The answer depends on a lot of things like:
- Where do you intend to employ it?
- What are you trying to do with the hash?
- Do you need a crytographically secure hash function?
I suggest that you take a look at the Merkle-Damgard family of hash functions like SHA-1 etc