Resistive random-access memory (ReRAM) physically unclonable functions (PUFs) have recently been proposed for direct analog key encapsulation. Pre-formed ReRAM cells can produce reliable and unique responses when injected with very low currents, with the value of these responses varying with the current. The values of current used on ReRAM cells coupled with the response they produce can be used to encapsulate keys with a PUF directly. Analog key encapsulation with ReRAM cells has been simulated using data gathered from precision machinery in a lab setting and has been theorized to work. This study presents the reliability of analog key encapsulation with ReRAM PUFs on a hardware shield. It illustrates how the hardware implementation of direct analog key encapsulation encryption with ReRAM PUFs produces reliable responses on par with the simulated results. This study shows the approach followed to implement encryption and decryption of the plaintext based on hardware on both sides, the client and server. The implementation was written in C++ on the client level and Python 3 on the server level.