Well.. I mention for three reasons.
First.. the information I have says that 'several private keys will decrypt messages for a given public key' for most implementations. This reduces the key space by a factor and helps in the required break time.
Second.. there is always a chance you will recover the key earlier then the time it takes to test all possibilities. IE.. 8 percent chance at the 8 percent tested point. For a truly random key.
Third.. I can imagine it is possible to implement a feature of ShowEQ that provided a zone packet for analysis to multiple processors that fed back a yes/no answer only for brute testing of a keyed packet. Of course.. providing the information with the successful 'yes' would be the key to being useful. And if the time frame was significantly below the reboot/recycle time that was acceptable by Verant, then it could be useful. Since they don't want to spawn TOO many Tormax's.. etc.
However.. if I am learning as I go along here.. then I think I now understand the process to be a Public/Private key pair strictly to encrypt a session (symmetrical) key which is what is USED for the communication between server and client. A key encrypted key, so to speak. This would prevent an easy recognition of the correctly decrypted key and invalidate my above point.
There are still ways to attack the above key encrypted key method.. but; the ones I am aware of are hardly considered passive.