@MISC\{IMM2015-06846, author = "C. F. Hansen", title = "Decryption Key Management System for Ulfberht", year = "2015", publisher = "Technical University of Denmark, Department of Applied Mathematics and Computer Science", address = "Richard Petersens Plads, Building 324, {DK-}2800 Kgs. Lyngby, Denmark, compute@compute.dtu.dk", note = "{DTU} supervisor: Anne Elisabeth Haxthausen, aeha@dtu.dk, {DTU} Compute. Morten Heeb{\o}ll, Embedded Systems Engineer, Brunata Supervisor, Brunata A/S", url = "http://www.compute.dtu.dk/English.aspx", abstract = "Brunata needs to use meters that encrypt their data. These meters each encrypt their data with their own unique encryption key. The number of meters needed, potentially number in the hundreds of thousands. This will also mean that thousands of encryption keys for these meters will have to be stored and managed. Ulfberht - {RIS} is Brunata’s system for receiving telegrams from a number of different meters, the system validates and interprets each of these telegrams. In order for {RIS} to validate and intepret the encrypted data that these meters send, the data will have to be decrypted. The solution to this has to be implemented into Ulfberht - {RIS}. The solution consists of three parts • Storage and management for the encryption keys. • Decryption of Data. • Integration into Ulfberht - {RIS}. Part 1 of the solution consists of a place store the encryption keys and a interface for managing the keys. Part 2 of the solution handles the decryption of the data and uses part 1 to retrieve the keys needed for decryption. Part 3 of the solution is responsible for sending the encrypted data to part 2." }