佳能打印机广告"impossible made possible"有着显著的文体特征:一是语音方面,各种押韵被用到,如头韵、尾韵等;音调重音在末尾;元辅音的频繁重复使用。二是词汇方面,形容词占据着极大的比重;反义词possible与impossible强烈...佳能打印机广告"impossible made possible"有着显著的文体特征:一是语音方面,各种押韵被用到,如头韵、尾韵等;音调重音在末尾;元辅音的频繁重复使用。二是词汇方面,形容词占据着极大的比重;反义词possible与impossible强烈的对比效果。三是句法方面,过去简单小句的使用使句子短小精湛。四是语义方面,修辞手法—"重复"的使用。五是语篇方面,情态的精准把握与极性词的使用;语言组织时概念主位与述位精确的定位;口语与书面语的交替使用。基于以上文体特征,该广告大获成功。展开更多
This paper explored algebraic features of nonlinear parts in Serpent encryption algorithm and offered an 11-round Serpent-128 impossible differential algebraic attack through utilizing the method in constructing S-box...This paper explored algebraic features of nonlinear parts in Serpent encryption algorithm and offered an 11-round Serpent-128 impossible differential algebraic attack through utilizing the method in constructing S-box algebraic equations.The new method analyzed block ll-round Serpent with 2127 selected plaintexts and 2-29 bytes memory space at the same time of giving a new design principle of S-box anti-algebraic attack.展开更多
This paper first presents an impossible differential property for 5-round Advanced Encryption Standard (AES) with high probability. Based on the property and the impossible differential cryptanalytic method for the ...This paper first presents an impossible differential property for 5-round Advanced Encryption Standard (AES) with high probability. Based on the property and the impossible differential cryptanalytic method for the 5-round AES, a new method is proposed for cryptanalyzing the 8-round AES-192 and AES-256. This attack on the reduced 8-round AES-192 demands 2^121 words of memory, and performs 2^148 8-round AES-192 encryptions. This attack on the reduced 8-round AES-256 demands 2^153 words of memory, and performs 2^180 8-round AES-256 encryptions. Furthermore, both AES-192 and AES-256 require about 2^98 chosen plaintexts for this attack, and have the same probability that is only 2^-3 to fail to recover the secret key.展开更多
This paper presents a new class of surfaces that give two quite different appearances when they are seen from two special viewpoints. The inconsistent appearances can be perceived by simultaneously viewing them direct...This paper presents a new class of surfaces that give two quite different appearances when they are seen from two special viewpoints. The inconsistent appearances can be perceived by simultaneously viewing them directly and in a mirror. This phenomenon is a new type of optical illusion, and we have named it the "ambiguous cylinder illusion", because it is typically generated by cylindrical surfaces. We consider why this illusion arises, and we present a mathematical method for designing ambiguous cylinders.展开更多
Lightweight block ciphers are the essential encryption algorithm for devices with limited resources.Its goal is to ensure the security of data transmission through resource-constrained devices.Impossible diferential c...Lightweight block ciphers are the essential encryption algorithm for devices with limited resources.Its goal is to ensure the security of data transmission through resource-constrained devices.Impossible diferential cryptanalysis is one of the most efective cryptanalysis on block ciphers,and assessing the ability of resisting this attack is a basic design criterion.Shadow is a lightweight block cipher proposed by Guo et al.(IEEE Internet Things J 8(16):13014-13023,2021).It utilizes a combination of ARX operations and generalized Feistel structure to overcome the weakness of the traditional Feistel structure that only difuses half in one round.In this paper,we focus on the differential property of Shadow and its security against impossible diferential cryptanalysis.First,we use the SAT method to automatically search for a full-round impossible diferential distinguisher of Shadow-32.Then,based on the experimental results,we prove that Shadow has a diferential property with probability 1 based on the propagation of the state.Further,we can obtain an impossible diferential distinguisher for an arbitrary number of rounds of Shadow.Finally,we perform a full key recovery attack on the full-round Shadow-32 and Shadow-64.Both experimentally and theoretically,our results indicate that Shadow is critically fawed,and regardless of the security strength of the internal components and the number of rounds applied,the overall cipher remains vulnerable to impossible diferential cryptanalysis.展开更多
