I read in this answer here that if the ciphertext is reasonably larger than the key size, Vigenère cipher is easily breakable.
Is there a way to repeat the key if it is reasonably smaller that the ciphertext size and be immune to statistical information leak at the same same?
I have been thinking in XORing a keystream of a cryptographically secure hash function in Counter Mode in the plaintext before applying the key, can it defeat statistical information leak?
PS: In above paragraph, I assume the key and plaintext are in modulo 256.