Verifying Data Encryption on the Network