TSTP Solution File: SWW968+1 by iProver---3.8

View Problem - Process Solution

%------------------------------------------------------------------------------
% File     : iProver---3.8
% Problem  : SWW968+1 : TPTP v8.1.2. Released v7.4.0.
% Transfm  : none
% Format   : tptp:raw
% Command  : run_iprover %s %d THM

% Computer : n022.cluster.edu
% Model    : x86_64 x86_64
% CPU      : Intel(R) Xeon(R) CPU E5-2620 v4 2.10GHz
% Memory   : 8042.1875MB
% OS       : Linux 3.10.0-693.el7.x86_64
% CPULimit : 300s
% WCLimit  : 300s
% DateTime : Fri Sep  1 00:41:36 EDT 2023

% Result   : Theorem 3.81s 1.15s
% Output   : CNFRefutation 3.81s
% Verified : 
% SZS Type : Refutation
%            Derivation depth      :   25
%            Number of leaves      :   23
% Syntax   : Number of formulae    :  155 (  40 unt;   0 def)
%            Number of atoms       :  425 (  16 equ)
%            Maximal formula atoms :    9 (   2 avg)
%            Number of connectives :  489 ( 219   ~; 204   |;  36   &)
%                                         (   0 <=>;  30  =>;   0  <=;   0 <~>)
%            Maximal formula depth :   15 (   4 avg)
%            Maximal term depth    :    5 (   2 avg)
%            Number of predicates  :    8 (   6 usr;   5 prp; 0-2 aty)
%            Number of functors    :   34 (  34 usr;   8 con; 0-5 aty)
%            Number of variables   :  301 (  42 sgn; 179   !;   0   ?)

% Comments : 
%------------------------------------------------------------------------------
fof(f81,axiom,
    ! [X9,X10,X11] : constr_cbc_dec_2(constr_cbc_enc_2(X10,X11,X9),X9) = tuple_2(X10,X11),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax80) ).

fof(f84,axiom,
    ! [X19,X20,X21,X22,X23] : constr_cbc_4_get_2_prefixes(constr_cbc_enc_4(X20,X21,X22,X23,X19)) = constr_cbc_enc_2(X20,X21,X19),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax83) ).

fof(f89,axiom,
    ! [X40,X41] : constr_dec(constr_enc(X41,X40),X40) = X41,
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax88) ).

fof(f92,axiom,
    ! [X50,X51] : constr_tuple_2_get_0x30_bitstring(tuple_2(X50,X51)) = X50,
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax91) ).

fof(f96,axiom,
    ! [X62,X63] : pred_eq_bitstring_bitstring(X62,X63),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax95) ).

fof(f103,axiom,
    pred_attacker(tuple_true),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax102) ).

fof(f107,axiom,
    ! [X73] :
      ( pred_attacker(tuple_server_S_out_2(X73))
     => pred_attacker(X73) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax106) ).

fof(f108,axiom,
    ! [X74,X75,X76] :
      ( ( pred_attacker(X76)
        & pred_attacker(X75)
        & pred_attacker(X74) )
     => pred_attacker(tuple_server_S_in_1(X74,X75,X76)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax107) ).

fof(f114,axiom,
    ! [X88,X89] :
      ( ( pred_attacker(X89)
        & pred_attacker(X88) )
     => pred_attacker(constr_dec(X88,X89)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax113) ).

fof(f119,axiom,
    ! [X94] :
      ( pred_attacker(X94)
     => pred_attacker(tuple_client_B_in_1(X94)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax118) ).

fof(f122,axiom,
    ! [X97] :
      ( pred_attacker(tuple_client_A_out_9(X97))
     => pred_attacker(X97) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax121) ).

fof(f130,axiom,
    ! [X105] :
      ( pred_attacker(tuple_client_A_out_10(X105))
     => pred_attacker(X105) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax129) ).

fof(f135,axiom,
    ! [X118] :
      ( pred_attacker(X118)
     => pred_attacker(tuple_client_A_in_8(X118)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax134) ).

fof(f137,axiom,
    ! [X120] :
      ( pred_attacker(X120)
     => pred_attacker(tuple_client_A_in_6(X120)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax136) ).

fof(f139,axiom,
    ! [X122] :
      ( pred_attacker(X122)
     => pred_attacker(tuple_client_A_in_4(X122)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax138) ).

fof(f141,axiom,
    ! [X124] :
      ( pred_attacker(X124)
     => pred_attacker(tuple_client_A_in_2(X124)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax140) ).

fof(f152,axiom,
    ! [X149] :
      ( pred_attacker(X149)
     => pred_attacker(constr_cbc_4_get_2_prefixes(X149)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax151) ).

fof(f157,axiom,
    pred_attacker(constr_CONST_4),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax156) ).

fof(f171,axiom,
    ! [X186,X187] :
      ( ( pred_attacker(X187)
        & pred_attacker(X186) )
     => pred_attacker(tuple_2(X186,X187)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax170) ).

fof(f186,axiom,
    ! [X208,X209,X210,X211,X212] :
      ( ( pred_attacker(tuple_client_A_in_2(X210))
        & pred_eq_bitstring_bitstring(name_Na(X208),constr_tuple_4_get_0x30(constr_cbc_dec_4(X210,name_Kas)))
        & pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X210,name_Kas)))
        & pred_attacker(tuple_client_A_in_4(X211))
        & pred_attacker(tuple_client_A_in_6(X209))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X209,name_Kas)))
        & pred_attacker(tuple_client_A_in_8(X212))
        & pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X211,X210,X208)),constr_cbc_dec_1(X212,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X209,name_Kas)))) )
     => pred_attacker(tuple_client_A_out_9(name_objective1)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax185) ).