Direct conversion of syngas to light olefins(STO)on bifunctional catalysts has garnered significant attention,yet a comprehensive understanding of the reaction pathway and reaction kinetics remains elusive.Herein,we t...Direct conversion of syngas to light olefins(STO)on bifunctional catalysts has garnered significant attention,yet a comprehensive understanding of the reaction pathway and reaction kinetics remains elusive.Herein,we theoretically addressed the kinetics of the direct STO reaction on typical ZnAl_(2)O_(4)/zeolite catalysts by establishing a complete reaction network,consisting of methanol synthesis and conversion,water gas shift(WGS)reaction,olefin hydrogenation,and other relevant steps.The WGS reaction occurs very readily on ZnAl_(2)O_(4) surface whereas which is less active towards alkane formation via olefin hydrogenation,and the latter can be attributed to the characteristics of the H_(2) heterolytic activation and the weak polarity of olefins.The driving effect of zeolite component towards CO conversion was demonstrated by microkinetic simulations,which is sensitive to reaction conditions like space velocity and reaction temperature.Under a fixed ratio of active sites between oxide and zeolite components,the concept of the“impossible trinity”of high CO conversion,high olefin selectivity,and high space velocity can thus be manifested.This work thus provides a comprehensive kinetic picture on the direct STO conversion,offering valuable insights for the design of each component of bifunctional catalysts and the optimization of reaction conditions.展开更多
In this paper,we greatly increase the number of impossible differentials for SIMON and SIMECK by eliminating the 1-bit constraint in input/output difference,which is the precondition to ameliorate the complexity of at...In this paper,we greatly increase the number of impossible differentials for SIMON and SIMECK by eliminating the 1-bit constraint in input/output difference,which is the precondition to ameliorate the complexity of attacks.We propose an algorithm which can greatly reduce the searching complexity to find such trails efficiently since the search space exponentially expands to find impossible differentials with multiple active bits.There is another situation leading to the contradiction in impossible differentials except for miss-in-the-middle.We show how the contradiction happens and conclude the precondition of it defined as miss-from-the-middle.It makes our results more comprehensive by applying these two approach simultaneously.This paper gives for the first time impossible differential characteristics with multiple active bits for SIMON and SIMECK,leading to a great increase in the number.The results can be verified not only by covering the state-of-art,but also by the MILP model.展开更多
This paper studies the security of the block ciphers ARIA and Camellia against impossible differential cryptanalysis. Our work improves the best impossible differential cryptanalysis of ARIA and Camellia known so far....This paper studies the security of the block ciphers ARIA and Camellia against impossible differential cryptanalysis. Our work improves the best impossible differential cryptanalysis of ARIA and Camellia known so far. The designers of ARIA expected no impossible differentials exist for 4-round ARIA. However, we found some nontrivial 4-round impossible differentials, which may lead to a possible attack on 6-round ARIA. Moreover, we found some nontrivial 8-round impossible differentials for Camellia, whereas only 7-round impossible differentials were previously known. By using the 8-round impossible differentials, we presented an attack on 12-round Camellia without FL/FL^-1 layers.展开更多
CLEFIA, a new 128-bit block cipher proposed by Sony Corporation, is increasingly attracting cryptanalysts' attention. In this paper, we present two new impossible differential attacks on 13 rounds of CLEFIA-128. The ...CLEFIA, a new 128-bit block cipher proposed by Sony Corporation, is increasingly attracting cryptanalysts' attention. In this paper, we present two new impossible differential attacks on 13 rounds of CLEFIA-128. The proposed attacks utilize a variety of previously known techniques, in particular the hash table technique and redundancy in the key schedule of this block cipher. The first attack does not consider the whitening layers of CLEFIA, requires 21~9"5 chosen plaintexts, and has a running time equivalent to about 2112.9 encryptions. The second attack preserves the whitening layers, requires 2117.8 chosen plaintexts, and has a total time complexity equivalent to about 2121.2 encryptions.展开更多
LBlock is a 32-round lightweight block cipher with 64-bit block size and 80-bit key. This paper identifies 16- round related-key impossible differentials of LBlock, which are better than the 15-round related-key impos...LBlock is a 32-round lightweight block cipher with 64-bit block size and 80-bit key. This paper identifies 16- round related-key impossible differentials of LBlock, which are better than the 15-round related-key impossible differentials used in the previous attack. Based on these 16-round related-key impossible differentials, we can attack 23 rounds of LBlock while the previous related-key impossible differential attacks could only work on 22-round LBlock. This makes our attack on LBlock the best attack in terms of the number of attacked rounds.展开更多
