This document discusses cryptography in GSM networks. It provides background on common security requirements and introduces cryptography techniques like symmetric-key cryptography, public-key cryptography, and cryptographic hashes. It then discusses cryptography specifically used in GSM networks, including the A5/1 and A5/3 algorithms used for encryption. It notes issues with the security of these algorithms and proposes improving GSM network security.