Now consider that 16 bytes is 128 bits (16*8). So we're looking at 2^128, or 3.402823669e+38 possible keys. Multiply that by 32, and you'll have the total size of the text file containing all possible AACS keys.
Now consider attempting to brute force the AACS key for _ONE_ AACS-protected title using the above text file as a dictionary. Assuming a gross oversimplification of the AACS protocol -- that it includes _ONLY_ AES encryption, runs _ONLY_ on x86, and uses the fastest FOSS AES implementation (Gladman) -- we're looking at about 13000 instructions for a full implementation.
Assuming a machine rated at 5000 MIPS (essentially a high-end modern desktop PC), we can test about 385,000 keys per second assuming a known-plaintext attack.
You're looking at 899190255900501182414210763 years to find _ONE_ key. Assuming that the universe is 13.7 BYO, we're looking at 65634325248211765 times the age of the universe to find _ONE_ key.