This technique is entirely reasonable, although not incredibly efficient. There are several ways of converting between symmetric encryption and authentication; the only reason we talk about using, e.g., AES and SHA256 is that AES is much faster than any block cipher you can build out of SHA256, while SHA256 is much faster than any hash you can build out of AES.