Usage of asymmetric key algorithms

Security applications (such as SSH, SSL, and PKI) use the asymmetric key algorithms for the following purposes:

RSA, DSA, and ECDSA can all perform digital signature, but only RSA can perform encryption and decryption.