the cryptanalyst can choose a ciphertext to be decrypted and has access to the decrypted plaintext. When the attacker has a message encrypted with the sender’s private key, the attacker can decrypt using the public key. This gives access to the decrypted plaintext and is an attack on the private key.