A Formal Analysis of 5G Authentication