Also, I don't think "block of random looking bits" should be considered prima-facie evidence that it is encrypted data (by any particular key or even at all). But if there is strong evidence that key A was used to encrypt some bits, and if there is strong evidence that person B has access to key A, then compelling production of that key is not absurd if done correctly.