It seems that the acceptable "security margin" for ciphers is set to be between 25% and 30% as a target by designers, where this number represents the number of rounds that remain "unbroken" for a certain worse-case attack. It is all too eerily empirical from a field that dislikes that sort of thing considering that the security margin tends to decrease over time as attacks improve.
Is there a historical reason for picking this arbitrary number or is there just a consensus that better than 25% is good enough?