Impossible differential cryptanalysis is a method recovering secret key, which gets rid of the keys that satisfy impossible differential relations. This paper concentrates on the impossible differential cryptanalysis ...Impossible differential cryptanalysis is a method recovering secret key, which gets rid of the keys that satisfy impossible differential relations. This paper concentrates on the impossible differential cryptanalysis of Advanced Encryption Standard (AES) and presents two methods for impossible differential cryptanalysis of 7-round AES-192 and 8-round AES-256 combined with time-memory trade-off by exploiting weaknesses in their key schedule. This attack on the reduced to 7-round AES-192 requires about 294.5 chosen plaintexts, demands 2129 words of memory, and performs 2157 7-round AES-192 encryptions. Furthermore, this attack on the reduced to 8-round AES-256 requires about 2^101 chosen plaintexts, demands 2^201 words of memory, and performs 2^228 8-round AES-256 encryptions.展开更多
Impossible differential cryptanalysis is an important approach to evaluate the security of block ciphers. In EUROCRYPT 2016, Sun, et al. proved that there exists no impossible differential longer than four rounds for ...Impossible differential cryptanalysis is an important approach to evaluate the security of block ciphers. In EUROCRYPT 2016, Sun, et al. proved that there exists no impossible differential longer than four rounds for the AES structure where S-boxes are arbitrary. In DCC 2019, Wang,et al. proved that any differential is possible for 5-round AES, assuming that the round keys are independent and uniformly random. In ASIACRYPT 2020, Hu, et al. used automatic search to show that there exists no one-byte active impossible differential for 5-round AES-128 considering the relations of 3-round keys. By algebraic methods, this paper theoretically proves that there exists no one-byte active impossible differential for 5-round AES even considering the relations of all round keys. Firstly,the authors prove the independence of ten bytes in the consecutive four round keys under the key schedule of AES-128. Then 5-round AES is decomposed to three subfunctions and the propagations of the considered differences in these subfunctions are discussed. Finally, the authors prove that the considered differential trails can be connected by the ten bytes of round keys. Furthermore, for any given one-byte active differential, there are at least 2^(51) master keys such that the differential is possible for 5-round AES-128.展开更多
Alice opened the door and found that it led into a small passage,not much larger than a rat⁃hole:she knelt down and looked along the passage into the loveliest garden you ever saw.How she longed to get out of that dar...Alice opened the door and found that it led into a small passage,not much larger than a rat⁃hole:she knelt down and looked along the passage into the loveliest garden you ever saw.How she longed to get out of that dark hall,and wander about among those beds of bright flowers and those cool fountains,but she could not even get her head through the doorway;“and even if my head would go through,”thought poor Alice,“it would be of very little use without my shoulders.Oh,how I wish I could shut up like a telescope!I think I could,if I only know how to begin.”For,you see,so many out⁃of⁃the⁃way things had happened lately,that Alice had begun to think that very few things indeed were really impossible.展开更多
The question of whether an ideal network exists with global scalability in its full life cycle has always been a first-principles problem in the research of network systems and architectures.Thus far,it has not been p...The question of whether an ideal network exists with global scalability in its full life cycle has always been a first-principles problem in the research of network systems and architectures.Thus far,it has not been possible to scientifically practice the design criteria of an ideal network in a unimorphic network system,making it difficult to adapt to known services with clear application scenarios while supporting the ever-growing future services with unexpected characteristics.Here,we theoretically prove that no unimorphic network system can simultaneously meet the scalability requirement in a full cycle in three dimensions—the service-level agreement(S),multiplexity(M),and variousness(V)—which we name as the“impossible SMV triangle”dilemma.It is only by transforming the current network development paradigm that the contradiction between global scalability and a unified network infrastructure can be resolved from the perspectives of thinking,methodology,and practice norms.In this paper,we propose a theoretical framework called the polymorphic network environment(PNE),the first principle of which is to separate or decouple application network systems from the infrastructure environment