The controlled process of decrypting a wrapped key inside an authorized boundary before permitted cryptographic use.