SHA-512 seems to be your best bet.
To summarize related content with danieltalsky's answer, the bad thing about SHA-512 is that it is fast. This is a great hash, but SHA-512 speed means that an attacker with a copy of your hashed passwords can do more guessing per second. bcrypt is a much slower hash, so it will take longer to verify each password guess, and therefore, one of the weak user passwords can be found longer.
You can go and try adding bcrypt or some form of extension to the Kohana authorization module, but your time is probably better spent to make sure your server throttles the speed at which users can try to log into the system.
source share