and,under the given resource conditions,use core technologies such as the elementization of network baselines,the dynamic aggregation of resources,and collaborative software and hardware arrangements to generate the capability of the“network of networks.”This makes it possible to construct an ideal network system that is designed for change and capable of symbiosis and coexistence with the generative network morpha in the spatiotemporal dimensions.An environment test for principle verification shows that the generated representative application network modalities can not only coexist without mutual influence but also independently match well-defined multimedia services or custom services under the constraints of technical and economic indicators.展开更多
Considering the demands,situations and trends in respect to global climate change,carbon neutrality and energy transition,the achievements and significance of the global green energy transition and the new energy revo...Considering the demands,situations and trends in respect to global climate change,carbon neutrality and energy transition,the achievements and significance of the global green energy transition and the new energy revolution of China are summarized,and the“Energy Triangle”theory is proposed.The research indicates that the energy technology revolution is driving a dual transformation in global energy:the black“shale oil and gas revolution”in North America and the green“new energy revolution”in China.The green energy revolution of China has achieved significant milestones in wind-solar-hydrogen-energy storage technologies,leading the world in photovoltaic and wind power.The country has developed the world's largest,most comprehensive,and competitive new energy innovation,industrial and value chains,along with the largest clean power supply system globally.New quality productive forces represent the green productive forces.The green“new energy revolution”of China has accelerated the transformation of its energy structure and the global shift towards clean energy,promoting a new win-win model for the global green and low-carbon transition.Under the backdrop of a carbon-neutral goal-driven energy transition,the“Energy Triangle”theory within the framework of new quality productive forces explains the correlation and development of energy security,economic growth,and environmental sustainability throughout the evolution from fossil fuels to new energy systems,culminating in an energy revolution.Compared to the global energy resource endowment,the energy resources of China are characterized by abundant coal,limited oil and gas,and unlimited wind and photovoltaic energy.Moving forward,the energy strategies of China will focus on the advancement of technologies to clean coal for carbon emission reduction,increase gas output while stabilizing oil production,increase green energy while enhancing new energy,and achieve intelligent integration.Vigorously developing new energy is an essential step in maintaining the energy security of China,and establishing a carbon-neutral“super energy system”is a necessary choice.It is crucial to enhance the international competitiveness of China in new energy development,promote high-quality energy productive forces,support the country's transition to an“energy power”,and strive for“energy independence”.展开更多
文摘佳能打印机广告"impossible made possible"有着显著的文体特征:一是语音方面,各种押韵被用到,如头韵、尾韵等;音调重音在末尾;元辅音的频繁重复使用。二是词汇方面,形容词占据着极大的比重;反义词possible与impossible强烈的对比效果。三是句法方面,过去简单小句的使用使句子短小精湛。四是语义方面,修辞手法—"重复"的使用。五是语篇方面,情态的精准把握与极性词的使用;语言组织时概念主位与述位精确的定位;口语与书面语的交替使用。基于以上文体特征,该广告大获成功。
基金Supported by the Natural Science Foundation of Hubei Province(Q20102905)
文摘This paper explored algebraic features of nonlinear parts in Serpent encryption algorithm and offered an 11-round Serpent-128 impossible differential algebraic attack through utilizing the method in constructing S-box algebraic equations.The new method analyzed block ll-round Serpent with 2127 selected plaintexts and 2-29 bytes memory space at the same time of giving a new design principle of S-box anti-algebraic attack.
基金Supported by the Foundation of National Labora-tory for Modern Communications (51436030105DZ0105)
文摘This paper first presents an impossible differential property for 5-round Advanced Encryption Standard (AES) with high probability. Based on the property and the impossible differential cryptanalytic method for the 5-round AES, a new method is proposed for cryptanalyzing the 8-round AES-192 and AES-256. This attack on the reduced 8-round AES-192 demands 2^121 words of memory, and performs 2^148 8-round AES-192 encryptions. This attack on the reduced 8-round AES-256 demands 2^153 words of memory, and performs 2^180 8-round AES-256 encryptions. Furthermore, both AES-192 and AES-256 require about 2^98 chosen plaintexts for this attack, and have the same probability that is only 2^-3 to fail to recover the secret key.
