5G AKA is the security protocol that authenticates a mobile device to the 5G Core. It enhances privacy by using SUCI to conceal the user's identity. Through a challenge-response mechanism involving the AUSF and UDM, it establishes high-level encryption keys, protecting the network against unauthorized access and tracking.