37/2.56  all VAR_V_176 VAR_V_177 VAR_V_178 (pred_attacker(VAR_V_176)&pred_attacker(VAR_V_177)&pred_attacker(VAR_V_178)->pred_attacker(constr_ecb_enc_2(VAR_V_176,VAR_V_177,VAR_V_178))).
% 2.37/2.56  all VAR_V_181 VAR_V_182 (pred_attacker(VAR_V_181)&pred_attacker(VAR_V_182)->pred_attacker(constr_ecb_enc_1(VAR_V_181,VAR_V_182))).
% 2.37/2.56  all VAR_V_185 VAR_V_186 (pred_attacker(VAR_V_185)&pred_attacker(VAR_V_186)->pred_attacker(constr_ecb_dec_4(VAR_V_185,VAR_V_186))).
% 2.37/2.56  all VAR_V_189 VAR_V_190X30 (pred_attacker(VAR_V_189)&pred_attacker(VAR_V_190X30)->pred_attacker(constr_ecb_dec_3(VAR_V_189,VAR_V_190X30))).
% 2.37/2.56  all VAR_V_193 VAR_V_194 (pred_attacker(VAR_V_193)&pred_attacker(VAR_V_194)->pred_attacker(constr_ecb_dec_2(VAR_V_193,VAR_V_194))).
% 2.37/2.56  all VAR_V_197 VAR_V_198 (pred_attacker(VAR_V_197)&pred_attacker(VAR_V_198)->pred_attacker(constr_ecb_dec_1(VAR_V_197,VAR_V_198))).
% 2.37/2.56  all VAR_V_20X301 VAR_V_20X302 (pred_attacker(VAR_V_20X301)&pred_attacker(VAR_V_20X302)->pred_attacker(constr_dec(VAR_V_20X301,VAR_V_20X302))).
% 2.37/2.56  all VAR_V_20X304 (pred_attacker(VAR_V_20X304)->pred_attacker(tuple_client_B_out_6(VAR_V_20X304))).
% 2.37/2.56  all VAR_V_20X307 (pred_attacker(tuple_client_B_out_6(VAR_V_20X307))->pred_attacker(VAR_V_20X307)).
% 2.37/2.56  all VAR_V_210X30 (pred_attacker(VAR_V_210X30)->pred_attacker(tuple_client_B_out_4(VAR_V_210X30))).
% 2.37/2.56  all VAR_V_213 (pred_attacker(tuple_client_B_out_4(VAR_V_213))->pred_attacker(VAR_V_213)).
% 2.37/2.56  all VAR_V_217 VAR_V_218 (pred_attacker(VAR_V_217)&pred_attacker(VAR_V_218)->pred_attacker(tuple_client_B_out_1(VAR_V_217,VAR_V_218))).
% 2.37/2.56  all VAR_V_225 VAR_V_226 (pred_attacker(tuple_client_B_out_1(VAR_V_225,VAR_V_226))->pred_attacker(VAR_V_225)).
% 2.37/2.56  all VAR_V_228 VAR_V_229 (pred_attacker(tuple_client_B_out_1(VAR_V_228,VAR_V_229))->pred_attacker(VAR_V_229)).
% 2.37/2.56  all VAR_V_232 (pred_attacker(VAR_V_232)->pred_attacker(tuple_client_B_in_5(VAR_V_232))).
% 2.37/2.56  all VAR_V_235 (pred_attacker(tuple_client_B_in_5(VAR_V_235))->pred_attacker(VAR_V_235)).
% 2.37/2.56  all VAR_V_238 (pred_attacker(VAR_V_238)->pred_attacker(tuple_client_B_in_3(VAR_V_238))).
% 2.37/2.56  all VAR_V_241 (pred_attacker(tuple_client_B_in_3(VAR_V_241))->pred_attacker(VAR_V_241)).
% 2.37/2.56  all VAR_V_244 (pred_attacker(VAR_V_244)->pred_attacker(tuple_client_B_in_2(VAR_V_244))).
% 2.37/2.56  all VAR_V_247 (pred_attacker(tuple_client_B_in_2(VAR_V_247))->pred_attacker(VAR_V_247)).
% 2.37/2.56  all VAR_V_250X30 (pred_attacker(VAR_V_250X30)->pred_attacker(tuple_client_A_out_5(VAR_V_250X30))).
% 2.37/2.56  all VAR_V_253 (pred_attacker(tuple_client_A_out_5(VAR_V_253))->pred_attacker(VAR_V_253)).
% 2.37/2.56  all VAR_V_256 (pred_attacker(VAR_V_256)->pred_attacker(tuple_client_A_out_3(VAR_V_256))).
% 2.37/2.56  all VAR_V_259 (pred_attacker(tuple_client_A_out_3(VAR_V_259))->pred_attacker(VAR_V_259)).
% 2.37/2.56  all VAR_V_263 VAR_V_264 (pred_attacker(VAR_V_263)&pred_attacker(VAR_V_264)->pred_attacker(tuple_client_A_out_1(VAR_V_263,VAR_V_264))).
% 2.37/2.56  all VAR_V_271 VAR_V_272 (pred_attacker(tuple_client_A_out_1(VAR_V_271,VAR_V_272))->pred_attacker(VAR_V_271)).
% 2.37/2.56  all VAR_V_274 VAR_V_275 (pred_attacker(tuple_client_A_out_1(VAR_V_274,VAR_V_275))->pred_attacker(VAR_V_275)).
% 2.37/2.56  all VAR_V_278 (pred_attacker(VAR_V_278)->pred_attacker(tuple_client_A_in_4(VAR_V_278))).
% 2.37/2.56  all VAR_V_281 (pred_attacker(tuple_client_A_in_4(VAR_V_281))->pred_attacker(VAR_V_281)).
% 2.37/2.56  all VAR_V_284 (pred_attacker(VAR_V_284)->pred_attacker(tuple_client_A_in_2(VAR_V_284))).
% 2.37/2.56  all VAR_V_287 (pred_attacker(tuple_client_A_in_2(VAR_V_287))->pred_attacker(VAR_V_287)).
% 2.37/2.56  all VAR_V_291 VAR_V_292 (pred_attacker(VAR_V_291)&pred_attacker(VAR_V_292)->pred_attacker(constr_checksign(VAR_V_291,VAR_V_292))).
% 2.37/2.56  pred_attacker(constr_CONST_4).
% 2.37/2.56  pred_attacker(constr_CONST_3).
% 2.37/2.56  pred_attacker(constr_CONST_2).
% 2.37/2.56  pred_attacker(constr_CONST_1).
% 2.37/2.56  pred_attacker(constr_CONST_0x30).
% 2.37/2.56  all VAR_V_30X301 VAR_V_30X302 VAR_V_30X303 VAR_V_30X304 (pred_attacker(VAR_V_30X301)&pred_attacker(VAR_V_30X302)&pred_attacker(VAR_V_30X303)&pred_attacker(VAR_V_30X304)->pred_attacker(tuple_4(VAR_V_30X301,VAR_V_30X302,VAR_V_30X303,VAR_V_30X304))).
% 2.37/2.56  all VAR_V_325 VAR_V_326 VAR_V_327 VAR_V_328 (pred_attacker(tuple_4(VAR_V_325,VAR_V_326,VAR_V_327,VAR_V_328))->pred_attacker(VAR_V_325)).
% 2.37/2.56  all VAR_V_330X30 VAR_V_331 VAR_V_332 VAR_V_333 (pred_attacker(tuple_4(VAR_V_330X30,VAR_V_331,VAR_V_332,VAR_V_333))->pred_attacker(VAR_V_331)).
% 2.37/2.56  all VAR_V_335 VAR_V_336 VAR_V_337 VAR_V_338 (pred_attacker(tuple_4(VAR_V_335,VAR_V_336,VAR_V_337,VAR_V_338))->pred_attacker(VAR_V_337)).
% 2.37/2.56  all VAR_V_340X30 VAR_V_341 VAR_V_342 VAR_V_343 (pred_attacker(tuple_4(VAR_V_340X30,VAR_V_341,VAR_V_342,VAR_V_343))->pred_attacker(VAR_V_343)).
% 2.37/2.56  all VAR_V_348 VAR_V_349 VAR_V_350X30 (pred_attacker(VAR_V_348)&pred_attacker(VAR_V_349)&pred_attacker(VAR_V_350X30)->pred_attacker(tuple_3(VAR_V_348,VAR_V_349,VAR_V_350X30))).
% 2.37/2.56  all VAR_V_363 VAR_V_364 VAR_V_365 (pred_attacker(tuple_3(VAR_V_363,VAR_V_364,VAR_V_365))->pred_attacker(VAR_V_363)).
% 2.37/2.56  all VAR_V_367 VAR_V_368 VAR_V_369 (pred_attacker(tuple_3(VAR_V_367,VAR_V_368,VAR_V_369))->pred_attacker(VAR_V_368)).
% 2.37/2.56  all VAR_V_371 VAR_V_372 VAR_V_373 (pred_attacker(tuple_3(VAR_V_371,VAR_V_372,VAR_V_373))->pred_attacker(VAR_V_373)).
% 2.37/2.56  all VAR_V_377 VAR_V_378 (pred_attacker(VAR_V_377)&pred_attacker(VAR_V_378)->pred_attacker(tuple_2(VAR_V_377,VAR_V_378))).
% 2.37/2.56  all VAR_V_385 VAR_V_386 (pred_attacker(tuple_2(VAR_V_385,VAR_V_386))->pred_attacker(VAR_V_385)).
% 2.37/2.56  all VAR_V_388 VAR_V_389 (pred_attacker(tuple_2(VAR_V_388,VAR_V_389))->pred_attacker(VAR_V_389)).
% 2.37/2.56  all VAR_V_391 VAR_V_392 (pred_mess(VAR_V_392,VAR_V_391)&pred_attacker(VAR_V_392)->pred_attacker(VAR_V_391)).
% 2.37/2.56  all VAR_V_393 VAR_V_394 (pred_attacker(VAR_V_394)&pred_attacker(VAR_V_393)->pred_mess(VAR_V_394,VAR_V_393)).
% 2.37/2.56  pred_attacker(name_c).
% 2.37/2.56  pred_attacker(name_I).
% 2.37/2.56  pred_attacker(name_B).
% 2.37/2.56  pred_attacker(name_A).
% 2.37/2.56  all VAR_V_396 pred_e_qual(VAR_V_396,VAR_V_396).
% 2.37/2.56  all VAR_V_397 pred_attacker(name_new0x2Dname(VAR_V_397)).
% 2.37/2.56  pred_table(tuple_keys(name_A,constr_pkey(name_skA))).
% 2.37/2.56  pred_table(tuple_keys(name_B,constr_pkey(name_skB))).
% 2.37/2.56  pred_attacker(tuple_out_1(constr_pkey(name_skA))).
% 2.37/2.56  pred_attacker(tuple_out_2(constr_pkey(name_skB))).
% 2.37/2.56  pred_attacker(tuple_out_3(constr_pkey(name_skS))).
% 2.37/2.56  pred_attacker(tuple_client_A_out_1(name_A,name_I)).
% 2.37/2.56  all VAR_0X40SID_513 VAR_SIGN_I_PKI_512 (pred_e_q_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(VAR_SIGN_I_PKI_512,constr_pkey(name_skS))))&pred_attacker(tuple_client_A_in_2(VAR_SIGN_I_PKI_512))->pred_attacker(tuple_client_A_out_3(constr_ecb_enc_2(name_Na(VAR_0X40SID_513),name_A,constr_tuple_2_get_1_bitstring(constr_checksign(VAR_SIGN_I_PKI_512,constr_pkey(name_skS))))))).
% 2.37/2.56  all VAR_0X40SID_578 VAR_ECB_ENC_NA_NI_I_577 VAR_SIGN_I_PKI_579 (pred_e_q_bitstring_bitstring(name_I,constr_tuple_3_get_2(constr_ecb_dec_3(VAR_ECB_ENC_NA_NI_I_577,name_skA)))&pred_e_q_bitstring_bitstring(name_Na(VAR_0X40SID_578),constr_tuple_3_get_0x30(constr_ecb_dec_3(VAR_ECB_ENC_NA_NI_I_577,name_skA)))&pred_attacker(tuple_client_A_in_4(VAR_ECB_ENC_NA_NI_I_577))&pred_e_q_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(VAR_SIGN_I_PKI_579,constr_pkey(name_skS))))&pred_attacker(tuple_client_A_in_2(VAR_SIGN_I_PKI_579))->pred_attacker(tuple_client_A_out_5(constr_ecb_enc_1(constr_tuple_3_get_1_bitstring(constr_ecb_dec_3(VAR_ECB_ENC_NA_NI_I_577,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(VAR_SIGN_I_PKI_579,constr_pkey(name_skS))))))).
% 2.37/2.56  pred_attacker(tuple_client_B_out_1(name_B,name_A)).
% 2.37/2.56  all VAR_0X40SID_688 VAR_ECB_ENC_NA_A_686 VAR_SIGN_A_PKA_687 (pred_e_q_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(VAR_ECB_ENC_NA_A_686,name_skB)))&pred_attacker(tuple_client_B_in_3(VAR_ECB_ENC_NA_A_686))&pred_e_q_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(VAR_SIGN_A_PKA_687,constr_pkey(name_skS))))&pred_attacker(tuple_client_B_in_2(VAR_SIGN_A_PKA_687))->pred_attacker(tuple_client_B_out_4(constr_ecb_enc_3(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(VAR_ECB_ENC_NA_A_686,name_skB)),name_Nb(VAR_0X40SID_688),name_B,constr_tuple_2_get_1_bitstring(constr_checksign(VAR_SIGN_A_PKA_687,constr_pkey(name_skS))))))).
% 2.37/2.56  all VAR_0X40SID_718 VAR_ECB_ENC_NA_A_720X30 VAR_ECB_ENC_NB_719 VAR_SIGN_A_PKA_721 (pred_e_q_bitstring_bitstring(name_Nb(VAR_0X40SID_718),constr_ecb_dec_1(VAR_ECB_ENC_NB_719,name_skB))&pred_attacker(tuple_client_B_in_5(VAR_ECB_ENC_NB_719))&pred_e_q_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(VAR_ECB_ENC_NA_A_720X30,name_skB)))&pred_attacker(tuple_client_B_in_3(VAR_ECB_ENC_NA_A_720X30))&pred_e_q_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(VAR_SIGN_A_PKA_721,constr_pkey(name_skS))))&pred_attacker(tuple_client_B_in_2(VAR_SIGN_A_PKA_721))->pred_attacker(tuple_client_B_out_6(name_objective))).
% 2.37/2.56  all VAR_DST_760X30 VAR_PKDST_761 VAR_SRC_762 (pred_table(tuple_keys(VAR_DST_760X30,VAR_PKDST_761))&pred_attacker(tuple_key_retrieval_server_in_1(VAR_SRC_762,VAR_DST_760X30))->pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(VAR_DST_760X30,VAR_PKDST_761),name_skS)))).
% 2.37/2.56  all VAR_HOST_814 VAR_PK_815 (VAR_HOST_814!=name_B&VAR_HOST_814!=name_A&pred_attacker(tuple_key_register_server_in_1(VAR_HOST_814,VAR_PK_815))->pred_table(tuple_keys(VAR_HOST_814,VAR_PK_815))).
% 2.37/2.56  -(all VAR_V_823 pred_attacker(tuple_2(name_Nb(VAR_V_823),name_objective))).
% 2.37/2.56  end_of_list.
% 2.37/2.56  
% 2.37/2.56  -------> usable clausifies to:
% 2.37/2.56  
% 2.37/2.56  list(usable).
% 2.37/2.56  0 [] A=A.
% 2.37/2.56  0 [] constr_CONST_0x30!=constr_CONST_1.
% 2.37/2.56  0 [] constr_CONST_0x30!=constr_CONST_2.
% 2.37/2.56  0 [] constr_CONST_0x30!=constr_CONST_3.
% 2.37/2.56  0 [] constr_CONST_0x30!=constr_CONST_4.
% 2.37/2.56  0 [] constr_CONST_0x30!=name_A.
% 2.37/2.56  0 [] constr_CONST_0x30!=name_B.
% 2.37/2.56  0 [] constr_CONST_0x30!=name_I.
% 2.37/2.56  0 [] constr_CONST_0x30!=name_c.
% 2.37/2.56  0 [] constr_CONST_0x30!=name_objective.
% 2.37/2.56  0 [] constr_CONST_0x30!=name_skA.
% 2.37/2.56  0 [] constr_CONST_0x30!=name_skB.
% 2.37/2.56  0 [] constr_CONST_0x30!=name_skS.
% 2.37/2.56  0 [] constr_CONST_1!=constr_CONST_2.
% 2.37/2.56  0 [] constr_CONST_1!=constr_CONST_3.
% 2.37/2.56  0 [] constr_CONST_1!=constr_CONST_4.
% 2.37/2.56  0 [] constr_CONST_1!=name_A.
% 2.37/2.56  0 [] constr_CONST_1!=name_B.
% 2.37/2.56  0 [] constr_CONST_1!=name_I.
% 2.37/2.56  0 [] constr_CONST_1!=name_c.
% 2.37/2.56  0 [] constr_CONST_1!=name_objective.
% 2.37/2.56  0 [] constr_CONST_1!=name_skA.
% 2.37/2.56  0 [] constr_CONST_1!=name_skB.
% 2.37/2.56  0 [] constr_CONST_1!=name_skS.
% 2.37/2.56  0 [] constr_CONST_2!=constr_CONST_3.
% 2.37/2.56  0 [] constr_CONST_2!=constr_CONST_4.
% 2.37/2.56  0 [] constr_CONST_2!=name_A.
% 2.37/2.56  0 [] constr_CONST_2!=name_B.
% 2.37/2.56  0 [] constr_CONST_2!=name_I.
% 2.37/2.56  0 [] constr_CONST_2!=name_c.
% 2.37/2.56  0 [] constr_CONST_2!=name_objective.
% 2.37/2.56  0 [] constr_CONST_2!=name_skA.
% 2.37/2.56  0 [] constr_CONST_2!=name_skB.
% 2.37/2.56  0 [] constr_CONST_2!=name_skS.
% 2.37/2.56  0 [] constr_CONST_3!=constr_CONST_4.
% 2.37/2.56  0 [] constr_CONST_3!=name_A.
% 2.37/2.56  0 [] constr_CONST_3!=name_B.
% 2.37/2.56  0 [] constr_CONST_3!=name_I.
% 2.37/2.56  0 [] constr_CONST_3!=name_c.
% 2.37/2.56  0 [] constr_CONST_3!=name_objective.
% 2.37/2.56  0 [] constr_CONST_3!=name_skA.
% 2.37/2.56  0 [] constr_CONST_3!=name_skB.
% 2.37/2.56  0 [] constr_CONST_3!=name_skS.
% 2.37/2.56  0 [] constr_CONST_4!=name_A.
% 2.37/2.56  0 [] constr_CONST_4!=name_B.
% 2.37/2.56  0 [] constr_CONST_4!=name_I.
% 2.37/2.56  0 [] constr_CONST_4!=name_c.
% 2.37/2.56  0 [] constr_CONST_4!=name_objective.
% 2.37/2.56  0 [] constr_CONST_4!=name_skA.
% 2.37/2.56  0 [] constr_CONST_4!=name_skB.
% 2.37/2.56  0 [] constr_CONST_4!=name_skS.
% 2.37/2.56  0 [] name_A!=name_B.
% 2.37/2.56  0 [] name_A!=name_I.
% 2.37/2.56  0 [] name_A!=name_c.
% 2.37/2.56  0 [] name_A!=name_objective.
% 2.37/2.56  0 [] name_A!=name_skA.
% 2.37/2.56  0 [] name_A!=name_skB.
% 2.37/2.56  0 [] name_A!=name_skS.
% 2.37/2.56  0 [] name_B!=name_I.
% 2.37/2.56  0 [] name_B!=name_c.
% 2.37/2.56  0 [] name_B!=name_objective.
% 2.37/2.56  0 [] name_B!=name_skA.
% 2.37/2.56  0 [] name_B!=name_skB.
% 2.37/2.56  0 [] name_B!=name_skS.
% 2.37/2.56  0 [] name_I!=name_c.
% 2.37/2.56  0 [] name_I!=name_objective.
% 2.37/2.56  0 [] name_I!=name_skA.
% 2.37/2.56  0 [] name_I!=name_skB.
% 2.37/2.56  0 [] name_I!=name_skS.
% 2.37/2.56  0 [] name_c!=name_objective.
% 2.37/2.56  0 [] name_c!=name_skA.
% 2.37/2.56  0 [] name_c!=name_skB.
% 2.37/2.56  0 [] name_c!=name_skS.
% 2.37/2.56  0 [] name_objective!=name_skA.
% 2.37/2.56  0 [] name_objective!=name_skB.
% 2.37/2.56  0 [] name_objective!=name_skS.
% 2.37/2.56  0 [] name_skA!=name_skB.
% 2.37/2.56  0 [] name_skA!=name_skS.
% 2.37/2.56  0 [] name_skB!=name_skS.
% 2.37/2.56  0 [] constr_dec(constr_enc(VAR_M_47,VAR_K_48),VAR_K_48)=VAR_M_47.
% 2.37/2.56  0 [] constr_getmess(constr_sign(VAR_M_45,VAR_K_46))=VAR_M_45.
% 2.37/2.56  0 [] constr_checksign(constr_sign(VAR_M_0X30,VAR_K_44),constr_pkey(VAR_K_44))=VAR_M_0X30.
% 2.37/2.56  0 [] constr_ecb_dec_4(constr_ecb_enc_4(VAR_X1_39,VAR_X2_40X30,VAR_X3_41,VAR_X4_42,constr_pkey(VAR_K_43)),VAR_K_43)=tuple_4(VAR_X1_39,VAR_X2_40X30,VAR_X3_41,VAR_X4_42).
% 2.37/2.56  0 [] constr_ecb_dec_3(constr_ecb_enc_3(VAR_X1_35,VAR_X2_36,VAR_X3_37,constr_pkey(VAR_K_38)),VAR_K_38)=tuple_3(VAR_X1_35,VAR_X2_36,VAR_X3_37).
% 2.37/2.56  0 [] constr_ecb_dec_2(constr_ecb_enc_2(VAR_X1_32,VAR_X2_33,constr_pkey(VAR_K_34)),VAR_K_34)=tuple_2(VAR_X1_32,VAR_X2_33).
% 2.37/2.56  0 [] constr_ecb_dec_1(constr_ecb_enc_1(VAR_X1_30X30,constr_pkey(VAR_K_31)),VAR_K_31)=VAR_X1_30X30.
% 2.37/2.56  0 [] constr_ecb_enc_4(VAR_X1_26,VAR_X2_27,VAR_X3_28,VAR_X4_0X30,VAR_K_29)=tuple_4(constr_ecb_enc_1(VAR_X1_26,VAR_K_29),constr_ecb_enc_1(VAR_X2_27,VAR_K_29),constr_ecb_enc_1(VAR_X3_28,VAR_K_29),constr_ecb_enc_1(VAR_X4_0X30,VAR_K_29)).
% 2.45/2.56  0 [] constr_ecb_enc_3(VAR_X1_23,VAR_X2_24,VAR_X3_0X30,VAR_K_25)=tuple_3(constr_ecb_enc_1(VAR_X1_23,VAR_K_25),constr_ecb_enc_1(VAR_X2_24,VAR_K_25),constr_ecb_enc_1(VAR_X3_0X30,VAR_K_25)).
% 2.45/2.56  0 [] constr_ecb_enc_2(VAR_X1_21,VAR_X2_22,VAR_K_0X30)=tuple_2(constr_ecb_enc_1(VAR_X1_21,VAR_K_0X30),constr_ecb_enc_1(VAR_X2_22,VAR_K_0X30)).
% 2.45/2.56  0 [] constr_tuple_3_get_1_bitstring(tuple_3(VAR_X0X30_18,VAR_X1_19,VAR_X2_20X30))=VAR_X1_19.
% 2.45/2.56  0 [] constr_tuple_2_get_1_bitstring(tuple_2(VAR_X0X30_16,VAR_X1_17))=VAR_X1_17.
% 2.45/2.56  0 [] constr_tuple_2_get_0x30_bitstring(tuple_2(VAR_X0X30_14,VAR_X1_15))=VAR_X0X30_14.
% 2.45/2.56  0 [] constr_tuple_3_get_2(tuple_3(VAR_X0X30_11,VAR_X1_12,VAR_X2_13))=VAR_X2_13.
% 2.45/2.56  0 [] constr_tuple_3_get_0x30(tuple_3(VAR_X0X30_9,VAR_X1_10X30,VAR_X2_0X30))=VAR_X0X30_9.
% 2.45/2.56  0 [] constr_tuple_2_get_1(tuple_2(VAR_X0X30_7,VAR_X1_8))=VAR_X1_8.
% 2.45/2.56  0 [] constr_tuple_2_get_0x30(tuple_2(VAR_X0X30_0X30,VAR_X1_0X30))=VAR_X0X30_0X30.
% 2.45/2.56  0 [] pred_e_q_bitstring_bitstring(VAR_X_66,VAR_Y_67).
% 2.45/2.56  0 [] -pred_attacker(VAR_V_73)|pred_attacker(constr_tuple_3_get_2(VAR_V_73)).
% 2.45/2.56  0 [] -pred_attacker(VAR_V_75)|pred_attacker(constr_tuple_3_get_1_bitstring(VAR_V_75)).
% 2.45/2.56  0 [] -pred_attacker(VAR_V_77)|pred_attacker(constr_tuple_3_get_0x30(VAR_V_77)).
% 2.45/2.56  0 [] -pred_attacker(VAR_V_79)|pred_attacker(constr_tuple_2_get_1_bitstring(VAR_V_79)).
% 2.45/2.56  0 [] -pred_attacker(VAR_V_81)|pred_attacker(constr_tuple_2_get_1(VAR_V_81)).
% 2.45/2.56  0 [] -pred_attacker(VAR_V_83)|pred_attacker(constr_tuple_2_get_0x30_bitstring(VAR_V_83)).
% 2.45/2.56  0 [] -pred_attacker(VAR_V_85)|pred_attacker(constr_tuple_2_get_0x30(VAR_V_85)).
% 2.45/2.56  0 [] pred_attacker(tuple_true).
% 2.45/2.56  0 [] -pred_attacker(VAR_V_88)| -pred_attacker(VAR_V_89)|pred_attacker(constr_sign(VAR_V_88,VAR_V_89)).
% 2.45/2.56  0 [] -pred_attacker(VAR_V_91)|pred_attacker(constr_pkey(VAR_V_91)).
% 2.45/2.56  0 [] -pred_attacker(VAR_V_93)|pred_attacker(tuple_out_3(VAR_V_93)).
% 2.45/2.56  0 [] -pred_attacker(tuple_out_3(VAR_V_96))|pred_attacker(VAR_V_96).
% 2.45/2.56  0 [] -pred_attacker(VAR_V_99)|pred_attacker(tuple_out_2(VAR_V_99)).
% 2.45/2.56  0 [] -pred_attacker(tuple_out_2(VAR_V_10X302))|pred_attacker(VAR_V_10X302).
% 2.45/2.56  0 [] -pred_attacker(VAR_V_10X305)|pred_attacker(tuple_out_1(VAR_V_10X305)).
% 2.45/2.56  0 [] -pred_attacker(tuple_out_1(VAR_V_10X308))|pred_attacker(VAR_V_10X308).
% 2.45/2.56  0 [] -pred_attacker(VAR_V_112)|pred_attacker(tuple_key_retrieval_server_out_2(VAR_V_112)).
% 2.45/2.56  0 [] -pred_attacker(tuple_key_retrieval_server_out_2(VAR_V_115))|pred_attacker(VAR_V_115).
% 2.45/2.56  0 [] -pred_attacker(VAR_V_119)| -pred_attacker(VAR_V_120X30)|pred_attacker(tuple_key_retrieval_server_in_1(VAR_V_119,VAR_V_120X30)).
% 2.45/2.56  0 [] -pred_attacker(tuple_key_retrieval_server_in_1(VAR_V_127,VAR_V_128))|pred_attacker(VAR_V_127).
% 2.45/2.56  0 [] -pred_attacker(tuple_key_retrieval_server_in_1(VAR_V_130X30,VAR_V_131))|pred_attacker(VAR_V_131).
% 2.45/2.56  0 [] -pred_attacker(VAR_V_135)| -pred_attacker(VAR_V_136)|pred_attacker(tuple_key_register_server_in_1(VAR_V_135,VAR_V_136)).
% 2.45/2.56  0 [] -pred_attacker(tuple_key_register_server_in_1(VAR_V_143,VAR_V_144))|pred_attacker(VAR_V_143).
% 2.45/2.56  0 [] -pred_attacker(tuple_key_register_server_in_1(VAR_V_146,VAR_V_147))|pred_attacker(VAR_V_147).
% 2.45/2.56  0 [] -pred_attacker(VAR_V_150X30)|pred_attacker(constr_getmess(VAR_V_150X30)).
% 2.45/2.56  0 [] pred_attacker(tuple_false).
% 2.45/2.56  0 [] -pred_attacker(VAR_V_153)| -pred_attacker(VAR_V_154)|pred_attacker(constr_enc(VAR_V_153,VAR_V_154)).
% 2.45/2.56  0 [] -pred_attacker(VAR_V_160X30)| -pred_attacker(VAR_V_161)| -pred_attacker(VAR_V_162)| -pred_attacker(VAR_V_163)| -pred_attacker(VAR_V_164)|pred_attacker(constr_ecb_enc_4(VAR_V_160X30,VAR_V_161,VAR_V_162,VAR_V_163,VAR_V_164)).
% 2.45/2.56  0 [] -pred_attacker(VAR_V_169)| -pred_attacker(VAR_V_170X30)| -pred_attacker(VAR_V_171)| -pred_attacker(VAR_V_172)|pred_attacker(constr_ecb_enc_3(VAR_V_169,VAR_V_170X30,VAR_V_171,VAR_V_172)).
% 2.45/2.56  0 [] -pred_attacker(VAR_V_176)| -pred_attacker(VAR_V_177)| -pred_attacker(VAR_V_178)|pred_attacker(constr_ecb_enc_2(VAR_V_176,VAR_V_177,VAR_V_178)).
% 2.45/2.56  0 [] -pred_attacker(VAR_V_181)| -pred_attacker(VAR_V_182)|pred_attacker(constr_ecb_enc_1(VAR_V_181,VAR_V_182)).
% 2.45/2.56  0 [] -pred_attacker(VAR_V_185)| -pred_attacker(VAR_V_186)|pred_attacker(constr_ecb_dec_4(VAR_V_185,VAR_V_186)).
% 2.45/2.56  0 [] -pred_attacker(VAR_V_189)| -pred_attacker(VAR_V_190X30)|pred_attacker(constr_ecb_dec_3(VAR_V_189,VAR_V_190X30)).
% 2.45/2.56  0 [] -pred_attacker(VAR_V_193)| -pred_attacker(VAR_V_194)|pred_attacker(constr_ecb_dec_2(VAR_V_193,VAR_V_194)).
% 2.45/2.56  0 [] -pred_attacker(VAR_V_197)| -pred_attacker(VAR_V_198)|pred_attacker(constr_ecb_dec_1(VAR_V_197,VAR_V_198)).
% 2.45/2.56  0 [] -pred_attacker(VAR_V_20X301)| -pred_attacker(VAR_V_20X302)|pred_attacker(constr_dec(VAR_V_20X301,VAR_V_20X302)).
% 2.45/2.56  0 [] -pred_attacker(VAR_V_20X304)|pred_attacker(tuple_client_B_out_6(VAR_V_20X304)).
% 2.45/2.56  0 [] -pred_attacker(tuple_client_B_out_6(VAR_V_20X307))|pred_attacker(VAR_V_20X307).
% 2.45/2.56  0 [] -pred_attacker(VAR_V_210X30)|pred_attacker(tuple_client_B_out_4(VAR_V_210X30)).
% 2.45/2.56  0 [] -pred_attacker(tuple_client_B_out_4(VAR_V_213))|pred_attacker(VAR_V_213).
% 2.45/2.56  0 [] -pred_attacker(VAR_V_217)| -pred_attacker(VAR_V_218)|pred_attacker(tuple_client_B_out_1(VAR_V_217,VAR_V_218)).
% 2.45/2.56  0 [] -pred_attacker(tuple_client_B_out_1(VAR_V_225,VAR_V_226))|pred_attacker(VAR_V_225).
% 2.45/2.56  0 [] -pred_attacker(tuple_client_B_out_1(VAR_V_228,VAR_V_229))|pred_attacker(VAR_V_229).
% 2.45/2.56  0 [] -pred_attacker(VAR_V_232)|pred_attacker(tuple_client_B_in_5(VAR_V_232)).
% 2.45/2.56  0 [] -pred_attacker(tuple_client_B_in_5(VAR_V_235))|pred_attacker(VAR_V_235).
% 2.45/2.56  0 [] -pred_attacker(VAR_V_238)|pred_attacker(tuple_client_B_in_3(VAR_V_238)).
% 2.45/2.56  0 [] -pred_attacker(tuple_client_B_in_3(VAR_V_241))|pred_attacker(VAR_V_241).
% 2.45/2.56  0 [] -pred_attacker(VAR_V_244)|pred_attacker(tuple_client_B_in_2(VAR_V_244)).
% 2.45/2.56  0 [] -pred_attacker(tuple_client_B_in_2(VAR_V_247))|pred_attacker(VAR_V_247).
% 2.45/2.56  0 [] -pred_attacker(VAR_V_250X30)|pred_attacker(tuple_client_A_out_5(VAR_V_250X30)).
% 2.45/2.56  0 [] -pred_attacker(tuple_client_A_out_5(VAR_V_253))|pred_attacker(VAR_V_253).
% 2.45/2.56  0 [] -pred_attacker(VAR_V_256)|pred_attacker(tuple_client_A_out_3(VAR_V_256)).
% 2.45/2.56  0 [] -pred_attacker(tuple_client_A_out_3(VAR_V_259))|pred_attacker(VAR_V_259).
% 2.45/2.56  0 [] -pred_attacker(VAR_V_263)| -pred_attacker(VAR_V_264)|pred_attacker(tuple_client_A_out_1(VAR_V_263,VAR_V_264)).
% 2.45/2.56  0 [] -pred_attacker(tuple_client_A_out_1(VAR_V_271,VAR_V_272))|pred_attacker(VAR_V_271).
% 2.45/2.56  0 [] -pred_attacker(tuple_client_A_out_1(VAR_V_274,VAR_V_275))|pred_attacker(VAR_V_275).
% 2.45/2.56  0 [] -pred_attacker(VAR_V_278)|pred_attacker(tuple_client_A_in_4(VAR_V_278)).
% 2.45/2.56  0 [] -pred_attacker(tuple_client_A_in_4(VAR_V_281))|pred_attacker(VAR_V_281).
% 2.45/2.56  0 [] -pred_attacker(VAR_V_284)|pred_attacker(tuple_client_A_in_2(VAR_V_284)).
% 2.45/2.56  0 [] -pred_attacker(tuple_client_A_in_2(VAR_V_287))|pred_attacker(VAR_V_287).
% 2.45/2.56  0 [] -pred_attacker(VAR_V_291)| -pred_attacker(VAR_V_292)|pred_attacker(constr_checksign(VAR_V_291,VAR_V_292)).
% 2.45/2.56  0 [] pred_attacker(constr_CONST_4).
% 2.45/2.56  0 [] pred_attacker(constr_CONST_3).
% 2.45/2.56  0 [] pred_attacker(constr_CONST_2).
% 2.45/2.56  0 [] pred_attacker(constr_CONST_1).
% 2.45/2.56  0 [] pred_attacker(constr_CONST_0x30).
% 2.45/2.56  0 [] -pred_attacker(VAR_V_30X301)| -pred_attacker(VAR_V_30X302)| -pred_attacker(VAR_V_30X303)| -pred_attacker(VAR_V_30X304)|pred_attacker(tuple_4(VAR_V_30X301,VAR_V_30X302,VAR_V_30X303,VAR_V_30X304)).
% 2.45/2.56  0 [] -pred_attacker(tuple_4(VAR_V_325,VAR_V_326,VAR_V_327,VAR_V_328))|pred_attacker(VAR_V_325).
% 2.45/2.56  0 [] -pred_attacker(tuple_4(VAR_V_330X30,VAR_V_331,VAR_V_332,VAR_V_333))|pred_attacker(VAR_V_331).
% 2.45/2.56  0 [] -pred_attacker(tuple_4(VAR_V_335,VAR_V_336,VAR_V_337,VAR_V_338))|pred_attacker(VAR_V_337).
% 2.45/2.56  0 [] -pred_attacker(tuple_4(VAR_V_340X30,VAR_V_341,VAR_V_342,VAR_V_343))|pred_attacker(VAR_V_343).
% 2.45/2.56  0 [] -pred_attacker(VAR_V_348)| -pred_attacker(VAR_V_349)| -pred_attacker(VAR_V_350X30)|pred_attacker(tuple_3(VAR_V_348,VAR_V_349,VAR_V_350X30)).
% 2.45/2.56  0 [] -pred_attacker(tuple_3(VAR_V_363,VAR_V_364,VAR_V_365))|pred_attacker(VAR_V_363).
% 2.45/2.56  0 [] -pred_attacker(tuple_3(VAR_V_367,VAR_V_368,VAR_V_369))|pred_attacker(VAR_V_368).
% 2.45/2.56  0 [] -pred_attacker(tuple_3(VAR_V_371,VAR_V_372,VAR_V_373))|pred_attacker(VAR_V_373).
% 2.45/2.56  0 [] -pred_attacker(VAR_V_377)| -pred_attacker(VAR_V_378)|pred_attacker(tuple_2(VAR_V_377,VAR_V_378)).
% 2.45/2.56  0 [] -pred_attacker(tuple_2(VAR_V_385,VAR_V_386))|pred_attacker(VAR_V_385).
% 2.45/2.56  0 [] -pred_attacker(tuple_2(VAR_V_388,VAR_V_389))|pred_attacker(VAR_V_389).
% 2.45/2.57  0 [] -pred_mess(VAR_V_392,VAR_V_391)| -pred_attacker(VAR_V_392)|pred_attacker(VAR_V_391).
% 2.45/2.57  0 [] -pred_attacker(VAR_V_394)| -pred_attacker(VAR_V_393)|pred_mess(VAR_V_394,VAR_V_393).
% 2.45/2.57  0 [] pred_attacker(name_c).
% 2.45/2.57  0 [] pred_attacker(name_I).
% 2.45/2.57  0 [] pred_attacker(name_B).
% 2.45/2.57  0 [] pred_attacker(name_A).
% 2.45/2.57  0 [] pred_e_qual(VAR_V_396,VAR_V_396).
% 2.45/2.57  0 [] pred_attacker(name_new0x2Dname(VAR_V_397)).
% 2.45/2.57  0 [] pred_table(tuple_keys(name_A,constr_pkey(name_skA))).
% 2.45/2.57  0 [] pred_table(tuple_keys(name_B,constr_pkey(name_skB))).
% 2.45/2.57  0 [] pred_attacker(tuple_out_1(constr_pkey(name_skA))).
% 2.45/2.57  0 [] pred_attacker(tuple_out_2(constr_pkey(name_skB))).
% 2.45/2.57  0 [] pred_attacker(tuple_out_3(constr_pkey(name_skS))).
% 2.45/2.57  0 [] pred_attacker(tuple_client_A_out_1(name_A,name_I)).
% 2.45/2.57  0 [] -pred_e_q_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(VAR_SIGN_I_PKI_512,constr_pkey(name_skS))))| -pred_attacker(tuple_client_A_in_2(VAR_SIGN_I_PKI_512))|pred_attacker(tuple_client_A_out_3(constr_ecb_enc_2(name_Na(VAR_0X40SID_513),name_A,constr_tuple_2_get_1_bitstring(constr_checksign(VAR_SIGN_I_PKI_512,constr_pkey(name_skS)))))).
% 2.45/2.57  0 [] -pred_e_q_bitstring_bitstring(name_I,constr_tuple_3_get_2(constr_ecb_dec_3(VAR_ECB_ENC_NA_NI_I_577,name_skA)))| -pred_e_q_bitstring_bitstring(name_Na(VAR_0X40SID_578),constr_tuple_3_get_0x30(constr_ecb_dec_3(VAR_ECB_ENC_NA_NI_I_577,name_skA)))| -pred_attacker(tuple_client_A_in_4(VAR_ECB_ENC_NA_NI_I_577))| -pred_e_q_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(VAR_SIGN_I_PKI_579,constr_pkey(name_skS))))| -pred_attacker(tuple_client_A_in_2(VAR_SIGN_I_PKI_579))|pred_attacker(tuple_client_A_out_5(constr_ecb_enc_1(constr_tuple_3_get_1_bitstring(constr_ecb_dec_3(VAR_ECB_ENC_NA_NI_I_577,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(VAR_SIGN_I_PKI_579,constr_pkey(name_skS)))))).
% 2.45/2.57  0 [] pred_attacker(tuple_client_B_out_1(name_B,name_A)).
% 2.45/2.57  0 [] -pred_e_q_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(VAR_ECB_ENC_NA_A_686,name_skB)))| -pred_attacker(tuple_client_B_in_3(VAR_ECB_ENC_NA_A_686))| -pred_e_q_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(VAR_SIGN_A_PKA_687,constr_pkey(name_skS))))| -pred_attacker(tuple_client_B_in_2(VAR_SIGN_A_PKA_687))|pred_attacker(tuple_client_B_out_4(constr_ecb_enc_3(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(VAR_ECB_ENC_NA_A_686,name_skB)),name_Nb(VAR_0X40SID_688),name_B,constr_tuple_2_get_1_bitstring(constr_checksign(VAR_SIGN_A_PKA_687,constr_pkey(name_skS)))))).
% 2.45/2.57  0 [] -pred_e_q_bitstring_bitstring(name_Nb(VAR_0X40SID_718),constr_ecb_dec_1(VAR_ECB_ENC_NB_719,name_skB))| -pred_attacker(tuple_client_B_in_5(VAR_ECB_ENC_NB_719))| -pred_e_q_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(VAR_ECB_ENC_NA_A_720X30,name_skB)))| -pred_attacker(tuple_client_B_in_3(VAR_ECB_ENC_NA_A_720X30))| -pred_e_q_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(VAR_SIGN_A_PKA_721,constr_pkey(name_skS))))| -pred_attacker(tuple_client_B_in_2(VAR_SIGN_A_PKA_721))|pred_attacker(tuple_client_B_out_6(name_objective)).
% 2.45/2.57  0 [] -pred_table(tuple_keys(VAR_DST_760X30,VAR_PKDST_761))| -pred_attacker(tuple_key_retrieval_server_in_1(VAR_SRC_762,VAR_DST_760X30))|pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(VAR_DST_760X30,VAR_PKDST_761),name_skS))).
% 2.45/2.57  0 [] VAR_HOST_814=name_B|VAR_HOST_814=name_A| -pred_attacker(tuple_key_register_server_in_1(VAR_HOST_814,VAR_PK_815))|pred_table(tuple_keys(VAR_HOST_814,VAR_PK_815)).
% 2.45/2.57  0 [] -pred_attacker(tuple_2(name_Nb($c1),name_objective)).
% 2.45/2.57  end_of_list.
% 2.45/2.57  
% 2.45/2.57  SCAN INPUT: prop=0, horn=0, equality=1, symmetry=0, max_lits=7.
% 2.45/2.57  
% 2.45/2.57  This ia a non-Horn set with equality.  The strategy will be
% 2.45/2.57  Knuth-Bendix, ordered hyper_res, factoring, and unit
% 2.45/2.57  deletion, with positive clauses in sos and nonpositive
% 2.45/2.57  clauses in usable.
% 2.45/2.57  
% 2.45/2.57     dependent: set(knuth_bendix).
% 2.45/2.57     dependent: set(anl_eq).
% 2.45/2.57     dependent: set(para_from).
% 2.45/2.57     dependent: set(para_into).
% 2.45/2.57     dependent: clear(para_from_right).
% 2.45/2.57     dependent: clear(para_into_right).
% 2.45/2.57     dependent: set(para_from_vars).
% 2.45/2.57     dependent: set(eq_units_both_ways).
% 2.45/2.57     dependent: set(dynamic_demod_all).
% 2.45/2.57     dependent: set(dynamic_demod).
% 2.45/2.57     dependent: set(order_eq).
% 2.45/2.57     dependent: set(back_demod).
% 2.45/2.57     dependent: set(lrpo).
% 2.45/2.57     dependent: set(hyper_res).
% 2.45/2.57     dependent: set(unit_deletion).
% 2.45/2.57     dependent: set(factor).
% 2.45/2.57  
% 2.45/2.57  ------------> process usable:
% 2.45/2.57  ** KEPT (pick-wt=3): 2 [copy,1,flip.1] constr_CONST_1!=constr_CONST_0x30.
% 2.45/2.57  ** KEPT (pick-wt=3): 4 [copy,3,flip.1] constr_CONST_2!=constr_CONST_0x30.
% 2.45/2.57  ** KEPT (pick-wt=3): 6 [copy,5,flip.1] constr_CONST_3!=constr_CONST_0x30.
% 2.45/2.57  ** KEPT (pick-wt=3): 8 [copy,7,flip.1] constr_CONST_4!=constr_CONST_0x30.
% 2.45/2.57  ** KEPT (pick-wt=3): 10 [copy,9,flip.1] name_A!=constr_CONST_0x30.
% 2.45/2.57  ** KEPT (pick-wt=3): 12 [copy,11,flip.1] name_B!=constr_CONST_0x30.
% 2.45/2.57  ** KEPT (pick-wt=3): 14 [copy,13,flip.1] name_I!=constr_CONST_0x30.
% 2.45/2.57  ** KEPT (pick-wt=3): 16 [copy,15,flip.1] name_c!=constr_CONST_0x30.
% 2.45/2.57  ** KEPT (pick-wt=3): 18 [copy,17,flip.1] name_objective!=constr_CONST_0x30.
% 2.45/2.57  ** KEPT (pick-wt=3): 20 [copy,19,flip.1] name_skA!=constr_CONST_0x30.
% 2.45/2.57  ** KEPT (pick-wt=3): 22 [copy,21,flip.1] name_skB!=constr_CONST_0x30.
% 2.45/2.57  ** KEPT (pick-wt=3): 24 [copy,23,flip.1] name_skS!=constr_CONST_0x30.
% 2.45/2.57  ** KEPT (pick-wt=3): 26 [copy,25,flip.1] constr_CONST_2!=constr_CONST_1.
% 2.45/2.57  ** KEPT (pick-wt=3): 28 [copy,27,flip.1] constr_CONST_3!=constr_CONST_1.
% 2.45/2.57  ** KEPT (pick-wt=3): 30 [copy,29,flip.1] constr_CONST_4!=constr_CONST_1.
% 2.45/2.57  ** KEPT (pick-wt=3): 32 [copy,31,flip.1] name_A!=constr_CONST_1.
% 2.45/2.57  ** KEPT (pick-wt=3): 34 [copy,33,flip.1] name_B!=constr_CONST_1.
% 2.45/2.57  ** KEPT (pick-wt=3): 36 [copy,35,flip.1] name_I!=constr_CONST_1.
% 2.45/2.57  ** KEPT (pick-wt=3): 38 [copy,37,flip.1] name_c!=constr_CONST_1.
% 2.45/2.57  ** KEPT (pick-wt=3): 40 [copy,39,flip.1] name_objective!=constr_CONST_1.
% 2.45/2.57  ** KEPT (pick-wt=3): 42 [copy,41,flip.1] name_skA!=constr_CONST_1.
% 2.45/2.57  ** KEPT (pick-wt=3): 44 [copy,43,flip.1] name_skB!=constr_CONST_1.
% 2.45/2.57  ** KEPT (pick-wt=3): 46 [copy,45,flip.1] name_skS!=constr_CONST_1.
% 2.45/2.57  ** KEPT (pick-wt=3): 48 [copy,47,flip.1] constr_CONST_3!=constr_CONST_2.
% 2.45/2.57  ** KEPT (pick-wt=3): 50 [copy,49,flip.1] constr_CONST_4!=constr_CONST_2.
% 2.45/2.57  ** KEPT (pick-wt=3): 52 [copy,51,flip.1] name_A!=constr_CONST_2.
% 2.45/2.57  ** KEPT (pick-wt=3): 54 [copy,53,flip.1] name_B!=constr_CONST_2.
% 2.45/2.57  ** KEPT (pick-wt=3): 56 [copy,55,flip.1] name_I!=constr_CONST_2.
% 2.45/2.57  ** KEPT (pick-wt=3): 58 [copy,57,flip.1] name_c!=constr_CONST_2.
% 2.45/2.57  ** KEPT (pick-wt=3): 60 [copy,59,flip.1] name_objective!=constr_CONST_2.
% 2.45/2.57  ** KEPT (pick-wt=3): 62 [copy,61,flip.1] name_skA!=constr_CONST_2.
% 2.45/2.57  ** KEPT (pick-wt=3): 64 [copy,63,flip.1] name_skB!=constr_CONST_2.
% 2.45/2.57  ** KEPT (pick-wt=3): 66 [copy,65,flip.1] name_skS!=constr_CONST_2.
% 2.45/2.57  ** KEPT (pick-wt=3): 68 [copy,67,flip.1] constr_CONST_4!=constr_CONST_3.
% 2.45/2.57  ** KEPT (pick-wt=3): 70 [copy,69,flip.1] name_A!=constr_CONST_3.
% 2.45/2.57  ** KEPT (pick-wt=3): 72 [copy,71,flip.1] name_B!=constr_CONST_3.
% 2.45/2.57  ** KEPT (pick-wt=3): 74 [copy,73,flip.1] name_I!=constr_CONST_3.
% 2.45/2.57  ** KEPT (pick-wt=3): 76 [copy,75,flip.1] name_c!=constr_CONST_3.
% 2.45/2.57  ** KEPT (pick-wt=3): 78 [copy,77,flip.1] name_objective!=constr_CONST_3.
% 2.45/2.57  ** KEPT (pick-wt=3): 80 [copy,79,flip.1] name_skA!=constr_CONST_3.
% 2.45/2.57  ** KEPT (pick-wt=3): 82 [copy,81,flip.1] name_skB!=constr_CONST_3.
% 2.45/2.57  ** KEPT (pick-wt=3): 84 [copy,83,flip.1] name_skS!=constr_CONST_3.
% 2.45/2.57  ** KEPT (pick-wt=3): 86 [copy,85,flip.1] name_A!=constr_CONST_4.
% 2.45/2.57  ** KEPT (pick-wt=3): 88 [copy,87,flip.1] name_B!=constr_CONST_4.
% 2.45/2.57  ** KEPT (pick-wt=3): 90 [copy,89,flip.1] name_I!=constr_CONST_4.
% 2.45/2.57  ** KEPT (pick-wt=3): 92 [copy,91,flip.1] name_c!=constr_CONST_4.
% 2.45/2.57  ** KEPT (pick-wt=3): 94 [copy,93,flip.1] name_objective!=constr_CONST_4.
% 2.45/2.57  ** KEPT (pick-wt=3): 96 [copy,95,flip.1] name_skA!=constr_CONST_4.
% 2.45/2.57  ** KEPT (pick-wt=3): 98 [copy,97,flip.1] name_skB!=constr_CONST_4.
% 2.45/2.57  ** KEPT (pick-wt=3): 100 [copy,99,flip.1] name_skS!=constr_CONST_4.
% 2.45/2.57  ** KEPT (pick-wt=3): 102 [copy,101,flip.1] name_B!=name_A.
% 2.45/2.57  ** KEPT (pick-wt=3): 104 [copy,103,flip.1] name_I!=name_A.
% 2.45/2.57  ** KEPT (pick-wt=3): 106 [copy,105,flip.1] name_c!=name_A.
% 2.45/2.57  ** KEPT (pick-wt=3): 108 [copy,107,flip.1] name_objective!=name_A.
% 2.45/2.57  ** KEPT (pick-wt=3): 110 [copy,109,flip.1] name_skA!=name_A.
% 2.45/2.57  ** KEPT (pick-wt=3): 112 [copy,111,flip.1] name_skB!=name_A.
% 2.45/2.57  ** KEPT (pick-wt=3): 114 [copy,113,flip.1] name_skS!=name_A.
% 2.45/2.57  ** KEPT (pick-wt=3): 116 [copy,115,flip.1] name_I!=name_B.
% 2.45/2.57  ** KEPT (pick-wt=3): 118 [copy,117,flip.1] name_c!=name_B.
% 2.45/2.57  ** KEPT (pick-wt=3): 120 [copy,119,flip.1] name_objective!=name_B.
% 2.45/2.57  ** KEPT (pick-wt=3): 122 [copy,121,flip.1] name_skA!=name_B.
% 2.45/2.57  ** KEPT (pick-wt=3): 124 [copy,123,flip.1] name_skB!=name_B.
% 2.45/2.57  ** KEPT (pick-wt=3): 126 [copy,125,flip.1] name_skS!=name_B.
% 2.45/2.57  ** KEPT (pick-wt=3): 128 [copy,127,flip.1] name_c!=name_I.
% 2.45/2.57  ** KEPT (pick-wt=3): 130 [copy,129,flip.1] name_objective!=name_I.
% 2.45/2.57  ** KEPT (pick-wt=3): 132 [copy,131,flip.1] name_skA!=name_I.
% 2.45/2.57  ** KEPT (pick-wt=3): 134 [copy,133,flip.1] name_skB!=name_I.
% 2.45/2.57  ** KEPT (pick-wt=3): 136 [copy,135,flip.1] name_skS!=name_I.
% 2.45/2.57  ** KEPT (pick-wt=3): 138 [copy,137,flip.1] name_objective!=name_c.
% 2.45/2.57  ** KEPT (pick-wt=3): 140 [copy,139,flip.1] name_skA!=name_c.
% 2.45/2.57  ** KEPT (pick-wt=3): 142 [copy,141,flip.1] name_skB!=name_c.
% 2.45/2.57  ** KEPT (pick-wt=3): 144 [copy,143,flip.1] name_skS!=name_c.
% 2.45/2.57  ** KEPT (pick-wt=3): 146 [copy,145,flip.1] name_skA!=name_objective.
% 2.45/2.57  ** KEPT (pick-wt=3): 148 [copy,147,flip.1] name_skB!=name_objective.
% 2.45/2.57  ** KEPT (pick-wt=3): 150 [copy,149,flip.1] name_skS!=name_objective.
% 2.45/2.57  ** KEPT (pick-wt=3): 152 [copy,151,flip.1] name_skB!=name_skA.
% 2.45/2.57  ** KEPT (pick-wt=3): 154 [copy,153,flip.1] name_skS!=name_skA.
% 2.45/2.57  ** KEPT (pick-wt=3): 156 [copy,155,flip.1] name_skS!=name_skB.
% 2.45/2.57  ** KEPT (pick-wt=5): 157 [] -pred_attacker(A)|pred_attacker(constr_tuple_3_get_2(A)).
% 2.45/2.57  ** KEPT (pick-wt=5): 158 [] -pred_attacker(A)|pred_attacker(constr_tuple_3_get_1_bitstring(A)).
% 2.45/2.57  ** KEPT (pick-wt=5): 159 [] -pred_attacker(A)|pred_attacker(constr_tuple_3_get_0x30(A)).
% 2.45/2.57  ** KEPT (pick-wt=5): 160 [] -pred_attacker(A)|pred_attacker(constr_tuple_2_get_1_bitstring(A)).
% 2.45/2.57  ** KEPT (pick-wt=5): 161 [] -pred_attacker(A)|pred_attacker(constr_tuple_2_get_1(A)).
% 2.45/2.57  ** KEPT (pick-wt=5): 162 [] -pred_attacker(A)|pred_attacker(constr_tuple_2_get_0x30_bitstring(A)).
% 2.45/2.57  ** KEPT (pick-wt=5): 163 [] -pred_attacker(A)|pred_attacker(constr_tuple_2_get_0x30(A)).
% 2.45/2.57  ** KEPT (pick-wt=8): 164 [] -pred_attacker(A)| -pred_attacker(B)|pred_attacker(constr_sign(A,B)).
% 2.45/2.57  ** KEPT (pick-wt=5): 165 [] -pred_attacker(A)|pred_attacker(constr_pkey(A)).
% 2.45/2.57  ** KEPT (pick-wt=5): 166 [] -pred_attacker(A)|pred_attacker(tuple_out_3(A)).
% 2.45/2.57  ** KEPT (pick-wt=5): 167 [] -pred_attacker(tuple_out_3(A))|pred_attacker(A).
% 2.45/2.57  ** KEPT (pick-wt=5): 168 [] -pred_attacker(A)|pred_attacker(tuple_out_2(A)).
% 2.45/2.57  ** KEPT (pick-wt=5): 169 [] -pred_attacker(tuple_out_2(A))|pred_attacker(A).
% 2.45/2.57  ** KEPT (pick-wt=5): 170 [] -pred_attacker(A)|pred_attacker(tuple_out_1(A)).
% 2.45/2.57  ** KEPT (pick-wt=5): 171 [] -pred_attacker(tuple_out_1(A))|pred_attacker(A).
% 2.45/2.57  ** KEPT (pick-wt=5): 172 [] -pred_attacker(A)|pred_attacker(tuple_key_retrieval_server_out_2(A)).
% 2.45/2.57  ** KEPT (pick-wt=5): 173 [] -pred_attacker(tuple_key_retrieval_server_out_2(A))|pred_attacker(A).
% 2.45/2.57  ** KEPT (pick-wt=8): 174 [] -pred_attacker(A)| -pred_attacker(B)|pred_attacker(tuple_key_retrieval_server_in_1(A,B)).
% 2.45/2.57  ** KEPT (pick-wt=6): 175 [] -pred_attacker(tuple_key_retrieval_server_in_1(A,B))|pred_attacker(A).
% 2.45/2.57  ** KEPT (pick-wt=6): 176 [] -pred_attacker(tuple_key_retrieval_server_in_1(A,B))|pred_attacker(B).
% 2.45/2.57  ** KEPT (pick-wt=8): 177 [] -pred_attacker(A)| -pred_attacker(B)|pred_attacker(tuple_key_register_server_in_1(A,B)).
% 2.45/2.57  ** KEPT (pick-wt=6): 178 [] -pred_attacker(tuple_key_register_server_in_1(A,B))|pred_attacker(A).
% 2.45/2.57  ** KEPT (pick-wt=6): 179 [] -pred_attacker(tuple_key_register_server_in_1(A,B))|pred_attacker(B).
% 2.45/2.57  ** KEPT (pick-wt=5): 180 [] -pred_attacker(A)|pred_attacker(constr_getmess(A)).
% 2.45/2.57  ** KEPT (pick-wt=8): 181 [] -pred_attacker(A)| -pred_attacker(B)|pred_attacker(constr_enc(A,B)).
% 2.45/2.57  ** KEPT (pick-wt=17): 182 [] -pred_attacker(A)| -pred_attacker(B)| -pred_attacker(C)| -pred_attacker(D)| -pred_attacker(E)|pred_attacker(constr_ecb_enc_4(A,B,C,D,E)).
% 2.45/2.57  ** KEPT (pick-wt=14): 183 [] -pred_attacker(A)| -pred_attacker(B)| -pred_attacker(C)| -pred_attacker(D)|pred_attacker(constr_ecb_enc_3(A,B,C,D)).
% 2.45/2.57  ** KEPT (pick-wt=11): 184 [] -pred_attacker(A)| -pred_attacker(B)| -pred_attacker(C)|pred_attacker(constr_ecb_enc_2(A,B,C)).
% 2.51/2.63  ** KEPT (pick-wt=8): 185 [] -pred_attacker(A)| -pred_attacker(B)|pred_attacker(constr_ecb_enc_1(A,B)).
% 2.51/2.63  ** KEPT (pick-wt=8): 186 [] -pred_attacker(A)| -pred_attacker(B)|pred_attacker(constr_ecb_dec_4(A,B)).
% 2.51/2.63  ** KEPT (pick-wt=8): 187 [] -pred_attacker(A)| -pred_attacker(B)|pred_attacker(constr_ecb_dec_3(A,B)).
% 2.51/2.63  ** KEPT (pick-wt=8): 188 [] -pred_attacker(A)| -pred_attacker(B)|pred_attacker(constr_ecb_dec_2(A,B)).
% 2.51/2.63  ** KEPT (pick-wt=8): 189 [] -pred_attacker(A)| -pred_attacker(B)|pred_attacker(constr_ecb_dec_1(A,B)).
% 2.51/2.63  ** KEPT (pick-wt=8): 190 [] -pred_attacker(A)| -pred_attacker(B)|pred_attacker(constr_dec(A,B)).
% 2.51/2.63  ** KEPT (pick-wt=5): 191 [] -pred_attacker(A)|pred_attacker(tuple_client_B_out_6(A)).
% 2.51/2.63  ** KEPT (pick-wt=5): 192 [] -pred_attacker(tuple_client_B_out_6(A))|pred_attacker(A).
% 2.51/2.63  ** KEPT (pick-wt=5): 193 [] -pred_attacker(A)|pred_attacker(tuple_client_B_out_4(A)).
% 2.51/2.63  ** KEPT (pick-wt=5): 194 [] -pred_attacker(tuple_client_B_out_4(A))|pred_attacker(A).
% 2.51/2.63  ** KEPT (pick-wt=8): 195 [] -pred_attacker(A)| -pred_attacker(B)|pred_attacker(tuple_client_B_out_1(A,B)).
% 2.51/2.63  ** KEPT (pick-wt=6): 196 [] -pred_attacker(tuple_client_B_out_1(A,B))|pred_attacker(A).
% 2.51/2.63  ** KEPT (pick-wt=6): 197 [] -pred_attacker(tuple_client_B_out_1(A,B))|pred_attacker(B).
% 2.51/2.63  ** KEPT (pick-wt=5): 198 [] -pred_attacker(A)|pred_attacker(tuple_client_B_in_5(A)).
% 2.51/2.63  ** KEPT (pick-wt=5): 199 [] -pred_attacker(tuple_client_B_in_5(A))|pred_attacker(A).
% 2.51/2.63  ** KEPT (pick-wt=5): 200 [] -pred_attacker(A)|pred_attacker(tuple_client_B_in_3(A)).
% 2.51/2.63  ** KEPT (pick-wt=5): 201 [] -pred_attacker(tuple_client_B_in_3(A))|pred_attacker(A).
% 2.51/2.63  ** KEPT (pick-wt=5): 202 [] -pred_attacker(A)|pred_attacker(tuple_client_B_in_2(A)).
% 2.51/2.63  ** KEPT (pick-wt=5): 203 [] -pred_attacker(tuple_client_B_in_2(A))|pred_attacker(A).
% 2.51/2.63  ** KEPT (pick-wt=5): 204 [] -pred_attacker(A)|pred_attacker(tuple_client_A_out_5(A)).
% 2.51/2.63  ** KEPT (pick-wt=5): 205 [] -pred_attacker(tuple_client_A_out_5(A))|pred_attacker(A).
% 2.51/2.63  ** KEPT (pick-wt=5): 206 [] -pred_attacker(A)|pred_attacker(tuple_client_A_out_3(A)).
% 2.51/2.63  ** KEPT (pick-wt=5): 207 [] -pred_attacker(tuple_client_A_out_3(A))|pred_attacker(A).
% 2.51/2.63  ** KEPT (pick-wt=8): 208 [] -pred_attacker(A)| -pred_attacker(B)|pred_attacker(tuple_client_A_out_1(A,B)).
% 2.51/2.63  ** KEPT (pick-wt=6): 209 [] -pred_attacker(tuple_client_A_out_1(A,B))|pred_attacker(A).
% 2.51/2.63  ** KEPT (pick-wt=6): 210 [] -pred_attacker(tuple_client_A_out_1(A,B))|pred_attacker(B).
% 2.51/2.63  ** KEPT (pick-wt=5): 211 [] -pred_attacker(A)|pred_attacker(tuple_client_A_in_4(A)).
% 2.51/2.63  ** KEPT (pick-wt=5): 212 [] -pred_attacker(tuple_client_A_in_4(A))|pred_attacker(A).