基金Supported the Grant-in-Aid for Basic Scientific Research(No.24360039)Challenging Exploratory Research(No.15K12067)
文摘This paper presents a new class of surfaces that give two quite different appearances when they are seen from two special viewpoints. The inconsistent appearances can be perceived by simultaneously viewing them directly and in a mirror. This phenomenon is a new type of optical illusion, and we have named it the "ambiguous cylinder illusion", because it is typically generated by cylindrical surfaces. We consider why this illusion arises, and we present a mathematical method for designing ambiguous cylinders.
基金supported by the National Natural Science Foundation of China(No.12371525).
文摘Lightweight block ciphers are the essential encryption algorithm for devices with limited resources.Its goal is to ensure the security of data transmission through resource-constrained devices.Impossible diferential cryptanalysis is one of the most efective cryptanalysis on block ciphers,and assessing the ability of resisting this attack is a basic design criterion.Shadow is a lightweight block cipher proposed by Guo et al.(IEEE Internet Things J 8(16):13014-13023,2021).It utilizes a combination of ARX operations and generalized Feistel structure to overcome the weakness of the traditional Feistel structure that only difuses half in one round.In this paper,we focus on the differential property of Shadow and its security against impossible diferential cryptanalysis.First,we use the SAT method to automatically search for a full-round impossible diferential distinguisher of Shadow-32.Then,based on the experimental results,we prove that Shadow has a diferential property with probability 1 based on the propagation of the state.Further,we can obtain an impossible diferential distinguisher for an arbitrary number of rounds of Shadow.Finally,we perform a full key recovery attack on the full-round Shadow-32 and Shadow-64.Both experimentally and theoretically,our results indicate that Shadow is critically fawed,and regardless of the security strength of the internal components and the number of rounds applied,the overall cipher remains vulnerable to impossible diferential cryptanalysis.
文摘Direct conversion of syngas to light olefins(STO)on bifunctional catalysts has garnered significant attention,yet a comprehensive understanding of the reaction pathway and reaction kinetics remains elusive.Herein,we theoretically addressed the kinetics of the direct STO reaction on typical ZnAl_(2)O_(4)/zeolite catalysts by establishing a complete reaction network,consisting of methanol synthesis and conversion,water gas shift(WGS)reaction,olefin hydrogenation,and other relevant steps.The WGS reaction occurs very readily on ZnAl_(2)O_(4) surface whereas which is less active towards alkane formation via olefin hydrogenation,and the latter can be attributed to the characteristics of the H_(2) heterolytic activation and the weak polarity of olefins.The driving effect of zeolite component towards CO conversion was demonstrated by microkinetic simulations,which is sensitive to reaction conditions like space velocity and reaction temperature.Under a fixed ratio of active sites between oxide and zeolite components,the concept of the“impossible trinity”of high CO conversion,high olefin selectivity,and high space velocity can thus be manifested.This work thus provides a comprehensive kinetic picture on the direct STO conversion,offering valuable insights for the design of each component of bifunctional catalysts and the optimization of reaction conditions.
基金the National Natural Science Foundation of China(61972393,61872359).
文摘In this paper,we greatly increase the number of impossible differentials for SIMON and SIMECK by eliminating the 1-bit constraint in input/output difference,which is the precondition to ameliorate the complexity of attacks.We propose an algorithm which can greatly reduce the searching complexity to find such trails efficiently since the search space exponentially expands to find impossible differentials with multiple active bits.There is another situation leading to the contradiction in impossible differentials except for miss-in-the-middle.We show how the contradiction happens and conclude the precondition of it defined as miss-from-the-middle.It makes our results more comprehensive by applying these two approach simultaneously.This paper gives for the first time impossible differential characteristics with multiple active bits for SIMON and SIMECK,leading to a great increase in the number.The results can be verified not only by covering the state-of-art,but also by the MILP model.
