In a brute-force attack, what percentage of the keyspace must an attacker generally search through until he or she finds the key that decrypts the data?