Hi @Omar_hong and @Felix_ar
I want to maintain you updated.
I think I managed to replicate your issue on my end, I thank you for your files and code, they help me as reference. But this still work in progress ( see last paragpraph ). Please take a look at my testing.
I created my own bootloader image at 6000_2000 and led_blinky image at 0x6002_0000, then I merged together to create a single binary. Easiest way I found to create a single binary with both bootloader and application was write both applications and export the memory contents of the flash using Segger's J-MEM. I created a single binary to use the SPT to encrypt the image with ease.
Below my test results.
1 If I set OTFAD Region 0 to 0x6002_1000 ( 4 KB offset from entry of led_blinlky application), which is after the application entry, I can successfully boot the application.

Below application memory details.

Below evidence.

2 If I set OTFAD region 1 to 0x6002_0000, encrypting the vector table, main function and a bit of the first part of the application, I can NOT boot the application. .

You can see the resets I made, jump can not be achieved.

3 If I set OTFAD region 0 to 0x6000_2000, or 0x6000_1000 , encrypting the vector table, main function and and a bit of the first part of the bootloader. I can boot the bootloader and the application


So far, boot of the application at 0x6002_0000 works if OTFAD is set to 0x6002_1000. You are not loosing any space, but the first 4 KB of the application are in plain. So what is next? I where able to replicate the problem on the bench, so I am discussing this internally, to provide you a clarification.
I appreciate your patience and disposition.
Diego