This work is intended to be an in depth overview of the mobile phone security algorithms such as A3, A8, A5/1, A5/2, and Milenage that are used in GSM based networks. This material is not usually found in textbooks and should be useful to students being introduced to the field of cryptography.