Not yet, no.
If Moore's Law holds true and computer processor power continues doubling approximately every 18-months, in about 100 years you should be able to build a distributed computing project using a few trillion (that's 12 zeros here in the US) computers and be able to crack 128-bit AES in only a few days.
If you have something that says AES has been cracked, I'm not the only one that would like to see it. :-)
It's WPA-TKIP that can be cracked (to expose the encrypted data, not reverse engineer the original passphrase) by gathering only 5-10 minutes of packets... that's RC-4 encryption, not AES.... then you would need to repeat those steps (gather, break, decrypt) every time the password is incrememented along the vectors. Still, it means your data is not ''secure'' (if you desire your data to be ''secure'') when using WPA-TKIP... note that WPA-AES is NOT part of the WPA 'standard' and not all devices support it. ''WPA'' is WEP + TKIP, and was a quick fix to shore up security until WPA2 could be implemented. If you have devices that don't support WPA2 (or at least WPA-AES), I recommend replacing them, chopping the gold-plated conductor tabs off for reclaim, then recycling the rest of the pieces. But even version 1.0 of WRT54G (that's pre-Cisco) and WRT54GS wireless routers support WPA2 with a firmware update, so they would need be fairly ancient devices, in computer-hardware terms, to not support WPA2.
Now, if for a password you use your name, or your mother's name, or anything/anyone's name, or any word in any-language dictionary, that makes a brute-force crack much more likely (no matter what encryption method is used), and you're not serious about security.
Personally, I use the (128-bit) MD5 hash of a word and add a few numbers to it that are significant to me, to make a 36-character pseudo-random password that's easily recreatable (I have a free MD5 generator on all my computers and if you google MD5 Generator you'll see how ubiquitous they are). So if you'd like to break into my WLANs or decrypt packets captured from them, there - I've given you a head start... There are only 1.532 x 10^54 possible combinations if you limit your guesses to passphrases consisting of 32-place HEX-character + 4-place 0-9 character - have at it. :-)
Here's a quote from the Technoracle (
http://technoracle.blogspot.com), blogging about AES:
To give you an idea of the complexity of the resulting decryption process, to crack a 128 bit key would take approximately 3.4 x 10^38 guesses assuming the correct key was the last one you tried. To place this in perspective, is estimated that if a DES key generator were able to discover 1 DES key per second, it would take 149 thousand-billion (149 trillion) years to crack a single 128 bit AES key. As a side note, most physicists accept that the universe is approximately 20 billion years old.