CipherDrive Network

JumPedal’s CipherDrive Network is a new breed of cyber security that is virtually impervious to attack. Our technology provides the solution to the threats posed by quantum-powered hacking, AI algorithms, and the failure of RSA and AES key combinations. 

The Dual Threat of AI Algorithms and Quantum Computing

The security of our global networks is under ever-increasing threat. A Clark School study at the University of Maryland discovered there is a hacking attack every 39 seconds (Source: Cybint December 2020) and in April 2021 alone, over 1 billion records were breached (Source:, April 28 2021).

Currently available security products provide cipher key protections and implement public and private key encryption, but are still vulnerable to security breaches. Hackers are able to identify and analyze the methods developers have used for securing data and determine weaknesses, which can be anything from poorly performing encryption algorithms, weak key generators, leaked keys, or server-side issues.

The Failure of RSA Cipher Keys and AES Encryption

Most of the information we share across the internet, from web browsers, to VPN and chat, uses a combination of public and private RSA cipher keys and AES encryption for security. 

And it works: in a brute force hacking attempt a personal computer will process approximately 2,117 trillion 128-bit RSA keys per second and will require around 27,337,893,038,406,611,194,430,009,974,922,940,323,611,067,429,756,962,487,493,203 years to hack a 256 RSA cipher key. Or 27 trillion trillion trillion trillion trillion years.

But quantum machines are able to accomplish this same work by factoring numbers in parallel, and at great speeds. Though no exact numbers exist today, within 3-5 years it is anticipated that these machines will be able to hack a 256 RSA key in a matter of days.

CipherDrive’s Dual Server Network Architecture

CipherDrive’s unique dual server system produces two individual cipher keys on two independent networks. This separation of the keys by two networks means that only the content creator and recipient can assemble the keys to encode and decode the message. 

Each key is sent to the content creator and recipient by a separate network where they are combined into a single key that enables the cipher encoding and decoding of a single message. Once utilized, the keys are disposed of, eliminating the possibility of hacking by AI repetitive use tracking.  

CipherDrive keys are not produced by an RSA system of prime number multiplication. Attempts to produce hacking keys have to be generated and then individually loaded into CipherDrive’s cipher cascade decoder to determine if a valid key is produced. This process is subject to repeat attempt failures. After the first half dozen failures the CipherDrive systems locks out further attempts.

CipherDrive’s Cascading Cipher System

CipherDrive uses seven unique ciphers to create sub-blocks that are uniform bit length, statically identical and relationally crosslinked. These numbered sub-block store and carry information in packets that are so homogenously similar that it is impossible for outside observers to distinguish one block, or block group, from another from within the stream of sub-blocks that transition CipherDrive’s storage and communications channels.