Execution time for an unsuccessful login differs when using a non-existing username compared to using an existing one.
Two separate operations in a product require different amounts of time to complete, in a way that is observable to an actor and reveals security-relevant information about the state of the product, such as whether a particular operation was successful or not.