The thing is that if they made the existing chips without "features" which enable their security to be broken, you would not need this other fancy stuff. You could just store the decryption key in the firmware (probably in a never-modified "boot block") and then your only task is ensuring that nobody inside your company leaks it. Usually somebody will but maybe not for a few years (see e.g. the secured inkjet cartridge case; IIRC somebody inside Canon leaked an RSA private key).
I get the impression the OP is trying to do this for a few bucks.
Setting up OTA firmware distribution is nontrivial. We have done this lots of times and it is really off topic here (we know little of the OP's requirements) but it is an opportunity to destroy your company if it goes wrong. For that reason the phone makers stagger the OTA updates, starting with the "poor" countries and moving to the rich ones after some months. You will want to do the same, but probably by S/N range, and very likely
excluding units sold to a particular large customer because if he gets a problem he will see the entire size of it, and will have the power to destroy you. Small customers can be quickly sorted and will be happy, and a customer who had a problem and had it quickly sorted will be more loyal than one which never had a problem. Whereas a large customer, bound up with internal politics and full of corporate ladder climbers, will quite likely just move to f**k you. Been there, seen it... So you need to track serial numbers and which customers got them. All this means there is a lot of nontrivial IT stuff which needs to be set up if you really want automated OTA updates.
Also due to marketing "we want security even if we know f**k all about it" reasons you need to do OTA
over HTTPS so your CPU needs to be running TLS as well as TCP/IP and this is a lot of code. My 32F417 is pretty well full, with MbedTLS stealing ~50k...
In my product I was going to implement OTA and it can still be done but the initial plan will be to sell it in a working condition

and send a firmware file to anybody who has a problem.
We looked at setting up the update server and the rest of it and it would have cost about 50k. I already have some servers set up (for totally unrelated stuff) and it would be just a standard virtual server, a tenner a month or so, centos/nginx or such, but there is a lot of work in the detail. And if that update server gets hacked, you are totally buggered

This IT project is gonna cost you 10-20k a year even if it works perfectly for ever; that's the nature of server admin.
Then it gets better

If your box sells loads, and sells to big customers, you need to set up a redundant update server with auto failover.