You either need to apply a capture filter or a Wireshark display filter or both in order to narrow down the traffic to the TCP conversation of interest.
For example, a capture filter might be something like: ip and tcp and host 1.2.3.4 and host 4.3.2.1 and tcp port 443
, assuming hosts 1.2.3.4 and 4.3.2.1 are the two devices communicating with each other, and port 443 is the presumed port at least one of them is using for communication. Since you mentioned that the traffic was encrypted, then for this example I just made the assumption that it's HTTPS traffic and 443 is the default port for that traffic.
In Wireshark though, you'd use a display filter to narrow down the packets, so something like: ip.addr eq 1.2.3.4 and ip.addr eq 4.3.2.1 and tcp.port eq 443
, or more simply just find any packet part of the conversation and just right-click on the packet in the Wireshark packet list pane and then choose, Conversation Filter -> TCP or Follow -> TCP Stream.
Once you have the conversation narrowed down, then you can just look at the delta time between a request packet and a response packet. If you don't already have a delta time column, you can add it via Edit -> Preferences -> Columns -> [+] -> Type: Delta time displayed, Title: DeltaTime, or you can look at the "Time since previous frame in this TCP stream" value by expanding the TCP protocol in the Packet Details pane and then expanding the [Timestamps] information. You can also right-click on that field (tcp.time_delta
) and choose Apply as Column if you want to see them all more easily.