基金This work is supported by the National Natural Science Foundation of China under Grant No.90604036the National Grand Fundamental Research 973 Program of China under Grant No.2004CB318004.
文摘This paper studies the security of the block ciphers ARIA and Camellia against impossible differential cryptanalysis. Our work improves the best impossible differential cryptanalysis of ARIA and Camellia known so far. The designers of ARIA expected no impossible differentials exist for 4-round ARIA. However, we found some nontrivial 4-round impossible differentials, which may lead to a possible attack on 6-round ARIA. Moreover, we found some nontrivial 8-round impossible differentials for Camellia, whereas only 7-round impossible differentials were previously known. By using the 8-round impossible differentials, we presented an attack on 12-round Camellia without FL/FL^-1 layers.
文摘CLEFIA, a new 128-bit block cipher proposed by Sony Corporation, is increasingly attracting cryptanalysts' attention. In this paper, we present two new impossible differential attacks on 13 rounds of CLEFIA-128. The proposed attacks utilize a variety of previously known techniques, in particular the hash table technique and redundancy in the key schedule of this block cipher. The first attack does not consider the whitening layers of CLEFIA, requires 21~9"5 chosen plaintexts, and has a running time equivalent to about 2112.9 encryptions. The second attack preserves the whitening layers, requires 2117.8 chosen plaintexts, and has a total time complexity equivalent to about 2121.2 encryptions.
基金supported by the National Basic Research 973 Program of China under Grant No.2013CB834205the National Natural Science Foundation of China under Grant Nos.61133013,61070244,and 61103237+1 种基金the Program for New Century Excellent Talents in University of China under Grant No.NCET-13-0350the Interdisciplinary Research Foundation of Shandong University of China under Grant No.2012JC018
文摘LBlock is a 32-round lightweight block cipher with 64-bit block size and 80-bit key. This paper identifies 16- round related-key impossible differentials of LBlock, which are better than the 15-round related-key impossible differentials used in the previous attack. Based on these 16-round related-key impossible differentials, we can attack 23 rounds of LBlock while the previous related-key impossible differential attacks could only work on 22-round LBlock. This makes our attack on LBlock the best attack in terms of the number of attacked rounds.
基金the National Natural Science Foundation of China (Grant No. 60673072)Foundation of National Laboratory for Modern Communications (Grant No. 51436030105DZ0105)
文摘Impossible differential cryptanalysis is a method recovering secret key, which gets rid of the keys that satisfy impossible differential relations. This paper concentrates on the impossible differential cryptanalysis of Advanced Encryption Standard (AES) and presents two methods for impossible differential cryptanalysis of 7-round AES-192 and 8-round AES-256 combined with time-memory trade-off by exploiting weaknesses in their key schedule. This attack on the reduced to 7-round AES-192 requires about 294.5 chosen plaintexts, demands 2129 words of memory, and performs 2157 7-round AES-192 encryptions. Furthermore, this attack on the reduced to 8-round AES-256 requires about 2^101 chosen plaintexts, demands 2^201 words of memory, and performs 2^228 8-round AES-256 encryptions.
基金supported by the National Cryptography Development Fund of China under Grant Nos.MMJJ20170103 and MMJJ20180204.
文摘Impossible differential cryptanalysis is an important approach to evaluate the security of block ciphers. In EUROCRYPT 2016, Sun, et al. proved that there exists no impossible differential longer than four rounds for the AES structure where S-boxes are arbitrary. In DCC 2019, Wang,et al. proved that any differential is possible for 5-round AES, assuming that the round keys are independent and uniformly random. In ASIACRYPT 2020, Hu, et al. used automatic search to show that there exists no one-byte active impossible differential for 5-round AES-128 considering the relations of 3-round keys. By algebraic methods, this paper theoretically proves that there exists no one-byte active impossible differential for 5-round AES even considering the relations of all round keys. Firstly,the authors prove the independence of ten bytes in the consecutive four round keys under the key schedule of AES-128. Then 5-round AES is decomposed to three subfunctions and the propagations of the considered differences in these subfunctions are discussed. Finally, the authors prove that the considered differential trails can be connected by the ten bytes of round keys. Furthermore, for any given one-byte active differential, there are at least 2^(51) master keys such that the differential is possible for 5-round AES-128.