fof(f187,axiom,
    ! [X213,X214,X215,X216,X217] :
      ( ( pred_attacker(tuple_client_A_in_2(X215))
        & pred_eq_bitstring_bitstring(name_Na(X213),constr_tuple_4_get_0x30(constr_cbc_dec_4(X215,name_Kas)))
        & pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X215,name_Kas)))
        & pred_attacker(tuple_client_A_in_4(X216))
        & pred_attacker(tuple_client_A_in_6(X214))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X214,name_Kas)))
        & pred_attacker(tuple_client_A_in_8(X217))
        & pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X216,X215,X213)),constr_cbc_dec_1(X217,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X214,name_Kas)))) )
     => pred_attacker(tuple_client_A_out_10(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X214,name_Kas))))) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax186) ).

fof(f189,axiom,
    ! [X220,X221,X222,X223] :
      ( pred_attacker(tuple_server_S_in_1(X221,X222,X223))
     => pred_attacker(tuple_server_S_out_2(constr_cbc_enc_4(X223,X222,name_Kab_66(X220),constr_cbc_enc_2(name_Kab_66(X220),X221,name_Kbs),name_Kas))) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax188) ).

fof(f190,conjecture,
    pred_attacker(tuple_2(name_objective1,name_objective2)),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',co0) ).

fof(f191,negated_conjecture,
    ~ pred_attacker(tuple_2(name_objective1,name_objective2)),
    inference(negated_conjecture,[],[f190]) ).

fof(f193,plain,
    ! [X0,X1,X2] : constr_cbc_dec_2(constr_cbc_enc_2(X1,X2,X0),X0) = tuple_2(X1,X2),
    inference(rectify,[],[f81]) ).

fof(f196,plain,
    ! [X0,X1,X2,X3,X4] : constr_cbc_enc_2(X1,X2,X0) = constr_cbc_4_get_2_prefixes(constr_cbc_enc_4(X1,X2,X3,X4,X0)),
    inference(rectify,[],[f84]) ).

fof(f201,plain,
    ! [X0,X1] : constr_dec(constr_enc(X1,X0),X0) = X1,
    inference(rectify,[],[f89]) ).

fof(f204,plain,
    ! [X0,X1] : constr_tuple_2_get_0x30_bitstring(tuple_2(X0,X1)) = X0,
    inference(rectify,[],[f92]) ).

fof(f208,plain,
    ! [X0,X1] : pred_eq_bitstring_bitstring(X0,X1),
    inference(rectify,[],[f96]) ).

fof(f218,plain,
    ! [X0] :
      ( pred_attacker(tuple_server_S_out_2(X0))
     => pred_attacker(X0) ),
    inference(rectify,[],[f107]) ).

fof(f219,plain,
    ! [X0,X1,X2] :
      ( ( pred_attacker(X2)
        & pred_attacker(X1)
        & pred_attacker(X0) )
     => pred_attacker(tuple_server_S_in_1(X0,X1,X2)) ),
    inference(rectify,[],[f108]) ).

fof(f224,plain,
    ! [X0,X1] :
      ( ( pred_attacker(X1)
        & pred_attacker(X0) )
     => pred_attacker(constr_dec(X0,X1)) ),
    inference(rectify,[],[f114]) ).

fof(f229,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(tuple_client_B_in_1(X0)) ),
    inference(rectify,[],[f119]) ).

fof(f232,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_A_out_9(X0))
     => pred_attacker(X0) ),
    inference(rectify,[],[f122]) ).

fof(f240,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_A_out_10(X0))
     => pred_attacker(X0) ),
    inference(rectify,[],[f130]) ).

fof(f245,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(tuple_client_A_in_8(X0)) ),
    inference(rectify,[],[f135]) ).

fof(f247,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(tuple_client_A_in_6(X0)) ),
    inference(rectify,[],[f137]) ).

fof(f249,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(tuple_client_A_in_4(X0)) ),
    inference(rectify,[],[f139]) ).

fof(f251,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(tuple_client_A_in_2(X0)) ),
    inference(rectify,[],[f141]) ).

fof(f262,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(constr_cbc_4_get_2_prefixes(X0)) ),
    inference(rectify,[],[f152]) ).

fof(f276,plain,
    ! [X0,X1] :
      ( ( pred_attacker(X1)
        & pred_attacker(X0) )
     => pred_attacker(tuple_2(X0,X1)) ),
    inference(rectify,[],[f171]) ).

fof(f287,plain,
    ! [X0,X1,X2,X3,X4] :
      ( ( pred_attacker(tuple_client_A_in_2(X2))
        & pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_4_get_0x30(constr_cbc_dec_4(X2,name_Kas)))
        & pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X2,name_Kas)))
        & pred_attacker(tuple_client_A_in_4(X3))
        & pred_attacker(tuple_client_A_in_6(X1))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X1,name_Kas)))
        & pred_attacker(tuple_client_A_in_8(X4))
        & pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X3,X2,X0)),constr_cbc_dec_1(X4,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X1,name_Kas)))) )
     => pred_attacker(tuple_client_A_out_9(name_objective1)) ),
    inference(rectify,[],[f186]) ).

fof(f288,plain,
    ! [X0,X1,X2,X3,X4] :
      ( ( pred_attacker(tuple_client_A_in_2(X2))
        & pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_4_get_0x30(constr_cbc_dec_4(X2,name_Kas)))
        & pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X2,name_Kas)))
        & pred_attacker(tuple_client_A_in_4(X3))
        & pred_attacker(tuple_client_A_in_6(X1))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X1,name_Kas)))
        & pred_attacker(tuple_client_A_in_8(X4))
        & pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X3,X2,X0)),constr_cbc_dec_1(X4,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X1,name_Kas)))) )
     => pred_attacker(tuple_client_A_out_10(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X1,name_Kas))))) ),
    inference(rectify,[],[f187]) ).

fof(f290,plain,
    ! [X0,X1,X2,X3] :
      ( pred_attacker(tuple_server_S_in_1(X1,X2,X3))
     => pred_attacker(tuple_server_S_out_2(constr_cbc_enc_4(X3,X2,name_Kab_66(X0),constr_cbc_enc_2(name_Kab_66(X0),X1,name_Kbs),name_Kas))) ),
    inference(rectify,[],[f189]) ).

fof(f291,plain,
    ~ pred_attacker(tuple_2(name_objective1,name_objective2)),
    inference(flattening,[],[f191]) ).

fof(f302,plain,
    ! [X0] :
      ( pred_attacker(X0)
      | ~ pred_attacker(tuple_server_S_out_2(X0)) ),
    inference(ennf_transformation,[],[f218]) ).

fof(f303,plain,
    ! [X0,X1,X2] :
      ( pred_attacker(tuple_server_S_in_1(X0,X1,X2))
      | ~ pred_attacker(X2)
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f219]) ).

fof(f304,plain,
    ! [X0,X1,X2] :
      ( pred_attacker(tuple_server_S_in_1(X0,X1,X2))
      | ~ pred_attacker(X2)
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(flattening,[],[f303]) ).

fof(f310,plain,
    ! [X0,X1] :
      ( pred_attacker(constr_dec(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f224]) ).

fof(f311,plain,
    ! [X0,X1] :
      ( pred_attacker(constr_dec(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(flattening,[],[f310]) ).

fof(f316,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_in_1(X0))
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f229]) ).

fof(f319,plain,
    ! [X0] :
      ( pred_attacker(X0)
      | ~ pred_attacker(tuple_client_A_out_9(X0)) ),
    inference(ennf_transformation,[],[f232]) ).

fof(f327,plain,
    ! [X0] :
      ( pred_attacker(X0)
      | ~ pred_attacker(tuple_client_A_out_10(X0)) ),
    inference(ennf_transformation,[],[f240]) ).

fof(f333,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_A_in_8(X0))
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f245]) ).

fof(f335,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_A_in_6(X0))
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f247]) ).

fof(f337,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_A_in_4(X0))
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f249]) ).

fof(f339,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_A_in_2(X0))
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f251]) ).

fof(f358,plain,
    ! [X0] :
      ( pred_attacker(constr_cbc_4_get_2_prefixes(X0))
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f262]) ).

fof(f374,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_2(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f276]) ).

fof(f375,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_2(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(flattening,[],[f374]) ).

fof(f388,plain,
    ! [X0,X1,X2,X3,X4] :
      ( pred_attacker(tuple_client_A_out_9(name_objective1))
      | ~ pred_attacker(tuple_client_A_in_2(X2))
      | ~ pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_4_get_0x30(constr_cbc_dec_4(X2,name_Kas)))
      | ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X2,name_Kas)))
      | ~ pred_attacker(tuple_client_A_in_4(X3))
      | ~ pred_attacker(tuple_client_A_in_6(X1))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X1,name_Kas)))
      | ~ pred_attacker(tuple_client_A_in_8(X4))
      | ~ pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X3,X2,X0)),constr_cbc_dec_1(X4,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X1,name_Kas)))) ),
    inference(ennf_transformation,[],[f287]) ).

fof(f389,plain,
    ! [X0,X1,X2,X3,X4] :
      ( pred_attacker(tuple_client_A_out_9(name_objective1))
      | ~ pred_attacker(tuple_client_A_in_2(X2))
      | ~ pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_4_get_0x30(constr_cbc_dec_4(X2,name_Kas)))
      | ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X2,name_Kas)))
      | ~ pred_attacker(tuple_client_A_in_4(X3))
      | ~ pred_attacker(tuple_client_A_in_6(X1))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X1,name_Kas)))
      | ~ pred_attacker(tuple_client_A_in_8(X4))
      | ~ pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X3,X2,X0)),constr_cbc_dec_1(X4,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X1,name_Kas)))) ),
    inference(flattening,[],[f388]) ).

fof(f390,plain,
    ! [X0,X1,X2,X3,X4] :
      ( pred_attacker(tuple_client_A_out_10(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X1,name_Kas)))))
      | ~ pred_attacker(tuple_client_A_in_2(X2))
      | ~ pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_4_get_0x30(constr_cbc_dec_4(X2,name_Kas)))
      | ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X2,name_Kas)))
      | ~ pred_attacker(tuple_client_A_in_4(X3))
      | ~ pred_attacker(tuple_client_A_in_6(X1))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X1,name_Kas)))
      | ~ pred_attacker(tuple_client_A_in_8(X4))
      | ~ pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X3,X2,X0)),constr_cbc_dec_1(X4,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X1,name_Kas)))) ),
    inference(ennf_transformation,[],[f288]) ).

fof(f391,plain,
    ! [X0,X1,X2,X3,X4] :
      ( pred_attacker(tuple_client_A_out_10(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X1,name_Kas)))))
      | ~ pred_attacker(tuple_client_A_in_2(X2))
      | ~ pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_4_get_0x30(constr_cbc_dec_4(X2,name_Kas)))
      | ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X2,name_Kas)))
      | ~ pred_attacker(tuple_client_A_in_4(X3))
      | ~ pred_attacker(tuple_client_A_in_6(X1))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X1,name_Kas)))
      | ~ pred_attacker(tuple_client_A_in_8(X4))
      | ~ pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X3,X2,X0)),constr_cbc_dec_1(X4,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X1,name_Kas)))) ),
    inference(flattening,[],[f390]) ).

