When an attacker modifies a system image that has been digitally signed, what does the attacker need in order to also change the digital signature of the image?
A. the digital signature of the original image
B. the public key that was used to sign the original image
C. the private key that was used to sign the original image
D. the public and private keys that were used to sign the original image