IMPORTANT - Always check vulnerabilities before implementing password encryption algorithms. The widely used PDKDF2 algorithm is vulnerable and can be cracked in minutes to seconds using techniques discussed in this paper The weaknesses of PBKDF2 . The paper also discusses adoptions to counter the vulnerabilities, however it does not suggest the improved algorithms.
An excellent source to check is NIST's OWASP. It provides the most current guidance.