fof(f394,plain,
    ! [X0,X1,X2,X3] :
      ( pred_attacker(tuple_server_S_out_2(constr_cbc_enc_4(X3,X2,name_Kab_66(X0),constr_cbc_enc_2(name_Kab_66(X0),X1,name_Kbs),name_Kas)))
      | ~ pred_attacker(tuple_server_S_in_1(X1,X2,X3)) ),
    inference(ennf_transformation,[],[f290]) ).

fof(f475,plain,
    ! [X2,X0,X1] : constr_cbc_dec_2(constr_cbc_enc_2(X1,X2,X0),X0) = tuple_2(X1,X2),
    inference(cnf_transformation,[],[f193]) ).

fof(f478,plain,
    ! [X2,X3,X0,X1,X4] : constr_cbc_enc_2(X1,X2,X0) = constr_cbc_4_get_2_prefixes(constr_cbc_enc_4(X1,X2,X3,X4,X0)),
    inference(cnf_transformation,[],[f196]) ).

fof(f483,plain,
    ! [X0,X1] : constr_dec(constr_enc(X1,X0),X0) = X1,
    inference(cnf_transformation,[],[f201]) ).

fof(f486,plain,
    ! [X0,X1] : constr_tuple_2_get_0x30_bitstring(tuple_2(X0,X1)) = X0,
    inference(cnf_transformation,[],[f204]) ).

fof(f490,plain,
    ! [X0,X1] : pred_eq_bitstring_bitstring(X0,X1),
    inference(cnf_transformation,[],[f208]) ).

fof(f497,plain,
    pred_attacker(tuple_true),
    inference(cnf_transformation,[],[f103]) ).

fof(f501,plain,
    ! [X0] :
      ( pred_attacker(X0)
      | ~ pred_attacker(tuple_server_S_out_2(X0)) ),
    inference(cnf_transformation,[],[f302]) ).

fof(f502,plain,
    ! [X2,X0,X1] :
      ( pred_attacker(tuple_server_S_in_1(X0,X1,X2))
      | ~ pred_attacker(X2)
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f304]) ).

fof(f508,plain,
    ! [X0,X1] :
      ( pred_attacker(constr_dec(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f311]) ).

fof(f513,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_in_1(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f316]) ).

fof(f516,plain,
    ! [X0] :
      ( pred_attacker(X0)
      | ~ pred_attacker(tuple_client_A_out_9(X0)) ),
    inference(cnf_transformation,[],[f319]) ).

fof(f524,plain,
    ! [X0] :
      ( pred_attacker(X0)
      | ~ pred_attacker(tuple_client_A_out_10(X0)) ),
    inference(cnf_transformation,[],[f327]) ).

fof(f529,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_A_in_8(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f333]) ).

fof(f531,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_A_in_6(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f335]) ).

fof(f533,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_A_in_4(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f337]) ).

fof(f535,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_A_in_2(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f339]) ).

fof(f546,plain,
    ! [X0] :
      ( pred_attacker(constr_cbc_4_get_2_prefixes(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f358]) ).

fof(f551,plain,
    pred_attacker(constr_CONST_4),
    inference(cnf_transformation,[],[f157]) ).

fof(f565,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_2(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f375]) ).

fof(f579,plain,
    ! [X2,X3,X0,X1,X4] :
      ( pred_attacker(tuple_client_A_out_9(name_objective1))
      | ~ pred_attacker(tuple_client_A_in_2(X2))
      | ~ pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_4_get_0x30(constr_cbc_dec_4(X2,name_Kas)))
      | ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X2,name_Kas)))
      | ~ pred_attacker(tuple_client_A_in_4(X3))
      | ~ pred_attacker(tuple_client_A_in_6(X1))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X1,name_Kas)))
      | ~ pred_attacker(tuple_client_A_in_8(X4))
      | ~ pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X3,X2,X0)),constr_cbc_dec_1(X4,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X1,name_Kas)))) ),
    inference(cnf_transformation,[],[f389]) ).

fof(f580,plain,
    ! [X2,X3,X0,X1,X4] :
      ( pred_attacker(tuple_client_A_out_10(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X1,name_Kas)))))
      | ~ pred_attacker(tuple_client_A_in_2(X2))
      | ~ pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_4_get_0x30(constr_cbc_dec_4(X2,name_Kas)))
      | ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X2,name_Kas)))
      | ~ pred_attacker(tuple_client_A_in_4(X3))
      | ~ pred_attacker(tuple_client_A_in_6(X1))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X1,name_Kas)))
      | ~ pred_attacker(tuple_client_A_in_8(X4))
      | ~ pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X3,X2,X0)),constr_cbc_dec_1(X4,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X1,name_Kas)))) ),
    inference(cnf_transformation,[],[f391]) ).

fof(f582,plain,
    ! [X2,X3,X0,X1] :
      ( pred_attacker(tuple_server_S_out_2(constr_cbc_enc_4(X3,X2,name_Kab_66(X0),constr_cbc_enc_2(name_Kab_66(X0),X1,name_Kbs),name_Kas)))
      | ~ pred_attacker(tuple_server_S_in_1(X1,X2,X3)) ),
    inference(cnf_transformation,[],[f394]) ).

fof(f583,plain,
    ~ pred_attacker(tuple_2(name_objective1,name_objective2)),
    inference(cnf_transformation,[],[f291]) ).

cnf(c_129,plain,
    constr_cbc_dec_2(constr_cbc_enc_2(X0,X1,X2),X2) = tuple_2(X0,X1),
    inference(cnf_transformation,[],[f475]) ).

cnf(c_132,plain,
    constr_cbc_4_get_2_prefixes(constr_cbc_enc_4(X0,X1,X2,X3,X4)) = constr_cbc_enc_2(X0,X1,X4),
    inference(cnf_transformation,[],[f478]) ).

