The 5th Generation Mobile Technology will provide broadband internet access anywhere enabling users to connect with multiple devices on the go with Internet of Things (IoT). Technological enablers such as fog and cloud computing with Software defined Networking and Network function Virtualization. With the evolution from 4G to 5G there are many security challenges to be investigated for growing demands of user privacy. In this paper we provide an overview of different cryptographic attacks that can take place inside a 5G mobile network. Furthermore, we present the countermeasures for all the possible attacks and analyze future security challenges.