Final answer:
The process of hashing a message and encrypting that hash with the sender's private key yields a digital signature, which ensures authentication of the sender and integrity of the message.
Step-by-step explanation:
The process described in the question involves creating a digital signature. A digital signature is used to provide authentication of the sender's identity and to ensure the integrity of the sender's message. By inputting the message into a hash function, a unique hash code is generated. This hash value is then encrypted with the sender's private key, transforming it into a digital signature. The digital signature can then be used by the recipient to verify that the message has not been altered and that it indeed comes from the sender by decrypting it with the sender's public key.