cnf(c_137,plain,
    constr_dec(constr_enc(X0,X1),X1) = X0,
    inference(cnf_transformation,[],[f483]) ).

cnf(c_140,plain,
    constr_tuple_2_get_0x30_bitstring(tuple_2(X0,X1)) = X0,
    inference(cnf_transformation,[],[f486]) ).

cnf(c_144,plain,
    pred_eq_bitstring_bitstring(X0,X1),
    inference(cnf_transformation,[],[f490]) ).

cnf(c_151,plain,
    pred_attacker(tuple_true),
    inference(cnf_transformation,[],[f497]) ).

cnf(c_155,plain,
    ( ~ pred_attacker(tuple_server_S_out_2(X0))
    | pred_attacker(X0) ),
    inference(cnf_transformation,[],[f501]) ).

cnf(c_156,plain,
    ( ~ pred_attacker(X0)
    | ~ pred_attacker(X1)
    | ~ pred_attacker(X2)
    | pred_attacker(tuple_server_S_in_1(X2,X0,X1)) ),
    inference(cnf_transformation,[],[f502]) ).

cnf(c_162,plain,
    ( ~ pred_attacker(X0)
    | ~ pred_attacker(X1)
    | pred_attacker(constr_dec(X1,X0)) ),
    inference(cnf_transformation,[],[f508]) ).

cnf(c_167,plain,
    ( ~ pred_attacker(X0)
    | pred_attacker(tuple_client_B_in_1(X0)) ),
    inference(cnf_transformation,[],[f513]) ).

cnf(c_170,plain,
    ( ~ pred_attacker(tuple_client_A_out_9(X0))
    | pred_attacker(X0) ),
    inference(cnf_transformation,[],[f516]) ).

cnf(c_178,plain,
    ( ~ pred_attacker(tuple_client_A_out_10(X0))
    | pred_attacker(X0) ),
    inference(cnf_transformation,[],[f524]) ).

cnf(c_183,plain,
    ( ~ pred_attacker(X0)
    | pred_attacker(tuple_client_A_in_8(X0)) ),
    inference(cnf_transformation,[],[f529]) ).

cnf(c_185,plain,
    ( ~ pred_attacker(X0)
    | pred_attacker(tuple_client_A_in_6(X0)) ),
    inference(cnf_transformation,[],[f531]) ).

cnf(c_187,plain,
    ( ~ pred_attacker(X0)
    | pred_attacker(tuple_client_A_in_4(X0)) ),
    inference(cnf_transformation,[],[f533]) ).

cnf(c_189,plain,
    ( ~ pred_attacker(X0)
    | pred_attacker(tuple_client_A_in_2(X0)) ),
    inference(cnf_transformation,[],[f535]) ).

cnf(c_200,plain,
    ( ~ pred_attacker(X0)
    | pred_attacker(constr_cbc_4_get_2_prefixes(X0)) ),
    inference(cnf_transformation,[],[f546]) ).

cnf(c_205,plain,
    pred_attacker(constr_CONST_4),
    inference(cnf_transformation,[],[f551]) ).

cnf(c_219,plain,
    ( ~ pred_attacker(X0)
    | ~ pred_attacker(X1)
    | pred_attacker(tuple_2(X1,X0)) ),
    inference(cnf_transformation,[],[f565]) ).

cnf(c_233,plain,
    ( ~ pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X0,X1,X2)),constr_cbc_dec_1(X3,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X4,name_Kas))))
    | ~ pred_eq_bitstring_bitstring(name_Na(X2),constr_tuple_4_get_0x30(constr_cbc_dec_4(X1,name_Kas)))
    | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X4,name_Kas)))
    | ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X1,name_Kas)))
    | ~ pred_attacker(tuple_client_A_in_8(X3))
    | ~ pred_attacker(tuple_client_A_in_6(X4))
    | ~ pred_attacker(tuple_client_A_in_4(X0))
    | ~ pred_attacker(tuple_client_A_in_2(X1))
    | pred_attacker(tuple_client_A_out_9(name_objective1)) ),
    inference(cnf_transformation,[],[f579]) ).

cnf(c_234,plain,
    ( ~ pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X0,X1,X2)),constr_cbc_dec_1(X3,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X4,name_Kas))))
    | ~ pred_eq_bitstring_bitstring(name_Na(X2),constr_tuple_4_get_0x30(constr_cbc_dec_4(X1,name_Kas)))
    | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X4,name_Kas)))
    | ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X1,name_Kas)))
    | ~ pred_attacker(tuple_client_A_in_8(X3))
    | ~ pred_attacker(tuple_client_A_in_6(X4))
    | ~ pred_attacker(tuple_client_A_in_4(X0))
    | ~ pred_attacker(tuple_client_A_in_2(X1))
    | pred_attacker(tuple_client_A_out_10(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X4,name_Kas))))) ),
    inference(cnf_transformation,[],[f580]) ).

cnf(c_236,plain,
    ( ~ pred_attacker(tuple_server_S_in_1(X0,X1,X2))
    | pred_attacker(tuple_server_S_out_2(constr_cbc_enc_4(X2,X1,name_Kab_66(X3),constr_cbc_enc_2(name_Kab_66(X3),X0,name_Kbs),name_Kas))) ),
    inference(cnf_transformation,[],[f582]) ).

cnf(c_237,negated_conjecture,
    ~ pred_attacker(tuple_2(name_objective1,name_objective2)),
    inference(cnf_transformation,[],[f583]) ).

cnf(c_376,plain,
    ( ~ pred_attacker(X0)
    | pred_attacker(tuple_client_A_in_4(X0)) ),
    inference(prop_impl_just,[status(thm)],[c_187]) ).

cnf(c_723,plain,
    ( ~ pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X0,X1,X2)),constr_cbc_dec_1(X3,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X4,name_Kas))))
    | ~ pred_eq_bitstring_bitstring(name_Na(X2),constr_tuple_4_get_0x30(constr_cbc_dec_4(X1,name_Kas)))
    | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X4,name_Kas)))
    | ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X1,name_Kas)))
    | ~ pred_attacker(tuple_client_A_in_8(X3))
    | ~ pred_attacker(tuple_client_A_in_6(X4))
    | ~ pred_attacker(tuple_client_A_in_2(X1))
    | ~ pred_attacker(X0)
    | pred_attacker(tuple_client_A_out_9(name_objective1)) ),
    inference(bin_hyper_res,[status(thm)],[c_233,c_376]) ).

cnf(c_724,plain,
    ( ~ pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X0,X1,X2)),constr_cbc_dec_1(X3,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X4,name_Kas))))
    | ~ pred_eq_bitstring_bitstring(name_Na(X2),constr_tuple_4_get_0x30(constr_cbc_dec_4(X1,name_Kas)))
    | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X4,name_Kas)))
    | ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X1,name_Kas)))
    | ~ pred_attacker(tuple_client_A_in_8(X3))
    | ~ pred_attacker(tuple_client_A_in_6(X4))
    | ~ pred_attacker(tuple_client_A_in_2(X1))
    | ~ pred_attacker(X0)
    | pred_attacker(tuple_client_A_out_10(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X4,name_Kas))))) ),
    inference(bin_hyper_res,[status(thm)],[c_234,c_376]) ).

cnf(c_755,plain,
    ( ~ pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_4_get_0x30(constr_cbc_dec_4(X1,name_Kas)))
    | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X2,name_Kas)))
    | ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X1,name_Kas)))
    | ~ pred_attacker(tuple_client_A_in_8(X3))
    | ~ pred_attacker(tuple_client_A_in_6(X2))
    | ~ pred_attacker(tuple_client_A_in_2(X1))
    | ~ pred_attacker(X4)
    | pred_attacker(tuple_client_A_out_9(name_objective1)) ),
    inference(backward_subsumption_resolution,[status(thm)],[c_723,c_144]) ).

cnf(c_756,plain,
    ( ~ pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_4_get_0x30(constr_cbc_dec_4(X1,name_Kas)))
    | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X2,name_Kas)))
    | ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X1,name_Kas)))
    | ~ pred_attacker(tuple_client_A_in_8(X3))
    | ~ pred_attacker(tuple_client_A_in_6(X2))
    | ~ pred_attacker(tuple_client_A_in_2(X1))
    | ~ pred_attacker(X4)
    | pred_attacker(tuple_client_A_out_10(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X2,name_Kas))))) ),
    inference(backward_subsumption_resolution,[status(thm)],[c_724,c_144]) ).

cnf(c_1367,plain,
    ( ~ pred_attacker(tuple_client_A_in_8(X0))
    | ~ pred_attacker(tuple_client_A_in_6(X1))
    | ~ pred_attacker(tuple_client_A_in_2(X2))
    | ~ pred_attacker(X3)
    | pred_attacker(tuple_client_A_out_9(name_objective1)) ),
    inference(forward_subsumption_resolution,[status(thm)],[c_755,c_144,c_144,c_144]) ).

cnf(c_1392,plain,
    ( ~ pred_attacker(tuple_client_A_in_8(X0))
    | ~ pred_attacker(tuple_client_A_in_6(X1))
    | ~ pred_attacker(tuple_client_A_in_2(X2))
    | ~ pred_attacker(X3)
    | pred_attacker(tuple_client_A_out_10(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X1,name_Kas))))) ),
    inference(forward_subsumption_resolution,[status(thm)],[c_756,c_144,c_144,c_144]) ).

cnf(c_1876,plain,
    ( ~ pred_attacker(X0)
    | pred_attacker(tuple_client_A_in_8(X0)) ),
    inference(prop_impl_just,[status(thm)],[c_183]) ).

cnf(c_2229,plain,
    ( ~ pred_attacker(tuple_client_A_in_6(X0))
    | ~ pred_attacker(tuple_client_A_in_2(X1))
    | ~ pred_attacker(X2)
    | ~ pred_attacker(X3)
    | pred_attacker(tuple_client_A_out_9(name_objective1)) ),
    inference(bin_hyper_res,[status(thm)],[c_1367,c_1876]) ).

cnf(c_2230,plain,
    ( ~ pred_attacker(tuple_client_A_in_6(X0))
    | ~ pred_attacker(tuple_client_A_in_2(X1))
    | ~ pred_attacker(X2)
    | ~ pred_attacker(X3)
    | pred_attacker(tuple_client_A_out_10(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X0,name_Kas))))) ),
    inference(bin_hyper_res,[status(thm)],[c_1392,c_1876]) ).

cnf(c_3243,plain,
    ( ~ pred_attacker(X0)
    | ~ sP0_iProver_split ),
    inference(splitting,[splitting(split),new_symbols(definition,[sP0_iProver_split])],[c_2230]) ).

cnf(c_3244,plain,
    ( ~ pred_attacker(tuple_client_A_in_2(X0))
    | ~ sP1_iProver_split ),
    inference(splitting,[splitting(split),new_symbols(definition,[sP1_iProver_split])],[c_2230]) ).

cnf(c_3245,plain,
    ( ~ pred_attacker(tuple_client_A_in_6(X0))
    | pred_attacker(tuple_client_A_out_10(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X0,name_Kas)))))
    | ~ sP2_iProver_split ),
    inference(splitting,[splitting(split),new_symbols(definition,[sP2_iProver_split])],[c_2230]) ).

