There is no "Best", it is down to how you want to apply the crypto hash, data criticality, data range, computational cost etc. etc.
Have a read of the various hash comparisons here;
http://en.wikipedia.org/wiki/Comparison_of_cryptographic_hash_functions[
^]
Maybe edit your question with what exactly you are trying to do, and maybe someone will recommend what they would use.