From: WTShaw on
Counted Hashing as an historic tool, and beyond...into ignotum per
ignotius.

ACA's Nicodemus and Tridigital ciphers both use a counting method to
turn a word or words into a string of numbers. It is easy enough to
see that given enough source letters, 26, the whole alphabet could be
assigned to the ranking, repeated characters from left to right simply
given the next number available.

The results are one way of making strings into permutations. Chaining
several permutations requires a tad more doing, the result being
several difficult or impossible to reverse sequential permutations.

If a key even for the parodoxical OTP was treated this way, grossly a
Random string would be produced for actual use in encryption purposes
since ever 26 characters it, the key, would contain all the
possibilities.