This document summarizes security in cellular systems, including GSM and UMTS. It covers security goals, elements of security like authentication and encryption protocols, algorithmic background of techniques like AKA, flaws in early GSM security and solutions in later standards, and challenges in implementation security across networks.