If this is the case, as Maxx said, only figuring out the correct algorithm can cause the some-what hacker to obtain many keys. Keys are generated in a fashioned orders as with first 3 digits, AAA, AAB, through Z, right? If that person finds out how to crack this pattern, he may be giving a risk to the community.