it isn't secured - just verified.
plaintext T, secret key S
secured: ciphertext C = aes(T, S) hash H = hash(C) OR hash H = hash(T), one is better > sent via internet > if H != hash(C) OR decryptAes(C, S) if H != hash(T)
unsecured: hash H = hash(T) > internet > if T != hash(T)...
in fact, to the best of my knowledge, the unsecured version is functionally useless - an attacker could just alter both the message and the resulting hash so they match any changes made. you have to encrypt the messages first - do aes first.
now, we do need verification, i think, but can we not just use sha1? why specifically is the hmac necessary? is it not just another hashing algorithm?