cnf(c_3246,plain,
    ( sP0_iProver_split
    | sP1_iProver_split
    | sP2_iProver_split ),
    inference(splitting,[splitting(split),new_symbols(definition,[])],[c_2230]) ).

cnf(c_3247,plain,
    ( ~ pred_attacker(tuple_client_A_in_6(X0))
    | ~ sP3_iProver_split ),
    inference(splitting,[splitting(split),new_symbols(definition,[sP3_iProver_split])],[c_2229]) ).

cnf(c_3248,plain,
    ( pred_attacker(tuple_client_A_out_9(name_objective1))
    | sP0_iProver_split
    | sP1_iProver_split
    | sP3_iProver_split ),
    inference(splitting,[splitting(split),new_symbols(definition,[])],[c_2229]) ).

cnf(c_5976,plain,
    ~ sP0_iProver_split,
    inference(superposition,[status(thm)],[c_151,c_3243]) ).

cnf(c_5992,plain,
    ( sP1_iProver_split
    | sP2_iProver_split ),
    inference(backward_subsumption_resolution,[status(thm)],[c_3246,c_5976]) ).

cnf(c_6204,plain,
    ( ~ pred_attacker(X0)
    | ~ sP1_iProver_split ),
    inference(superposition,[status(thm)],[c_189,c_3244]) ).

cnf(c_6241,plain,
    ~ sP1_iProver_split,
    inference(superposition,[status(thm)],[c_205,c_6204]) ).

cnf(c_6256,plain,
    sP2_iProver_split,
    inference(backward_subsumption_resolution,[status(thm)],[c_5992,c_6241]) ).

cnf(c_6279,plain,
    ( ~ pred_attacker(X0)
    | ~ sP3_iProver_split ),
    inference(superposition,[status(thm)],[c_185,c_3247]) ).

cnf(c_6316,plain,
    ~ sP3_iProver_split,
    inference(superposition,[status(thm)],[c_205,c_6279]) ).

cnf(c_6331,plain,
    pred_attacker(tuple_client_A_out_9(name_objective1)),
    inference(global_subsumption_just,[status(thm)],[c_3248,c_3248,c_5976,c_6241,c_6316]) ).

cnf(c_6333,plain,
    pred_attacker(name_objective1),
    inference(superposition,[status(thm)],[c_6331,c_170]) ).

cnf(c_6443,plain,
    ( ~ pred_attacker(constr_enc(X0,X1))
    | ~ pred_attacker(X1)
    | pred_attacker(X0) ),
    inference(superposition,[status(thm)],[c_137,c_162]) ).

cnf(c_6493,plain,
    ( ~ pred_attacker(name_objective1)
    | ~ pred_attacker(name_objective2) ),
    inference(superposition,[status(thm)],[c_219,c_237]) ).

cnf(c_6494,plain,
    ~ pred_attacker(name_objective2),
    inference(forward_subsumption_resolution,[status(thm)],[c_6493,c_6333]) ).

cnf(c_6555,plain,
    ( ~ pred_attacker(constr_cbc_enc_4(X0,X1,X2,X3,X4))
    | pred_attacker(constr_cbc_enc_2(X0,X1,X4)) ),
    inference(superposition,[status(thm)],[c_132,c_200]) ).

cnf(c_6833,plain,
    ( pred_attacker(tuple_client_A_out_10(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X0,name_Kas)))))
    | ~ pred_attacker(tuple_client_A_in_6(X0)) ),
    inference(global_subsumption_just,[status(thm)],[c_3245,c_3245,c_6256]) ).

cnf(c_6834,plain,
    ( ~ pred_attacker(tuple_client_A_in_6(X0))
    | pred_attacker(tuple_client_A_out_10(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X0,name_Kas))))) ),
    inference(renaming,[status(thm)],[c_6833]) ).

cnf(c_6840,plain,
    ( ~ pred_attacker(tuple_client_A_in_6(X0))
    | pred_attacker(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X0,name_Kas)))) ),
    inference(superposition,[status(thm)],[c_6834,c_178]) ).

cnf(c_6853,plain,
    ( ~ pred_attacker(constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X0,name_Kas)))
    | ~ pred_attacker(tuple_client_A_in_6(X0))
    | pred_attacker(name_objective2) ),
    inference(superposition,[status(thm)],[c_6840,c_6443]) ).

cnf(c_6854,plain,
    ( ~ pred_attacker(constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X0,name_Kas)))
    | ~ pred_attacker(tuple_client_A_in_6(X0)) ),
    inference(forward_subsumption_resolution,[status(thm)],[c_6853,c_6494]) ).

cnf(c_6867,plain,
    ( ~ pred_attacker(tuple_client_A_in_6(constr_cbc_enc_2(X0,X1,name_Kas)))
    | ~ pred_attacker(constr_tuple_2_get_0x30_bitstring(tuple_2(X0,X1))) ),
    inference(superposition,[status(thm)],[c_129,c_6854]) ).

cnf(c_6870,plain,
    ( ~ pred_attacker(tuple_client_A_in_6(constr_cbc_enc_2(X0,X1,name_Kas)))
    | ~ pred_attacker(X0) ),
    inference(light_normalisation,[status(thm)],[c_6867,c_140]) ).

cnf(c_6892,plain,
    ( ~ pred_attacker(constr_cbc_enc_2(X0,X1,name_Kas))
    | ~ pred_attacker(X0) ),
    inference(superposition,[status(thm)],[c_185,c_6870]) ).

cnf(c_6918,plain,
    ( ~ pred_attacker(tuple_server_S_in_1(X0,X1,X2))
    | pred_attacker(constr_cbc_enc_4(X2,X1,name_Kab_66(X3),constr_cbc_enc_2(name_Kab_66(X3),X0,name_Kbs),name_Kas)) ),
    inference(superposition,[status(thm)],[c_236,c_155]) ).

cnf(c_7221,plain,
    ( ~ pred_attacker(tuple_server_S_in_1(X0,X1,X2))
    | pred_attacker(constr_cbc_enc_2(X2,X1,name_Kas)) ),
    inference(superposition,[status(thm)],[c_6918,c_6555]) ).

cnf(c_7263,plain,
    ( ~ pred_attacker(X0)
    | ~ pred_attacker(X1)
    | ~ pred_attacker(X2)
    | pred_attacker(constr_cbc_enc_2(X1,X0,name_Kas)) ),
    inference(superposition,[status(thm)],[c_156,c_7221]) ).

cnf(c_7472,plain,
    ( ~ pred_attacker(X0)
    | ~ pred_attacker(X1)
    | ~ pred_attacker(X2) ),
    inference(forward_subsumption_resolution,[status(thm)],[c_7263,c_6892]) ).

cnf(c_7478,plain,
    ( ~ pred_attacker(X0)
    | ~ pred_attacker(X1) ),
    inference(backward_subsumption_resolution,[status(thm)],[c_219,c_7472]) ).

cnf(c_7590,plain,
    ~ pred_attacker(X0),
    inference(backward_subsumption_resolution,[status(thm)],[c_167,c_7478]) ).

cnf(c_7671,plain,
    $false,
    inference(backward_subsumption_resolution,[status(thm)],[c_151,c_7590]) ).


%------------------------------------------------------------------------------
%----ORIGINAL SYSTEM OUTPUT
% 0.00/0.12  % Problem  : SWW968+1 : TPTP v8.1.2. Released v7.4.0.
% 0.00/0.13  % Command  : run_iprover %s %d THM
% 0.13/0.34  % Computer : n022.cluster.edu
% 0.13/0.34  % Model    : x86_64 x86_64
% 0.13/0.34  % CPU      : Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz
% 0.13/0.34  % Memory   : 8042.1875MB
% 0.13/0.34  % OS       : Linux 3.10.0-693.el7.x86_64
% 0.13/0.34  % CPULimit : 300
% 0.13/0.34  % WCLimit  : 300
% 0.13/0.34  % DateTime : Sun Aug 27 22:57:24 EDT 2023
% 0.13/0.34  % CPUTime  : 
% 0.19/0.46  Running first-order theorem proving
% 0.19/0.46  Running: /export/starexec/sandbox2/solver/bin/run_problem --schedule fof_schedule --no_cores 8 /export/starexec/sandbox2/benchmark/theBenchmark.p 300
% 3.81/1.15  % SZS status Started for theBenchmark.p
% 3.81/1.15  % SZS status Theorem for theBenchmark.p
% 3.81/1.15  
% 3.81/1.15  %---------------- iProver v3.8 (pre SMT-COMP 2023/CASC 2023) ----------------%
% 3.81/1.15  
% 3.81/1.15  ------  iProver source info
% 3.81/1.15  
% 3.81/1.15  git: date: 2023-05-31 18:12:56 +0000
% 3.81/1.15  git: sha1: 8abddc1f627fd3ce0bcb8b4cbf113b3cc443d7b6
% 3.81/1.15  git: non_committed_changes: false
% 3.81/1.15  git: last_make_outside_of_git: false
% 3.81/1.15  
% 3.81/1.15  ------ Parsing...
% 3.81/1.15  ------ Clausification by vclausify_rel  & Parsing by iProver...
% 3.81/1.15  
% 3.81/1.15  ------ Preprocessing... sup_sim: 0  sf_s  rm: 2 0s  sf_e  pe_s  pe:1:0s pe_e  sup_sim: 0  sf_s  rm: 1 0s  sf_e  pe_s  pe_e 
% 3.81/1.15  
% 3.81/1.15  ------ Preprocessing... gs_s  sp: 8 0s  gs_e  snvd_s sp: 0 0s snvd_e 
% 3.81/1.15  
% 3.81/1.15  ------ Preprocessing... sf_s  rm: 2 0s  sf_e  sf_s  rm: 0 0s  sf_e 
% 3.81/1.15  ------ Proving...
% 3.81/1.15  ------ Problem Properties 
% 3.81/1.15  
% 3.81/1.15  
% 3.81/1.15  clauses                                 190
% 3.81/1.15  conjectures                             1
% 3.81/1.15  EPR                                     91
% 3.81/1.15  Horn                                    188
% 3.81/1.15  unary                                   109
% 3.81/1.15  binary                                  61
% 3.81/1.15  lits                                    304
% 3.81/1.15  lits eq                                 95
% 3.81/1.15  fd_pure                                 0
% 3.81/1.15  fd_pseudo                               0
% 3.81/1.15  fd_cond                                 0
% 3.81/1.15  fd_pseudo_cond                          0
% 3.81/1.15  AC symbols                              0
% 3.81/1.15  
% 3.81/1.15  ------ Schedule dynamic 5 is on 
% 3.81/1.15  
% 3.81/1.15  ------ Input Options "--resolution_flag false --inst_lit_sel_side none" Time Limit: 10.
% 3.81/1.15  
% 3.81/1.15  
% 3.81/1.15  ------ 
% 3.81/1.15  Current options:
% 3.81/1.15  ------ 
% 3.81/1.15  
% 3.81/1.15  
% 3.81/1.15  
% 3.81/1.15  
% 3.81/1.15  ------ Proving...
% 3.81/1.15  
% 3.81/1.15  
% 3.81/1.15  % SZS status Theorem for theBenchmark.p
% 3.81/1.15  
% 3.81/1.15  % SZS output start CNFRefutation for theBenchmark.p
% See solution above
% 3.81/1.15  
% 3.81/1.15  
%------------------------------------------------------------------------------