% 2.51/2.63  ** KEPT (pick-wt=5): 213 [] -pred_attacker(A)|pred_attacker(tuple_client_A_in_2(A)).
% 2.51/2.63  ** KEPT (pick-wt=5): 214 [] -pred_attacker(tuple_client_A_in_2(A))|pred_attacker(A).
% 2.51/2.63  ** KEPT (pick-wt=8): 215 [] -pred_attacker(A)| -pred_attacker(B)|pred_attacker(constr_checksign(A,B)).
% 2.51/2.63  ** KEPT (pick-wt=14): 216 [] -pred_attacker(A)| -pred_attacker(B)| -pred_attacker(C)| -pred_attacker(D)|pred_attacker(tuple_4(A,B,C,D)).
% 2.51/2.63  ** KEPT (pick-wt=8): 217 [] -pred_attacker(tuple_4(A,B,C,D))|pred_attacker(A).
% 2.51/2.63  ** KEPT (pick-wt=8): 218 [] -pred_attacker(tuple_4(A,B,C,D))|pred_attacker(B).
% 2.51/2.63  ** KEPT (pick-wt=8): 219 [] -pred_attacker(tuple_4(A,B,C,D))|pred_attacker(C).
% 2.51/2.63  ** KEPT (pick-wt=8): 220 [] -pred_attacker(tuple_4(A,B,C,D))|pred_attacker(D).
% 2.51/2.63  ** KEPT (pick-wt=11): 221 [] -pred_attacker(A)| -pred_attacker(B)| -pred_attacker(C)|pred_attacker(tuple_3(A,B,C)).
% 2.51/2.63  ** KEPT (pick-wt=7): 222 [] -pred_attacker(tuple_3(A,B,C))|pred_attacker(A).
% 2.51/2.63  ** KEPT (pick-wt=7): 223 [] -pred_attacker(tuple_3(A,B,C))|pred_attacker(B).
% 2.51/2.63  ** KEPT (pick-wt=7): 224 [] -pred_attacker(tuple_3(A,B,C))|pred_attacker(C).
% 2.51/2.63  ** KEPT (pick-wt=8): 225 [] -pred_attacker(A)| -pred_attacker(B)|pred_attacker(tuple_2(A,B)).
% 2.51/2.63  ** KEPT (pick-wt=6): 226 [] -pred_attacker(tuple_2(A,B))|pred_attacker(A).
% 2.51/2.63  ** KEPT (pick-wt=6): 227 [] -pred_attacker(tuple_2(A,B))|pred_attacker(B).
% 2.51/2.63  ** KEPT (pick-wt=7): 228 [] -pred_mess(A,B)| -pred_attacker(A)|pred_attacker(B).
% 2.51/2.63  ** KEPT (pick-wt=7): 229 [] -pred_attacker(A)| -pred_attacker(B)|pred_mess(A,B).
% 2.51/2.63  ** KEPT (pick-wt=21): 230 [] -pred_e_q_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(A,constr_pkey(name_skS))))| -pred_attacker(tuple_client_A_in_2(A))|pred_attacker(tuple_client_A_out_3(constr_ecb_enc_2(name_Na(B),name_A,constr_tuple_2_get_1_bitstring(constr_checksign(A,constr_pkey(name_skS)))))).
% 2.51/2.63  ** KEPT (pick-wt=38): 231 [] -pred_e_q_bitstring_bitstring(name_I,constr_tuple_3_get_2(constr_ecb_dec_3(A,name_skA)))| -pred_e_q_bitstring_bitstring(name_Na(B),constr_tuple_3_get_0x30(constr_ecb_dec_3(A,name_skA)))| -pred_attacker(tuple_client_A_in_4(A))| -pred_e_q_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(C,constr_pkey(name_skS))))| -pred_attacker(tuple_client_A_in_2(C))|pred_attacker(tuple_client_A_out_5(constr_ecb_enc_1(constr_tuple_3_get_1_bitstring(constr_ecb_dec_3(A,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(C,constr_pkey(name_skS)))))).
% 2.51/2.63  ** KEPT (pick-wt=34): 232 [] -pred_e_q_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(A,name_skB)))| -pred_attacker(tuple_client_B_in_3(A))| -pred_e_q_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(B,constr_pkey(name_skS))))| -pred_attacker(tuple_client_B_in_2(B))|pred_attacker(tuple_client_B_out_4(constr_ecb_enc_3(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(A,name_skB)),name_Nb(C),name_B,constr_tuple_2_get_1_bitstring(constr_checksign(B,constr_pkey(name_skS)))))).
% 2.51/2.63  ** KEPT (pick-wt=31): 233 [] -pred_e_q_bitstring_bitstring(name_Nb(A),constr_ecb_dec_1(B,name_skB))| -pred_attacker(tuple_client_B_in_5(B))| -pred_e_q_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(C,name_skB)))| -pred_attacker(tuple_client_B_in_3(C))| -pred_e_q_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(D,constr_pkey(name_skS))))| -pred_attacker(tuple_client_B_in_2(D))|pred_attacker(tuple_client_B_out_6(name_objective)).
% 2.51/2.63  ** KEPT (pick-wt=15): 234 [] -pred_table(tuple_keys(A,B))| -pred_attacker(tuple_key_retrieval_server_in_1(C,A))|pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(A,B),name_skS))).
% 2.51/2.63  ** KEPT (pick-wt=14): 235 [] A=name_B|A=name_A| -pred_attacker(tuple_key_register_server_in_1(A,B))|pred_table(tuple_keys(A,B)).
% 2.51/2.63  ** KEPT (pick-wt=5): 236 [] -pred_attacker(tuple_2(name_Nb($c1),name_objective)).
% 2.51/2.63  
% 2.51/2.63  ------------> process sos:
% 2.51/2.63  ** KEPT (pick-wt=3): 339 [] A=A.
% 2.51/2.63  ** KEPT (pick-wt=7): 340 [] constr_dec(constr_enc(A,B),B)=A.
% 2.51/2.63  ---> New Demodulator: 341 [new_demod,340] constr_dec(constr_enc(A,B),B)=A.
% 2.51/2.63  ** KEPT (pick-wt=6): 342 [] constr_getmess(constr_sign(A,B))=A.
% 2.51/2.63  ---> New Demodulator: 343 [new_demod,342] constr_getmess(constr_sign(A,B))=A.
% 2.51/2.63  ** KEPT (pick-wt=8): 344 [] constr_checksign(constr_sign(A,B),constr_pkey(B))=A.
% 2.51/2.63  ---> New Demodulator: 345 [new_demod,344] constr_checksign(constr_sign(A,B),constr_pkey(B))=A.
% 2.51/2.63  ** KEPT (pick-wt=15): 346 [] constr_ecb_dec_4(constr_ecb_enc_4(A,B,C,D,constr_pkey(E)),E)=tuple_4(A,B,C,D).
% 2.51/2.63  ---> New Demodulator: 347 [new_demod,346] constr_ecb_dec_4(constr_ecb_enc_4(A,B,C,D,constr_pkey(E)),E)=tuple_4(A,B,C,D).
% 2.51/2.63  ** KEPT (pick-wt=13): 348 [] constr_ecb_dec_3(constr_ecb_enc_3(A,B,C,constr_pkey(D)),D)=tuple_3(A,B,C).
% 2.51/2.63  ---> New Demodulator: 349 [new_demod,348] constr_ecb_dec_3(constr_ecb_enc_3(A,B,C,constr_pkey(D)),D)=tuple_3(A,B,C).
% 2.51/2.63  ** KEPT (pick-wt=11): 350 [] constr_ecb_dec_2(constr_ecb_enc_2(A,B,constr_pkey(C)),C)=tuple_2(A,B).
% 2.51/2.63  ** KEPT (pick-wt=8): 351 [] constr_ecb_dec_1(constr_ecb_enc_1(A,constr_pkey(B)),B)=A.
% 2.51/2.63  ---> New Demodulator: 352 [new_demod,351] constr_ecb_dec_1(constr_ecb_enc_1(A,constr_pkey(B)),B)=A.
% 2.51/2.63  ** KEPT (pick-wt=20): 354 [copy,353,flip.1] tuple_4(constr_ecb_enc_1(A,B),constr_ecb_enc_1(C,B),constr_ecb_enc_1(D,B),constr_ecb_enc_1(E,B))=constr_ecb_enc_4(A,C,D,E,B).
% 2.51/2.63  ---> New Demodulator: 355 [new_demod,354] tuple_4(constr_ecb_enc_1(A,B),constr_ecb_enc_1(C,B),constr_ecb_enc_1(D,B),constr_ecb_enc_1(E,B))=constr_ecb_enc_4(A,C,D,E,B).
% 2.51/2.63  ** KEPT (pick-wt=16): 357 [copy,356,flip.1] tuple_3(constr_ecb_enc_1(A,B),constr_ecb_enc_1(C,B),constr_ecb_enc_1(D,B))=constr_ecb_enc_3(A,C,D,B).
% 2.51/2.63  ---> New Demodulator: 358 [new_demod,357] tuple_3(constr_ecb_enc_1(A,B),constr_ecb_enc_1(C,B),constr_ecb_enc_1(Alarm clock 
% 299.92/300.08  Otter interrupted
% 299.92/300.08  PROOF NOT FOUND
%------------------------------------------------------------------------------