文摘Alice opened the door and found that it led into a small passage,not much larger than a rat⁃hole:she knelt down and looked along the passage into the loveliest garden you ever saw.How she longed to get out of that dark hall,and wander about among those beds of bright flowers and those cool fountains,but she could not even get her head through the doorway;“and even if my head would go through,”thought poor Alice,“it would be of very little use without my shoulders.Oh,how I wish I could shut up like a telescope!I think I could,if I only know how to begin.”For,you see,so many out⁃of⁃the⁃way things had happened lately,that Alice had begun to think that very few things indeed were really impossible.
基金supported by the National Key Research and Development Program of China(2022YFB2901403)the Songshan Laboratory Project(221100210900-02).
文摘The question of whether an ideal network exists with global scalability in its full life cycle has always been a first-principles problem in the research of network systems and architectures.Thus far,it has not been possible to scientifically practice the design criteria of an ideal network in a unimorphic network system,making it difficult to adapt to known services with clear application scenarios while supporting the ever-growing future services with unexpected characteristics.Here,we theoretically prove that no unimorphic network system can simultaneously meet the scalability requirement in a full cycle in three dimensions—the service-level agreement(S),multiplexity(M),and variousness(V)—which we name as the“impossible SMV triangle”dilemma.It is only by transforming the current network development paradigm that the contradiction between global scalability and a unified network infrastructure can be resolved from the perspectives of thinking,methodology,and practice norms.In this paper,we propose a theoretical framework called the polymorphic network environment(PNE),the first principle of which is to separate or decouple application network systems from the infrastructure environment and,under the given resource conditions,use core technologies such as the elementization of network baselines,the dynamic aggregation of resources,and collaborative software and hardware arrangements to generate the capability of the“network of networks.”This makes it possible to construct an ideal network system that is designed for change and capable of symbiosis and coexistence with the generative network morpha in the spatiotemporal dimensions.An environment test for principle verification shows that the generated representative application network modalities can not only coexist without mutual influence but also independently match well-defined multimedia services or custom services under the constraints of technical and economic indicators.
基金Supported by the National Science and Technology Major Special Project Secretariat(2022-5596510-000064)Petro China Science and Technology Special Project(2021ZZ01-05)。
文摘Considering the demands,situations and trends in respect to global climate change,carbon neutrality and energy transition,the achievements and significance of the global green energy transition and the new energy revolution of China are summarized,and the“Energy Triangle”theory is proposed.The research indicates that the energy technology revolution is driving a dual transformation in global energy:the black“shale oil and gas revolution”in North America and the green“new energy revolution”in China.The green energy revolution of China has achieved significant milestones in wind-solar-hydrogen-energy storage technologies,leading the world in photovoltaic and wind power.The country has developed the world's largest,most comprehensive,and competitive new energy innovation,industrial and value chains,along with the largest clean power supply system globally.New quality productive forces represent the green productive forces.The green“new energy revolution”of China has accelerated the transformation of its energy structure and the global shift towards clean energy,promoting a new win-win model for the global green and low-carbon transition.Under the backdrop of a carbon-neutral goal-driven energy transition,the“Energy Triangle”theory within the framework of new quality productive forces explains the correlation and development of energy security,economic growth,and environmental sustainability throughout the evolution from fossil fuels to new energy systems,culminating in an energy revolution.Compared to the global energy resource endowment,the energy resources of China are characterized by abundant coal,limited oil and gas,and unlimited wind and photovoltaic energy.Moving forward,the energy strategies of China will focus on the advancement of technologies to clean coal for carbon emission reduction,increase gas output while stabilizing oil production,increase green energy while enhancing new energy,and achieve intelligent integration.Vigorously developing new energy is an essential step in maintaining the energy security of China,and establishing a carbon-neutral“super energy system”is a necessary choice.It is crucial to enhance the international competitiveness of China in new energy development,promote high-quality energy productive forces,support the country's transition to an“energy power”,and strive for“energy independence”.