Which algorithm is best for security?

You might want to go through the following links for information on both the algorithms, comparison between the two and the best security practices: